Security Audit and Assessment Service $350.00 – $500.00 - $750.00
Includes a 6-month check in
Service Description:
- Audit and Forensics
- Identify overall scope
- Network mapping of all components, systems, devices, and network protocols
- Outdated firmware and applications (patched versus unpatched)
- Analyze network traffic logs to identify any suspicious activity
- Network Penetration testing
- Router placement
- Access to components, systems, devices, and network protocols (open ports)
- Browser security testing for safe surfing
- Vulnerability scans
- Intrusion detection (Device Review on Network)
- Email data breach (resources to Check URL’s authenticity)
- Vulnerability ranking (Common Vulnerability Scoring System Version 4.0 Calculator (first.org))
Low 0.1 - 3.9 High 7.0 - 8.9
Medium 4.0 - 6.9 Critical 9.0 - 10.0
- Firewall configuration
- Pod extenders (with Internet provider/3rd Party)
- Mesh Wifi systems (Orbi/Eero)
- Supplemental routers (NetGear/Cisco)
- Implement security best practices
- Password management (Dashlane/Norton 360)
- Strong & Unique Passwords
- Network segmentation (SUBNET MASKING)
- Privacy protection – blocking online trackers
- PRIVATE Browsing applications
- Wifi Encrytion
- Network monitoring for suspicious activity (smartphone app depending on Provider)
- Intrusion protection systems
- Parental controls
- Secure VPN
Output and Deliverable
- Finding report and recommendations
- Develop a complete remediation plan
- Evaluate device usage and value of importance on your network
- Backup and Recovery options
Security Audit and Assessment
To assess your network's security score (and/or vulnerability level), we would perform a network security audit which involves identifying potential vulnerabilities, in verifying all devices connected, review traffic logs and assessing the overall security of your network. This may involve running network scanning tools, reviewing firewall logs, and checking for any security patches or firmware updates that need to be applied.
Performing a network security audit involves several steps. Here are the general guidelines our program adheres to:
Audit and Forensics:
- Identify the scope: Determine the scope of your audit, including the devices and systems that you want to include in your assessment.
- Map your network: Create a map of your network to understand how devices and systems are interconnected.
- Identify potential vulnerabilities and attack vectors: Use vulnerability scanners or manual inspection to identify potential vulnerabilities in your network, such as unpatched software, open ports, weak passwords, and unsecured wireless networks.
- Analyze network traffic: Analyze network traffic logs to identify any suspicious activity or traffic patterns.
Penetration Testing
Simulating cyberattacks on a system, network, or application to identify vulnerabilities that could be exploited by malicious actors.
· Components and Systems
- Web Applications: Websites, web-based platforms, and online portals.
- Mobile Applications: Android, iOS, and other mobile platform apps.
- Desktop Applications: Software installed on PCs, Macs, or other desktop environments.
- Databases: SQL databases, NoSQL databases, data storage systems.
- Cloud Systems: Cloud-based infrastructure, platforms, and software (IaaS, PaaS, SaaS).
- Wireless Networks: Wi-Fi networks, Bluetooth, Zigbee, etc.
· Devices
- Endpoints: Desktops, laptops, mobile devices.
- Network Devices: Routers, switches, firewalls, hubs.
- Wireless Devices: Wi-Fi routers, smart devices, IoT devices.
- Embedded Systems and IoT: Smart TVs, fridges, cameras, home automation systems.
- Servers: Web servers, mail servers, FTP servers, virtual servers.
· Network Protocols
- HTTP/HTTPS: Web traffic.
- FTP: File transfer protocol.
- SMTP/POP3/IMAP: Email services.
- SSH: Secure shell for secure remote logins.
- Telnet: Remote command execution (less secure than SSH).
- DNS: Domain Name System.
- SNMP: Simple Network Management Protocol.
- NetBIOS: Used in older Windows networks.
- LDAP: Directory services.
- oMB/CIFS: Server Message Block/Common Internet File System, used for file sharing.
Enhanced Security Posture:
- Develop a remediation plan: Based on your findings, develop a remediation plan that outlines the steps needed to address any vulnerabilities or weaknesses in your network.
- Implement security best practices: Implement security best practices, such as using strong passwords, keeping software up-to-date, and regularly monitoring your network for suspicious activity.
- Testing your security and security awareness strategy:
- Test your backup and recovery procedures: Test your backup and recovery procedures to ensure that you can quickly recover from a security breach or data loss.
Another important factor in home network vulnerability assessment is education.
It is important to educate yourself and other members of your household about safe online practices, such as using strong passwords, avoiding suspicious emails or links, and keeping software and firmware up-to-date.