{"id":1569,"date":"2022-05-11T11:33:43","date_gmt":"2022-05-11T08:33:43","guid":{"rendered":"https:\/\/avestim.com\/servicii\/securitate-cibernica-pentesting\/"},"modified":"2022-05-24T10:49:23","modified_gmt":"2022-05-24T07:49:23","slug":"securitate-cibernica-pentesting","status":"publish","type":"page","link":"https:\/\/avestim.com\/ro\/servicii\/securitate-cibernica-pentesting\/","title":{"rendered":"SECURITATE CIBERNIC\u0102 \/ PENTESTING"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1569\" class=\"elementor elementor-1569 elementor-1028\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aaca39f elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"aaca39f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-71d8944\" data-id=\"71d8944\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f1a18e elementor--h-position-left elementor--v-position-middle elementor-pagination-position-inside elementor-widget elementor-widget-slides\" data-id=\"8f1a18e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;dots&quot;,&quot;autoplay_speed&quot;:100000,&quot;transition_speed&quot;:1000,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition&quot;:&quot;slide&quot;}\" data-widget_type=\"slides.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"fadeInUp\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-c13e9e8 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">Securitate cibernetica<\/div><div class=\"elementor-slide-description\">Securitatea cibernetic\u0103 este aplicarea tehnologiilor \u0219i proceselor cu scopul de a proteja sistemele, re\u021belele,dispozitivele \u0219i datele de atacurile cibernetice. Scopul principal este reducerea riscului reprezentat de aceste atacuri, \u0219i protejarea \u00eempotriva exploat\u0103rii neautorizate.<\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-280d9c7\" data-id=\"280d9c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c7fd940 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7fd940\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d40361\" data-id=\"3d40361\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2086b8d elementor-widget elementor-widget-heading\" data-id=\"2086b8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">De ce este important\u0103 securitatea cibernetic\u0103?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-72a6482 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"72a6482\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-fd7ec3f\" data-id=\"fd7ec3f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c5ebaf elementor-widget elementor-widget-heading\" data-id=\"3c5ebaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">-\tAtacurile cibernetice sunt o modalitate de ob\u021binere a unor sume de bani mari<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff5ba71 elementor-widget elementor-widget-text-editor\" data-id=\"ff5ba71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAceste atacuri au \u00een spatele lor motiva\u021bie financiar\u0103 \u00een majoritatea timpului. Stimulentele mai pot fi \u0219i politice, etice sau sociale.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4c6c09b\" data-id=\"4c6c09b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-88f122c elementor-widget elementor-widget-heading\" data-id=\"88f122c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Costurile \u00eenc\u0103lc\u0103rii securit\u0103\u021bii cibernetice sunt \u00een cre\u0219tere.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7145dd6 elementor-widget elementor-widget-text-editor\" data-id=\"7145dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLegile GDPR (general data protection regulation) pot aduce repercusiuni ridicate \u00een urma \u00eenc\u0103lc\u0103rii lor datorit\u0103 unei securit\u0103\u021bi sc\u0103zute. Trebuie luate \u00een considerare \u0219i efectele negative nefinanciare care pot p\u0103ta imaginea unei organiza\u021bii.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-764cb3c\" data-id=\"764cb3c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9cefbc6 elementor-widget elementor-widget-heading\" data-id=\"9cefbc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Atacurile cibernetice devin din ce \u00een ce mai sofisticate<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-311dabb elementor-widget elementor-widget-text-editor\" data-id=\"311dabb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAceste atacuri au un nivel de dezvoltare foarte rapid, f\u0103c\u00e2nd dificil\u0103 securizarea. Se folosesc tactici avansate, care se extind \u00een varietate.