• DTP
  • VR/AR
  • What we do
    • Customer Experience
    • Business Process Optimization
    • Data management
    • Customized App Development
    • Cybersecurity
    • Industry 4.0
  • Expertise
    • Manufacturing
    • Professional Services
    • Information Technology
    • Construction
    • Logistics
    • Health
  • Experience
  • Insights
  • Jobs
  • Contact us
  • Slovenščina
  • DTP
  • VR/AR
  • What we do
  • Experience
  • Insights
  • Jobs
Book a demo
  • Contact us
  • Slovenščina
  • DTP
  • VR/AR
  • What we do
  • Experience
  • Insights
  • Jobs
Book a demo
Insights

A good defense is the best attack against cyber threats

By Alen 

Don't wait idly for the cyber attack on your company to happen...​

The latest research predicts that the damage from cyber-attacks will rise to over $ 6 trillion by the end of 2021. It is no surprise then, that companies are frantically investing in the security of their IT infrastructures.

An efficient IT infrastructure needs multiple layers of security systems that work together to protect the data. In practice, this means that all antivirus, antispyware, firewall, and password and access management applications must operate as a unit. Threats are disguised in various images, malware, virus, phishing, MitM, or so called “zero-day” attacks that invade the system during a security system upgrade. Daily maintenance of IT infrastructure is a time-consuming task where one should take no shortcuts. ​

Our cyber security experts from ANGELIS d.o.o. will help you establish the first and last defense of confidential information.​

Detect vulnerabilities and shortcomings early​

The primary responsibility of every IT security engineer is testing for system weakness to evaluate, reduce, and report potential vulnerabilities. To do this, a program that makes an inventory of all network connected devices is required. An external network scan checks for vulnerabilities in an open firewall door. The internal overview collects data on installed operating systems and applications including the number of open ports and user accounts. After the inventory is completed, each device is checked with a known vulnerabilities database, highlighting which devices are exposed. ​

Vulnerability detection is executed in four stages:

  1. Vulnerability identification – The scan can be performed automatically when a new device is installed or by using timers to set scheduled scan in advance. 
  2. Risk assessment – determines the priority and severity of vulnerabilities and possible solutions for their elimination.
  3. Addressing known vulnerabilities – Upon completing the assessment, the engineer decides to repair and patch the holes or turn off the vulnerable device. In cases of low threat level, the security team may choose to accept/tolerate the existence of a vulnerability.
  4. Report on vulnerabilities and countermeasures.

Offensive cyber security​

The pentest or penetration testing is a simulated cyberattack that exposes vulnerabilities in computer systems.
For example, penetration testing may involve attempting to violate any number of application systems (e.g., application programming interface, frontend/backend servers) to detect vulnerabilities, such as fields without proper validation that are susceptible to code injection attacks.

The pentest or penetration testing is a simulated cyberattack that exposes vulnerabilities in computer systems.

Approaches of pentesting​

The penetration test can be performed using three different approaches:

          1. The white box approach: The penetration testing team works with the company’s IT department with unlimited access to internal resources or data they may need during the test.
          2. The gray-box approach: access to internal resources and data is limited. Some employees in the IT department may not be aware of the penetration test to verify their response.
          3. The black-box approach: no access to internal resources. Only certain employees in the company know about the penetration test to check the response of the IT department and detect countermeasures to the attack.

Pentest consists of five parts:

  1. The test begins with the definition of the test, including its scope, purpose, methods, and data collection (network and domain names, mail server) to better understand the operation of the device and its potential vulnerabilities.

  2. The next step is to observe how the device responds to various tests. Static analysis observes program code and its behavior on simulated attacks. Dynamic analysis scans the program code during device operation, which is more practical as it displays more accurate data.

  3. The third step uses different types of web attacks, SQL injection, scripting between websites, and backdoor to detect vulnerabilities in devices.

  4. The penultimate step is to keep access to the system as long as possible. This simulates threats that remain in the system for months after the initial intrusion.

  5. The test ends with a report on all vulnerabilities, stolen data, and the final time of compromised access to the system.

Penetration testing and threat evaluation together ensure the security of the systems.​

In a time when digitalization is present in all business segments, you cannot afford to fail. The presented methods can protect your computer systems only with the help of IT security engineers who are thoroughly acquainted with the mentioned approaches and can protect the IT infrastructure.

Check our website angelis.agency, and contact our ANGELIS experts for cyber security. Our Certified Ethical Hacker (The Certified Ethical Hacker certification is EC Council’s topmost renowned and demandable credential) will help your company to perform the preventive, helpful, and secured measures to protect the system in an ethical manner.


EXPO 2020
Previous Article
AI digital human
Next Article

We help you on every step of your journey.

Linkedin Facebook Youtube

Latest news

Meet us at EXPO REAL 2023

Meet our team at EXPO REAL 2023 Our company ANGELIS...

Read more

Slovenia

Unec 21
SI-1381 Rakek

  • sl@angelis.agency
  • +386 40 831 350

Germany

Kronstadter Str. 4
DE-81677 München

  • de@angelis.agency
  • +49 157 359 992 86
© 2025 ANGELIS d.o.o. All rights reserved.
Privacy Policy | About Cookies | Terms & Conditions | Privacy Center
Close Popup

We use cookies to give you the best online experience. By agreeing you accept the use of cookies in accordance with our cookie policy.

I accept My Preferences
Privacy Center Cookie Policy
Close Popup
Privacy Settings saved!
Privacy Settings

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. Control your personal Cookie Services here.

Type of cookies Privacy Center Privacy Policy Cookie Policy

Necessary cookies
Cookies that are needed for the normal functioning of our website.
  • wordpress_gdpr_cookies_declined
  • wordpress_gdpr_cookies_allowed
  • wordpress_gdpr_allowed_services

Google Analytics
Cookies that are set by Google Analytics to track website usage.
  • _gid
  • _ga_JFRV9YK8FM
  • _gat_gtag_UA_234467193_1
  • _ga

Decline all services
Save
Accept selected services