{"id":13,"date":"2008-11-01T11:47:26","date_gmt":"2008-11-01T10:47:26","guid":{"rendered":"http:\/\/forensis.si\/?page_id=13"},"modified":"2016-01-11T23:00:31","modified_gmt":"2016-01-11T23:00:31","slug":"varnost","status":"publish","type":"page","link":"https:\/\/www.forensis.si\/en\/storitve\/varnost\/","title":{"rendered":"Varnost"},"content":{"rendered":"<p><\/p>\n<ul>\n<li>\n<h3><a href=\"#forensics\">digital forensics<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"#pen_audit\">penetration testing<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"#pen_audit\">security audits<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"#IR\">incident response<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"#fw\">firewalls and IDS<\/a><\/h3>\n<\/li>\n<\/ul>\n<h3><a name=\"forensics\"><\/a>Digital forensics<\/h3>\n<p>Digital forensics is a procedure to collect and analyze digital evidence from storage media. The aim is to reconstruct past events and\/or recover lost or hidden content. Understanding of the methodology and tools is cruicial for succesful investigation. The evidence has to be handled in such a way it&#8217;s integrity doesn&#8217;t get damaged. The procedures taken have to be toroughly documented and repeatable. A comprehensive report as the final deliverable is one of the integral part of an investigation.<\/p>\n<p><strong>Who are the users of digital forensics<\/strong><\/p>\n<ul>\n<li>Law enforcement organisations dealing with potential criminal activity<\/li>\n<li>Organizations, following a security breach, trying to find out the background and the level of compromise of the breach<\/li>\n<li>Parties in legal processes in need of digital evidence<\/li>\n<li>Someone that has lost crucial data in an operational or system error and would like to recover it<\/li>\n<\/ul>\n<p><strong>References<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/giac.org\/\" target=\"_blank\">GIAC<\/a> certified system forensic analyst &#8211; <a href=\"http:\/\/www.giac.org\/certified-professional\/jure-simsic\/106885\" target=\"_blank\">GCFA<\/a><\/li>\n<\/ul>\n<h3><a name=\"pen_audit\"><\/a>Penetration testing and security audits<\/h3>\n<p>Pen testing and security audits have a lot in common. A security audit can be just on configuration\/standards\/procedures\/compliance level or a full technical security audit. In a technical audit a lot of the tools needed are the same as in penetration testing, but usually the exploatation phase (exploiting the vulnerability) is omitted, whereas in pen test it&#8217;s usually executed (depending on the <em>rules of engagement<\/em>).<\/p>\n<p><strong>References<\/strong><\/p>\n<ul>\n<li>Certified BS7799-2 internal auditor<\/li>\n<li>Completed <a href=\"http:\/\/www.sans.org\/training\/description.php?tid=418\" target=\"_blank\">SANS Auditing Networks, Perimeters &amp; Systems<\/a><\/li>\n<li>Completed <a href=\"http:\/\/www.sans.org\/training\/description.php?tid=1717\" target=\"_blank\">SANS Network Penetration Testing and Ethical Hacking<\/a><\/li>\n<\/ul>\n<h3><a name=\"IR\"><\/a>Incident response<\/h3>\n<p>In case of a potential security incident it is crucial to respond to it according to the organization&#8217;s <em><strong>incident response policy<\/strong><\/em> and in a way that doesn&#8217;t destroy any evidence (or at least minimizes it). Often organizations start thinking about that after an incident has already occurred. Nevertheless, even without an IR policy, a skilled professional can ensure that the event is dealt with in the most appropriate way..<\/p>\n<p><strong>References<\/strong><\/p>\n<ul>\n<li>Completed <a href=\"http:\/\/www.sans.org\/training\/description.php?tid=510\" target=\"_blank\">SANS Intrusion Detection In-Depth<\/a><\/li>\n<li><a href=\"http:\/\/giac.org\/\" target=\"_blank\">GIAC<\/a> certified system forensic analyst &#8211; <a href=\"http:\/\/www.giac.org\/certified_professionals\/listing\/gcfa_100_192.php#a162\" target=\"_blank\">GCFA<\/a><\/li>\n<li>Completed <a href=\"http:\/\/www.sans.org\/training\/description.php?tid=418\" target=\"_blank\">SANS Auditing Networks, Perimeters &amp; Systems<\/a><\/li>\n<\/ul>\n<h3><a name=\"fw\"><\/a>Firewalls and IDS<\/h3>\n<p>Though there are many types and brands of firewalls, their basic principles are the same. We focus primarily on <a href=\"http:\/\/www.juniper.net\/products_and_services\/security.html\" target=\"_blank\">Juniper Netscreen<\/a> family of firewalls, though we have experience also in various other products. We can also analyze and audit your <em>ruleset<\/em> or make a security assessment. We also support <a href=\"http:\/\/www.snort.org\/\" target=\"_blank\">Snort IDS<\/a> systems.<\/p>\n<p><strong>References<\/strong><\/p>\n<ul>\n<li>Completed\u00a0 <a href=\"http:\/\/www.sans.org\/training\/description.php?mid=937\" target=\"_blank\">SANS Network Penetration Testing and Ethical Hacking<\/a><\/li>\n<li>Completed <a href=\"http:\/\/www.sans.org\/training\/description.php?tid=510\" target=\"_blank\">SANS Intrusion Detection In-Depth<\/a><\/li>\n<li>Completed <a href=\"http:\/\/www.sans.org\/training\/description.php?tid=418\" target=\"_blank\">SANS Auditing Networks, Perimeters &amp; Systems<\/a><\/li>\n<li>extensive experience with\u00a0 <a href=\"http:\/\/www.juniper.net\/products_and_services\/security.html\" target=\"_blank\">Juniper Netscreen (ScreenOS)<\/a> systems<\/li>\n<\/ul>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>digital forensics penetration testing security audits incident response firewalls and IDS Digital forensics Digital forensics is a procedure to collect and analyze digital evidence from storage media. The aim is to reconstruct past events and\/or recover lost or hidden content. Understanding of the methodology and tools is cruicial for succesful investigation. The evidence has to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":5,"menu_order":1,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.forensis.si\/en\/wp-json\/wp\/v2\/pages\/13"}],"collection":[{"href":"https:\/\/www.forensis.si\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forensis.si\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forensis.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forensis.si\/en\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":1,"href":"https:\/\/www.forensis.si\/en\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":143,"href":"https:\/\/www.forensis.si\/en\/wp-json\/wp\/v2\/pages\/13\/revisions\/143"}],"up":[{"embeddable":true,"href":"https:\/\/www.forensis.si\/en\/wp-json\/wp\/v2\/pages\/5"}],"wp:attachment":[{"href":"https:\/\/www.forensis.si\/en\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}