ngCERT Reactive services are designed to respond to requests for support from her contituency. These reports are in the form of incidents from the constituency, and any threats or attacks against information systems in the Nigerian cyberspace.
Disseminate information that describes security incidents such as vulnerabilities, intrusion alerts, computer virus, or hoax. Provide any short-term or long term recommended course of action for dealing with the resulting problem. Provide guidance for protecting the systems or recovering any systems that were affected. Notify various parts of the constituencies about the vulnerability and share information on how to fix or mitigate the vulnerability.
Communicate with vendors, other CSIRTs, constituent members, and the individual groups who initially discovered or reported the vulnerability.
Our incident handling services are designed to effectively deter and respond to cyber threats and cybercrime which leverage on an efficient emergency readiness and coordination capability.
Forensic Analysis is the use of controlled and documented analytical and investigative techniques to identify, collect, examine and preserve digital information.
Conducting a forensic investigation and analysis is a key aspect of investigating an information security incident, because data media may contain information which could shed light on the circumstances of the incident, as well as help in identifying the person or group responsible for the breach.
The outcome of the analysis can be presented as evidence. With our experienced and certified forensic investigators, utilising best practices, tools and techniques, we can help you establish the cause of breaches, provide advice and services on mitigation and stand in as expert witnesses in court.
Generally, our forensic services are performed on the following basis;
Other forensic services we can provide include;
Our Vulnerability Coordinating Team collect, analyze, and validate emerging vulnerabilities to common computing platforms. It further provides on-demand vulnerability analysis to our constituencies that will help reduce security risks posed by all sort of vulnerabilities.
Services we provide include;