new approach
play

New Approach Recovering to Internet Security damage due to a - PowerPoint PPT Presentation

New Approach Recovering to Internet Security damage due to a cyber attack costs from Hacktrophy is a modern way to test the https://hacktrophy.com/en/internet-security/ 31 000 to 9.5 mil.


  1. New Approach Recovering to Internet Security damage due to a cyber attack costs from Hacktrophy is a modern way to test the https://hacktrophy.com/en/internet-security/ € 31 000 to € 9.5 mil. https://media.kaspersky.com/pdf/it-risks-survey-report-cost-of-security-breaches.pdf security of your webs or applications https://hacktrophy.com/en/internet-security/ https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf depending on the size effectively through so-called bug bounty & segment of your programs. With a large number of ethical company and the hackers, you will discover security type of attack. vulnerabilities in a time and secure sensitive data before it can be misused. https://hacktrophy.com/en/

  2. Why should you care about IT security? There is 86 % chance that your The average cost of a data breach is website contains at least one critical $1.3 million for enterprises and https://www.csoonline.com/article/3227065/security/cyber-attacks-cost-us-enterprises-13-million-on-average-in-2017.html vulnerability. Every day, black-hat $117,000 for small and medium-sized http://www.breachlevelindex.com/ hackers steal about 5 million sensitive businesses (SMBs). records all around the world. Almost 2/3 of small and Since May 2018, companies failing to medium-sized businesses comply with the rules of the new https://keepersecurity.com/assets/pdf/2017-Cybersecurity-SMB-Infographi.pdf reported a cyber attack in 2017 , personal data protection directive https://www.eugdpr.org/ and 54% of such businesses were (GDPR) might be fined up to EUR 20 the victims of the sensitive million or 4% of annual turnover. data theft.

  3. What are the possible consequences of a successful hacker attack on your website? 86% of websites The theft and misuse of Long-term reputation company and customer data damage contain at least one critical vulnerability and a large number of smaller Cost of repairing damage Loss of customers on the hacked website bugs through which black-hat hackers can steal corporate data or misuse your A challenging Fines from state authorities recovery process for the and business partners infrastructure. website or application Cost of crisis communication PR

  4. Black-hat hacker attacks present an everyday reality Bad hackers attacked the UK TalkTalk operator system Russian websites of Rambler.ru and VK.com have https://thehackernews.com/2016/06/vk-com-data-breach.html https://www.theguardian.com/business/2016/oct/05/talktalk-hit-with-record-400k-fine-over-cyber-attack https://thehackernews.com/2016/09/russias-largest-portal-hacked-nearly.html and, thanks to a simple SQL Injection, stole data of become targets of hackers who stole data from 100 150,000 customers, including 15,000 payment data. The million users from each server due to security operator had to pay a fine of 400,000 £ (€ 445,000) and vulnerabilities. All 200 million accounts were then sold 3 1 suffered a loss of reputation. over the Internet. https://thehackernews.com/2017/05/zomato-data-breach.html Zomato – the restaurant search and rating service At the end of 2016, the black-hat hacker attacked http://www.dailymotion.com became a target of a hacker attack in 2017. Dailymotion servers due to lack of security The black-hat hacker stole e-mails and passwords of 17 and gained 85.2 million users’ unique email addresses . million users from its servers, and was selling themonline The reputation of server was damaged and some part of 2 4 for $ 1,000 . The company has suffered great damage clients has probably never come back. to reputation.

  5. Hacktrophy will increase Bug bounty programs your IT security are effective prevention against hacker attacks Procedure is simple – you will advertise a reward for finding of vulnerabilities in your applications via Hacktrophy. Registered ethical hackers will do their best to find them before they could be misused. The reward will be paid only for real security vulnerabilities. Testing is done in such a way that it does not endanger the normal operation of the website (e.g. via your test account or in the test environment).

  6. How does Hacktrophy work? 1 2 3 4 5 6 We will help you Ethical hackers As soon as We will examine We will pay the Ethical hackers determine will start testing they find whether it is a hacker from the will look for where and what your application vulnerability, relevant money in the other should ethical or website. they will report it vulnerability. If package you vulnerabilities hackers look for, to you. so, we will have purchased. until there is the and also set the accept a report credit in your right rewards for and you will fix package. them. the problem.

  7. The benefits of Hacktrophy bug bounty programme Long-term safety Cost effectiveness Variety of testers testing and delivery quality from around the world Ethical hackers test your website You pay only for the vulnerabilities Your online product or service is tested or app throughout the year, or until that are actually in the system, they are by tens of hundreds of security experts, there is credit in your prepaid package. reviewed by our moderator and meet so-called ethical hackers. the requirements of your program. Testing is under your Testers’ expertise Manual testing and control verification You determine what an ethical hacker The skills of ethical hackers in the field Your security is tested by real people can test, in what environment (test of IT security testing are more extensive with unique knowledge, not automated or production) and into what depth of than of regular IT staff. robots or scans. your system.

  8. What can you test through Hacktrophy? Any web, application, or interface available over the Internet: websites that work with sensitive data from you or your clients, e-shops, betting portals, online marketplaces, CMS kernels, CRM and accounting systems, cloud, IoT solutions, mobile apps or games, Internet banking, crypto currency markets and payment gateways, business or industrial systems that are connected to the Internet. It is possible to test not only the errors caused by the programming or software used, but also the setting of the infrastructure on which the web or the application are running. Testing can take place in production or test environments.

  9. Security testing process Vulnerability Verification report BUG BOUNTY Application Start of the Vulnerability The reward of the - the process BB programme report development, for hacker vulnerability continues PROGRAM web HACKTROPHY development Internal security (Penetration Web & app Vulnerability Vulnerability Update of Vulnerability testing test) publishing was found fix web or app was found by hacker by hacker, etc. Level of security with bug bounty program Application SECURITY development, web LEVEL Level of security development without bug bounty program

  10. What do you get from ethical hackers? Preview sample of report of found vulnerability TOP 5 vulnerabilities reported in 2017 via Hacktrophy Specific vulnerabilities (10,35 %) Vulnerabilities not found in OWASP TOP 10 ratings, but poses a high risk of attack. SPF configuration problems (5,52 %) Error in the email server settings that allows you to perform email spoofing. XSS (4,83 %) It represents the possibility of inserting malicious code into a website for the purpose of its subsequent use on the terminal devices of visitors to the theft of sensitive data. CSRF (4,16 %) An attack that allows a user to open a site containing a malicious request. This can lead to identity theft or sensitive user data. Session fixation (4,16 %) This is an attack that allows an attacker to steal a valid session of the user, which is then redirected to the attacker's server.

  11. Comparison of penetration tests and Hacktrophy PENETRATION TEST HACKTROPHY High. A large group of ethical hackers Low. One or several ethical hackers for Time without a time limit. You only pay for limited time. results. Low. You will be given a moderator to Medium. It is quite difficult to submit a help you with the setting of bug Effort task. Final report is the priority. bounty project. You are continuously getting verified vulnerability reports. High. Several hackers mean various High. Depending on quality of pen-test Quality of found vulnerabilities types of experiences and forms of provider. hacking. Medium. Hacktrophy will advise you High. Consultants are expensive and with all the rewards. You pay only for Expenses/vulnerability their time is limited. verified vulnerabilities. https://hacktrophy.com/en/pentests-vs-bug-bounty-programs-comparison/ You can find a detailed comparison in our blog

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend