CyberSecurity Monitoring,Threat Detection & Analysis
Today, all organizations and companies have an active presence in cyberspace and a wide range of their systems and services are publicly available. But since these systems and services are based on a variety of operating systems, web servers, programming languages, email servers and other technologies in this field, any type of vulnerability in these technologies severely exposes the security of services and systems to destructive cyber risks. puts. APA specialized laboratory of Mohaghegh Ardabili University provides monitoring service for many of its customers and as soon as a new vulnerability is released, it adapts it to the customer’s systems, identifies its impact level and provides the necessary solutions to patch it. This service is very critical and keeps the covered organizations safe from serious threats.
Digital Forensics
Forensics is one of the specialized fields of this collection. For example, one of the services under this collection, which is provided by the Maher Center channel, is the real-time monitoring of the centers providing, selling and disclosing leaked information from the government and public systems of the country, which after taking the leaked samples From the hacker or the seller, the authenticity or inauthenticity of the data is checked, and then the source and vulnerability of the system that led to the mentioned data leakage is determined, and the vector of the attacker’s attack on the vulnerable system is determined. It is extracted and finally solutions based on fixing and patching vulnerabilities in the system are presented. In a comprehensive and larger plan, this collection has the ability to provide event log reading and forensic services at three operating system levels (Linux and Windows), web and network.