Hacker intrusion rescue service
7 * 24 rapid response service Determine the type of security incident Suppress the development of the situation Exclude and identify backdoor programs Restore normal operation of the information system Summary and Analysis of Security Incidents Internal network penetration testing Security reinforcement of customer information system Internal network penetration testing retest Re evaluate the security performance of customer information systems
Safety guarantee during special periods

Explanation of Safety Inspection Work during Special Period

  • ▪ Review of the correctness and effectiveness of security policies

  • ▪ CPU utilization rate.
  • ▪ Memory utilization rate.
  • ▪ Network interface usage rate.
  • ▪ Buffer usage

  • ▪ The running status of the system kernel.
  • ▪ Is there a new kernel upgrade program that can be used

  • ▪ Whether the log reception is normal.
  • ▪ Does the log need to be fully processed.
  • ▪ Log collection and analysis.

  • ▪ Check the upgrade status of virus definitions such as antivirus walls.
  • ▪ Check the upgrade status of IDS/IPS rule library.

  • 1. Status of operating system software versions.
  • 2. Windows series patch installation status.
  • 3. Installation status of Linux series patches...

  • ▪ 1. Status of operating system software versions.
  • ▪ 2. Windows series patch installation status.
  • ▪ 3. Installation status of Linux series patches...

  • ▪ CPU utilization rate.
  • ▪ Memory utilization rate.
  • ▪ Exchange area utilization rate.
  • ▪ Disk space occupation.
  • ▪ I/O operation status.