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b02470d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b02470d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c86d2e6\" data-id=\"c86d2e6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d552a15 elementor-widget elementor-widget-heading\" data-id=\"d552a15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Etapele noastre de lucru \u00een securizare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1577a0e elementor-widget elementor-widget-heading\" data-id=\"1577a0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">1.Testarea perimetrului re\u021belei<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707ddad elementor-widget elementor-widget-text-editor\" data-id=\"707ddad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tO prim\u0103 etap\u0103 foarte important\u0103, \u00een care hackerii etici au ca scop descoperirea informa\u021biilor care pot fi ob\u021binute de poten\u021bialii atacatori. Se aduc la suprafa\u021b\u0103 \u0219i amenin\u021b\u0103ri interne precum clien\u021bi nesatisf\u0103cu\u021bi, furnizori, parteneri sau chiar angaja\u021bi.\r\n\r\nPentru a \u00een\u021belege gravitatea unui atac, v\u0103 prezent\u0103m cateva exemple de elemente pe care le putem revela :\r\n<ul>\r\n \t<li>Detalii despre companie<\/li>\r\n \t<li>Baze de date ob\u021biune ilegal<\/li>\r\n \t<li>Informa\u021bii personale \u0219i de contact ale angaja\u021bilor \u0219i ale liderilor firmei<\/li>\r\n \t<li>Informa\u021bii expuse public despre companie, precum nume de domenii sau adrese IP<\/li>\r\n \t<li>Posibilitatea captur\u0103rii datelor \u00een timp ce ele circul\u0103 prin re\u021bea<\/li>\r\n \t<li>Documentarea componentelor re\u021belei \u0219i segmentarea ei<\/li>\r\n<\/ul>\r\nPentru a analiza poten\u021bialul acestor atacuri, se scaneaz\u0103 complet vulnerabilit\u0103\u021bile, se filtreaz\u0103 rezultatele, \u0219i se creeaz\u0103 o simulare a scenariului \u00een caz de atac.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be60b71 elementor-widget elementor-widget-heading\" data-id=\"be60b71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">2.\tPentesting pentru aplica\u021bii<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61c9f01 elementor-widget elementor-widget-text-editor\" data-id=\"61c9f01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWeb:\r\n\r\nOdat\u0103 cu cre\u0219terea aplica\u021biilor utilizate, riscul de atac cre\u0219te \u0219i el. De aceea, este important s\u0103 detect\u0103m vulnerabilit\u0103\u021bile pe care le au prin folosirea unui audit de securitate.\r\n\r\nAcest pas necesit\u0103 mult\u0103 minu\u021biozitate, a\u0219a c\u0103 facem o revizuire a codului am\u0103nun\u021bit\u0103. Astfel identific\u0103m exact pa\u0219ii necesari pentru a \u00eembun\u0103t\u0103\u021bi codul pentru a preveni orice atac de securitate.\r\n\r\nO astfel de analiz\u0103 este critic\u0103 \u00een prevenirea accesului atacatorilor, care pot face ca \u021bint\u0103 informa\u021biile confiden\u021biale ale companiei, pe care ulterior le poate expune public.\r\n\r\nProbleme care pot ap\u0103rea \u00een aplica\u021biile web:\r\n<ul>\r\n \t<li>SQL injection<\/li>\r\n \t<li>Cross-site scripting<\/li>\r\n \t<li>Criptare slab\u0103<\/li>\r\n \t<li>Autentificare neprotejat\u0103<\/li>\r\n<\/ul>\r\n&nbsp;\r\n\r\nMobile:\r\n\r\n\u00cen procesul de pentesting viz\u0103m \u0219i dispozitivele mobile, \u00een special aplica\u021biile utilizate \u00een companie. Testarea este la fel de riguroas\u0103, pun\u00e2nd sub minu\u021bioas\u0103 aten\u021bie toate aplica\u021biile, at\u00e2t cele folosite des, c\u00e2t \u0219i cele mai rar accesate.\r\n\r\nFacem ca \u0219i obiectiv principal educarea clientului \u00een domeniul securit\u0103\u021bii. Este esen\u021bial s\u0103 recunoasc\u0103 riscurile la care se supune c\u00e2nd introduce dispozitive mobile \u00een afacerea sa. \u00cempreun\u0103 putem g\u0103si solu\u021bii pentru o protec\u021bie c\u00e2t mai eficient\u0103.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e216789 elementor-widget elementor-widget-heading\" data-id=\"e216789\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">3.\tPentesting pentru re\u021bele wireless<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ab7da3 elementor-widget elementor-widget-text-editor\" data-id=\"2ab7da3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tUn alt domeniu vulnerabil sunt re\u021belele wireless, de care ne ocup\u0103m la orice pentesting. Dorim s\u0103 \u0219tim c\u00e2t de sigure sunt, acest lucru fiind explicat clientului \u00eempreun\u0103 cu prezentarea rezultatelor analizei \u0219i a indica\u021biilor.\r\n\r\nOrice sistem conectat prin wireless va primi aceea\u0219i analiz\u0103 pentru a cunoa\u0219te siguran\u021ba lor c\u00e2nd tranziteaz\u0103 aceste re\u021bele.\r\n\r\nO vulnerabilitate este dat\u0103 de folosirea unei re\u021bele wireless nesigure de c\u0103tre un angajat pe telefonul dat de firm\u0103, sau o configurare incorect\u0103 a re\u021belei, care poate permite atacatorilor s\u0103 acceseze re\u021beaua wireless de la distan\u021b\u0103 considerabil\u0103.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d51751 elementor-widget elementor-widget-heading\" data-id=\"2d51751\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">4.