Rashaduzzaman Rakib's profile

What should be the first step for a cyber attack

What should be the first step for a cyber attack victim?
There has been a 350% surge in cyber crime cases registered in India*. From crude phishing emails to sophisticated malware attacks, the thefts are designed to steal private data or disrupt access to your systems Factors like high-speed internet connectivity, increase in smartphones usage, and lack of awareness about Internet security often play a role in consumers falling prey to cyber criminals. While it is advisable to be safe and secure, it is equally important to know what to do when you become a victim of cyber crime. Here are some ACTions you should take to minimise the risk.

1. Disconnect and Detach In case of an ongoing attack on your computer or IT infrastructure, your first step should be to disconnect the device from the Internet as this is the most effective way to prevent further loss of data In case of cyber bullying or cyber stalking, one should simply step away from the screen before proceeding to initiate legal action.




Hello Sir/Madam
In today's time there is no alternative to information technology security as we all depend on it.A small mistake can put our valuable data in the hands of hackers.So we need to build a security of network one step ahead of hackers.As a result, unlike newly discovered vulnerabilities, there is no substitute for regular penetration testing.

What does this service include?

Pre Testing Period
In this step I will do the footprinting and reconnaissance ur given ip and domain.
If any vulnerabilities and vulnerable ports and files are found according to the information received,it will be given to you in the form of a report later.

Testing Preiod

The last top 10 vulnerabilities disclosed by OWASP will be manually checked step by step according to the package.
Example
Broken Access,SQL Injection,CSRF,SSRF,Insecure design,Misconfiguaration and etc.
After that, An additional 5 more vulnerabilities will be tested.

After Testing period
If a bug is found after completing the above mentioned process, its video, written description and troubleshooting instructions will be provided within 5 days.

Thanks for putting me on your thoughtful favorites list on Penetration Testers.
What should be the first step for a cyber attack
Published:

What should be the first step for a cyber attack

Published:

Creative Fields