Thursday November 21, 2024

The following are the services offered or intended for offer by the NCC Computer Security Incidence Response Team, classified into Proactive, Reactive and Security Quality Management services.

Service Available Service Upcoming

 

Proactive
Services

Proactive services are for the detection and prevention of security attacks before there is an impact on production systems. Information under this category of services is provided by the CSIRT for dissemination to the constituency and the CSIRT's partners to prevent them from being the target of attacks, and protecting their assets.

  • Announcements: This comprises, but is not limited to, intrusion alerts, vulnerability warnings and security advisories. Such alerts notify constituents about new developments with the potential for impact on their systems' security, such as newly found vulnerabilities or intruder tools. Announcements enable constituents to safeguard their systems and networks against recently found problems before they can be exploited.
  • Technology Watch: Technology Watch identifies emerging developments in technology in terms of their potential impact on security applications as enhancements or threats and provides advice for the development of policies and strategies in response.
  • Security Audits / Penetration Test: This is the testing of systems and data using penetration tools, tactics and techniques to test system vulnerabilities and security measures deployed to safeguard information assets.
  • Tools Development: Refers to the creation of software and hardware tools for detecting, monitoring, preventing and defending against attacks.
  • Intrusion Detection: Technologies that function based on information gathered from individual systems or a network to detect attacks, particularly at the outer perimeter.
  • Threat Intelligence Sharing: The sharing of any information that can help an organization recognize, evaluate, detect, and acknowledge cyber threats. Threat information sharing includes the announcements and identifying the indicators of compromise; tactics, techniques, and course of action used by threat actors; Suggested actions to monitor, restrain, or prevent attacks; and the data from the analyses of incidents. Organizations that share cyber threat information can enhance their own security positions as well as those of other organizations.