\tPentesting pentru IoT<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07856c9 elementor-widget elementor-widget-text-editor\" data-id=\"07856c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDispozitivele IoT &#8211; Internet of Things sunt folosite \u00een cadrul firmelor \u0219i includ senzori, software, elemente care sunt conectate constant \u0219i fac schimb de date. Este foarte important s\u0103 determin\u0103m nivelul lor de siguran\u021b\u0103, \u0219i dac\u0103 datele pot parcurge aceste sisteme \u00eentr-un mod privat \u0219i sigur.\r\n\r\nEvaluarea acestor dispozitive include:\r\n<ul>\r\n \t<li>Exploatarea firmware, care este integrat<\/li>\r\n \t<li>Controlarea dispozitivelor inject\u00e2nd comenzi r\u0103u inten\u021bionate<\/li>\r\n \t<li>Modificarea datelor trimise de aceste dispozitive<\/li>\r\n<\/ul>\r\nCe dorim s\u0103 ob\u021binem este \u00een\u021belegerea standardului de securitate al companiei, si verificarea legi\u021bimit\u0103\u021bii informa\u021biei \u0219i comenzilor emise de c\u0103tre aceste dispozitive.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dd20eb elementor-widget elementor-widget-heading\" data-id=\"2dd20eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">5.\tTestarea capacit\u0103\u021bii de a face fa\u021b\u0103 la atacuri DDoS \u0219i DoS<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8631c4e elementor-widget elementor-widget-text-editor\" data-id=\"8631c4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAtacurile DDoS \u0219i DoS sunt menite s\u0103 dezactiveze m\u0103suri de securitate \u0219i s\u0103 pun\u0103 offline site-uri folosite de un num\u0103r crescut de popula\u021bie.\r\n\r\nAstfel, ca parte din pentesting, verific\u0103m dac\u0103 re\u021beaua \u0219i componentele dumneavoastr\u0103 fac fa\u021b\u0103 unor astfel de atacuri. De asemenea, evalu\u0103m m\u0103surile \u0219i solu\u021biile anti-DDoS, pentru a vedea dac\u0103 rezist\u0103 arhitectura re\u021belei la o asemenea suprasolicitare.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ed1979 elementor-widget elementor-widget-heading\" data-id=\"2ed1979\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">6.\tPentesting pentru PCI DSS<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2532fd elementor-widget elementor-widget-text-editor\" data-id=\"b2532fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tPayment Card Industry Data Security Standard a fost creat pentru a asigura securitatea la m\u0103car un nivel al cardurilor folosite de c\u0103tre clien\u021bi. Se \u00een\u021belege de la sine importan\u021ba test\u0103rii vulnerabilit\u0103\u021bilor \u00een acest caz. Exper\u021bii no\u0219tri \u00een securitatea simuleaz\u0103 atacuri pentru exploatarea vulnerabilit\u0103\u021bilor care sunt omise de uneltele automate uneori.\r\n\r\nDatorit\u0103 atacurilor frecvente de acest fel, au fost necesare contexte legale care pun sub obliga\u021bia realiz\u0103rilor de pentesting toate firmele care lucreaz\u0103 cu date de pe carduri m\u0103car o dat\u0103, sau de dou\u0103 ori pe an. Test\u0103rile de acest fel pot fi Segmentation Testing, evaluarea vulnerabilit\u0103\u021bilor \u0219i penetration testing.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-319363f elementor-widget elementor-widget-heading\" data-id=\"319363f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">7.\tPentesting pentru Norma 4\/ASF 2018<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53334a7 elementor-widget elementor-widget-text-editor\" data-id=\"53334a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tPrescurtarea de ASF vine de la Autoritatea de Supraveghere Financiar\u0103. Au creat o reglementarea care prevede obliga\u021bia firmelor de asigur\u0103ri de a face pentesting pentru a confirma utilizarea corect\u0103 a normelor de securitate.\r\n\r\nDe\u021binem cuno\u0219tin\u021bele \u0219i preg\u0103tirea necesare pentru a oferi servicii de securitate cibernetic\u0103. Acestea pot fi:\r\n<ul>\r\n \t<li>Planuri pentru recuperarea \u00een urma atacurilor, \u0219i \u00eembun\u0103t\u0103\u021birea securit\u0103\u021bii \u0219i func\u021bionalit\u0103\u021bii<\/li>\r\n \t<li>Monitorizare 24\/7\/365 pentru a asigura, urm\u0103ri \u0219i identifica atacurile \u00een mod eficient.