ICT Ignite - Cyber Security Project
Project scope
Categories
Security (cybersecurity and IT security) Information technologySkills
incident response cyber security incident reporting vulnerabilityThe main goal of this project is to plan, implement, manage, monitor and upgrade security measures for the protection of [insert company here]'s data, systems and networks.
Audit the current Database for SQL injection attacks and Penetration testing to see how robust the backend infra is - that would be a good start. The students can recommend some tools and specific strategies to implement for data security, and Implementing centralized logging using something like Datadog, now there is none in our system.
This will involve several different steps for the learners, including:
- Analysing the existing security measures of [insert company here] and create / offer suggestions for our security policy
- Analyzing networks and systems and assessing areas for improvement
- Researching other security measures that can be implemented
- Review the process for vulnerability testing and help develop any best proactive policies to keep up with the current cybersecurity landscape
- Detecting and analysing any incidents, review incident reporting, and create an incident response plan
A walk through of the product, mentorship time with our engineering team and overall supervision. Zoom meeting of the Introduction of Tweebaa front-end and Backend codings https://us02web.zoom.us/rec/share/d0Q1Az5zATCyk834Ud7jgtfX-IKXBQmd_YcrQdqooXIymFOjduZo-mNuga55EeY.t5gP6hp9LUk8kj2v
Supported causes
No povertyAbout the company
TweeBank is the unprecedented dual system to maintain your fiat value as you stake, while enjoying the highest
growth potential of cryptocurrency. It is the world’s most exclusive Dual System to date providing
the opportunity for you to invest whilst protecting your original stake.
Need to audit the current Database for SQL injection attacks and Penetration testing to see how robust the backend infra is - that would be a good start. The students can recommend some tools and specific strategies to implement for data security