Back to top
Services
 
 
 
 
Centre for Security
Assurance & Research
Centre for Security Assurance & Research


 IGSS CIRT ALERT
       
       
Computer Incident Response Team (CIRT)
Similar to how a government protects its critical Infrastructure from physical threats, it has now become increasingly important to also protect it from cyber threats. Governments across the world have started to realise that a national approach is needed to combat the growth in cyber threats and the CIRT has become an integral part in several national cybersecurity frameworks.

A CIRT assists partner countries in preventing and handling cyber threats by acting as a single point of contact for reporting secunty incidents as well as providing a platform for information sharing. The CIRT enables monitoring of threats and trends that assist governments in the development of mitigation and response strategies to combat cyber threats.

ITU-IMPACT assists partner countries with CIRT services in three ways:

Capability assessment
Readiness assessment
CIRT Implementation

CIRT CAPABILITY ASSESSMENT
ITU-IMPACT assists the partner country by assessing the capacity and readiness of the national CIRT in identifying, responding and managing cyber threats.

The main objective is to study and evaluate the partner country CIRTs structure and capability to ensure that cybersecurity incidents, intrusion attempts, and emergencies are appropriately managed to levels consistent with industry standards and good business practices.

CIRT READINESS ASSESSMENT
ITU-IMPACT can also assist partner countries in the assessment of its readiness to implement a full-fledged CIRT.
The main objectives are to:

Study and analyse the partner country's current cybersecurity status and needs.
Provide high-level recommendations to improve the cybersecurity posture of the partner country.
Study and suggest institutional and organisational requirements and arrangements for establishing a national CIRT.


NATIONAL CIRT IMPLEMENTATION

If a partner country is ready for a national CIRT, ITU-IMPACT can assist and lead the implementation process with the main objectives of:

Creating and implementing a fully functioning national CIRT to provide its constituents with a basic set of services.
To implement, review and test day-to-day operations on processes and workflow developed for the CIRT.
Engage in CIRT capacity building programmes and train at least three government officials from the partner country on CIRT operation and incident response.
 


VULNERABILITY ASSESSMENT

ITU-IMPACT offers both internal and external vulnerability assessments for partner countries in order to efficiently detect security vulnerabilities and ensure their prompt rectification. This assessment helps partner countries to detect security vulnerabilities across the entire infrastructure before they are breached or exploited by attackers. Key benefits of this assessment include identification of vulnerabilities before potential attacks, help to mitigate damage to infrastructure and data loss, assistance in budgeting and planning to remediate or mitigate identified vulnerabilities, and ensuring compliance with applicable information security laws, mandates and regulations.

PENETRATION TESTING
Penetration testing is the practice of testing a computer system or network to find vulnerabilities that an attacker could exploit. IMPACT provides its clients with two types of penetration testing; internal and external. External penetration testing focuses on identifying and validating vulnerabilities that exist on all Internet-accessible services within an organisation's critical IT infrastructure such as web server, email server, DNS, etc. As for the internal penetration testing, it is a comprehensive security test of all systems related directly and indirectly to a business. It mimics the actions of an actual attacker exploiting weaknesses in network security without the usual danger. The test examines internal IT systems for any weakness that could be used to disrupt the confidentiality, availability, or integrity of the network, thereby allowing the organisation to address each weakness.


WEB APPLICATION ASSESSMENT
Web application penetration testing refers to a set of services used to detect various security issues with web applications to identify known vulnerabilities. The test will cover any web application that is accessible over a network like the Internet or an Intranet.

The main objectives of the assessment are:

To discover vulnerabilities in web application interfaces from an external party browser point of view.
To provide remediation or mitigation of the identified risks, threats and vulnerabilities.

ON-DEMAND WEB APPLICATION SCANNING
The on-demand web application scan is the most accurate and cost effective approach to vulnerability scanning. This proactive on-demand service is cost effective as it eliminates the need for on-premise software solutions and detects vulnerabilities before they are exploited.

The main objectives of the on-demand scan are:

To identify weaknesses and potential vulnerabilities in the partner country's lCT infrastructure in order to determine how secure the system is from theft or damage due to unpatched, weak, or misconfigured security settings.
To proactively address security gaps so that vulnerabilities are promptly rectified before they are exploited.