<\/li>\r\n \t<li>Planuri de prevenire a pierderii \u0219i scurgerii de date<\/li>\r\n \t<li>Evalu\u0103ri de risc<\/li>\r\n \t<li>Management al riscului<\/li>\r\n \t<li>\u00cembun\u0103t\u0103\u021birea \u0219i crearea proceselor pentru a asigura c\u0103 organiza\u021bia respect\u0103 standardele de securitate cibernetic\u0103<\/li>\r\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8d3ef99 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8d3ef99\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a1b7d52\" data-id=\"a1b7d52\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06436b6 elementor-widget elementor-widget-heading\" data-id=\"06436b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Servicii<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ad35e61 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ad35e61\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-575a2f8\" data-id=\"575a2f8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e1b748b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e1b748b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/avestim.com\/ro\/servicii\/dezvoltare-hardware\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/avestim.com\/wp-content\/uploads\/2022\/05\/Vector-1-1.png\" class=\"attachment-full size-full wp-image-1443\" alt=\"\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"https:\/\/avestim.com\/ro\/servicii\/dezvoltare-hardware\/\">Dezvoltare <br>Hardware<\/a><\/h3><p class=\"elementor-image-box-description\">\u00cen acest segment de tehnologie, ne baz\u0103m pe construc\u021bia propriu-zis\u0103 a prototipurilor pentru securitate. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87e287d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"87e287d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/avestim.com\/ro\/servicii\/dezvoltare-hardware\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Detalii<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-316134a\" data-id=\"316134a\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dac8fcd elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"dac8fcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/avestim.com\/ro\/servicii\/retele-si-robotica\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"110\" height=\"100\" src=\"https:\/\/avestim.com\/wp-content\/uploads\/2022\/05\/Vector-2.png\" class=\"attachment-full size-full wp-image-1442\" alt=\"\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"https:\/\/avestim.com\/ro\/servicii\/retele-si-robotica\/\">Re\u021bele \u0219i robotic\u0103<\/a><\/h3><p class=\"elementor-image-box-description\">Compania noastra ofera servicii de gestionare a parcarii interioare sau stradale. Acest lucru este esen\u021bial, av\u00e2nd \u00een vedere cre\u0219terea constant\u0103 a num\u0103rului de ma\u0219ini care necesit\u0103 o logistic\u0103 bine dezvoltat\u0103. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c189b0 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6c189b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/avestim.com\/ro\/servicii\/retele-si-robotica\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Detalii<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f44f348\" data-id=\"f44f348\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d4814c9 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"d4814c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/avestim.com\/ro\/servicii\/servicii-cloud-personalizate\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/avestim.com\/wp-content\/uploads\/2022\/05\/Vector-3.png\" class=\"attachment-full size-full wp-image-1441\" alt=\"\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"https:\/\/avestim.com\/ro\/servicii\/servicii-cloud-personalizate\/\">Servicii cloud<br> personalizate<\/a><\/h3><p class=\"elementor-image-box-description\">Compania noastra ofera servere cloud, personalizate cu securitate inclusa si solutii de backup pentru atacuri cibernetice.Cum func\u021bioneaz\u0103 serviciile cloud?<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c90f55 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8c90f55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/avestim.com\/ro\/servicii\/servicii-cloud-personalizate\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Detalii<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Securitate ciberneticaSecuritatea cibernetic\u0103 este aplicarea tehnologiilor \u0219i proceselor cu scopul de a proteja sistemele, re\u021belele,dispozitivele \u0219i datele de atacurile cibernetice. Scopul principal este reducerea riscului reprezentat de aceste atacuri, \u0219i protejarea \u00eempotriva exploat\u0103rii neautorizate. De ce este important\u0103 securitatea cibernetic\u0103? &#8211; Atacurile cibernetice sunt o modalitate de ob\u021binere a unor sume de bani mari Aceste [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1565,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"disabled","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1569","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/pages\/1569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/comments?post=1569"}],"version-history":[{"count":7,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/pages\/1569\/revisions"}],"predecessor-version":[{"id":1772,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/pages\/1569\/revisions\/1772"}],"up":[{"embeddable":true,"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/pages\/1565"}],"wp:attachment":[{"href":"https:\/\/avestim.com\/ro\/wp-json\/wp\/v2\/media?parent=1569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}