Answers to Your Questions
To save you time, we've compiled the answers to the most commonly asked questions about our business and the services we offer. Want more information? Send us an email and we would be happy to answer any additional questions you might have.
Why choose Coded Concept Consulting?
We're a cyber security company dedicated to proactively reducing data breaches from insider and external attacks against an organization or individual. We deliver a unique competitive advantage to reveal critical security vulnerabilities before real world attackers exploit them and compromise your data.
Our real world experience along with our academic and professional backgrounds enable us to deliver a simulated real world Black Hat-hacker attack. We'll show you where your cyber security vulnerabilities are and provide feedback and training to reduce the risks of being compromised moving forward.
Working with us means working with a group of talented individuals who are extremely passionate about IT security. We provide exceptional customer service and pride ourselves in securing your data but also educating you along the way on how to better protect yourself from threats in the future.
.
This truly depends on you, the client. Clients who require a full organizational assessment will differ in price from the CEO who wants education and training on how to protect themselves against modern day cyber attacks.
Price is determined on the amount of work required and is tailored to each specific request. Hourly rates apply and can be discussed upon contacting us at info@codedconcept.ca.
This depends on the nature of the job. Each contract is assessed and discussed in person prior to starting any work. Target scope and rules of engagement are agreed upon before beginning. Upon contacting us with your request, a consultant will schedule a time that is convenient for you to discuss your goals and objectives before proceeding. Most agreements are billed on an hourly basis (min 4 hours).
Meeting with a consultant in person also allows for the signing of liability waivers and non-disclosure agreements (NDA) as required.
This is a controlled simulated external hack or cyber warfare attack.
A black box test requires no previous information and takes the approach of an uninformed attacker. In a black box penetration test, the tester has no previous information about the target system.
The benefits of a black box test are:
> It simulates a real cyber attack (in a controlled environment of course).
The disadvantages of a black box penetration test are:
> Some areas of the infrastructure might not be tested.
White box testing refers to an approach where the tester already has all the necessary knowledge about the target system and doesn't necessarily need to perform anything as the whole system is mapped out and given to him/her before hand. An example would be the source code to a web application is provided to the tester before hand. The goal of a white box test is to provide as much information as possible to the tester so that they have everything they need to perform the test thoroughly.
Black box testing VS White box penetration testing
White box testing has some benefits:
> Thorough and deep testing of the internal network
> Helps to maximize the time spent on testing as a blueprint is provided
However, there are also some disadvantages:
> It's a non-realistic attack. This means the tester is not in the same position as an attacker as the tester would have all pertinent information beforehand. Both think very differently when approaching a problem.
When deciding on which test to choose there is no right or wrong answer and choosing black box over white box testing varies from client to client. In the end it depends on what requires testing.
In using black box testing, we are able to demonstrate how an uninformed attacker gathers all vital information when performing an attack. The knowledge of how and why they do things can assist with mitigating and protecting your organization. See here for more information.
Yes, we do!
Training for IT Professionals
We offer training using the latest techniques, tools, and knowledge surrounding Black Hat attacks to keep your IT team's knowledge on attacked up to date so they can use that information to protect you or your brand.
Training for Individuals/CEO/High Profile Clients
We offer a comprehensive training program to identify threats, attacks, social engineering attempts and other malicious cyber attacks against you and your data.
In order to protect yourself, it's important to remain as anonymous as possible while surfing the web. Hackers are often target embarrassing photos, videos, or e-mails that can be used against you for blackmailing purposes or political reasons. We offer training on how to remain completely anonymous while online in order to stay off the grid and out of prying eyes.