Cyber Security methods and approaches
General methods and approaches that are used by our team:
- Device forensics
- Captured traffic forensics
- (D)DoS mitigation/protection
- Network protocol and application of reverse engineering
- Traffic interception / individual tracking in both TCP/IP and SS7/Telecom networks
In order to perform the complex of actions during cyber security providing our team uses such software like Bro, Wireshark, IDA Pro, ollyDBG, gdb, Evermost, FTK.
The game portal had a huge number of automatic content checks. The information derived from scanning was used to get advances in gambling.
Police department of cyber crime investigation needs to get new staff, motivated and professional that will become a core of future team. As well needed some scheme of interviewing and testing of candidates in order to make this process standard for future.