Cyber Security

M11 has an expertise in delivering the following IT Security solutions

CISO Office:

List the responsibilities of CISO as an offering


We work with clients to provide full service platform of CISO office role and responsibilities, with accountability and risk management package.


1. Cyber Intelligence

Find below the list of services that we provide under Cyber Intelligence security services.


Open Source Digital Network Intelligence (OS-DNI) (also known as OSINT++)

  • 1. Social Media
  • 2. Google information analytics
  • 3. Image EXIF Data

Continuous Monitoring
  • 1. Security Background
  • 2. Asset Tracking and Monitoring
  • 3. Target Tracking and Monitoring

Electronic Intelligence (ELINT)
  • 1. Cell-phone monitoring
  • 2. Radio/CB/walkie-talkie monitoring
  • 3. Other RF communications

HUMINT
  • 1. Spear-phishing
  • 2. Social Engineering

Training
  • 1. Creating Consistent Intel Reports
  • 2. Creating Actionable Intel Reports
  • 3. Reading Actionable Intel Reports

2. Active Defense:

Find below the list of services that we provide under defense security services.


Penetration Testing
  • 1. Physical
  • 2. Social
  • 3. Computer – Internet
  • 4. Computer – Close Access
  • 5. PCI Security Audit
  • 6. General web security
  • 7. Database Security
  • 8. Cross Site Scripting

Ethical Hacking
  • 1. Fuzzing
  • 2. Determining if a crash is exploitable
  • 3. 0-day generation
  • 4. Stage 1 installers
  • 5. Stage 2 installers
  • 6. Command and Control Networks

Specialized Testing/ Forensics
  • 1. Cell Phone
  • 2. Wireless (802.11, ZigBee, and others)
  • 3. SCADA

D. Training
  • 1. Customized training for any and all of the above.

Operations Centers (OC)
  • 1. Security Operations Center (SOC)
  • 2. Network Operations Center (NOC)
  • 3. Threat Operations Center (TOC)
  • 4. Mission Operations Center (MOC)
  • 5. Single Point Operations Center (SPOC)

Table Top Exercises
  • 1. Red Force / Blue Force Exercises
  • 2. War Gaming Scenarios

Custom Operations Centers (OC) development
  • 1. Facility
  • 2. Toolsa. Commercial. Custom
  • 3. Training

Managed Security Services
  • 1. Outsourced SOC/NOC
  • 2. Reduced/transferred customer Risk

Specialized
  • 1. Custom Artificial Intelligence Solutions
  • 2. SCADA solutions
  • 3. Social Engineering
  • 4. Operational Security
  • 5. Situational Awareness
  • 6. Behavior Analysis

3. High Assurance

Find below the list of services that we provide under High Assurance security services.

Terms
  • 1. Multi-Level Security (MLS)
  • 2. Mandatory Access Controls (MAC)
  • 3. Trusted Computing (TCS)
  • 4. High Assurance Guard (HAG)
  • 5. Cross-Domain Solutions
  • 6. Data Diode

Standards
  • 1. Rainbow Series (A1 through D)a. Particularly the Orange Book 5200.28-STD “DoD Trusted Computer System Evaluation Criteria
  • 2. Common Criteria (The EAL levels 7 through 1)

Solutions
  • 1. Customized solutions for firewalls
  • 2. Customized solutions for SCADA
  • 3. Customized solutions for cellphones

4. Forensics

Find below the list of services that we provide under Forensics security services.

Training and simulation exercises
  • 1. Police Investigation for Trafficking. Drug. Weapons and Gangs
  • 2. General crime
  • 3. Intel Gathering
  • 4. Planning and on-support

Defense
  • 1. Incident Response
  • 2. Background Investigations
  • 3. Verification of Installation/Configuration