What's new

Turkey - Information Security | News & Information

.
HAVELSAN NET SECURITY AND THREAT MONITORING SERVICES

0903201512464614_a.jpg


Aside from conventional net security solutions such as a firewall (FW), intrusion detection system/intrusion prevention system ((IDS/IPS), content filtering (CF), secure remote access (SSL VPN), email/Internet and antivirus gateway (AVGW), new technologies and daily threat solutions such as the new generation firewall (NGFW) and DDoS prevention are available. Additionally, HAVELSAN is developing a secure network gateway system and is able to provide its customers isolated networks with single/duplex secure data flow solutions.

In secure event record management (SIEM) solutions, aside from product assembly, integration, writing complex correlation rules, not only storing but emphasizing analysis and reporting are provided by competent and experienced professionals. At HAVELSAN’s Security Operations Center, records are monitored 7/24 by experienced observers. In addition, with large-scale data analysis capability anomalies can be determined from large amounts of paperwork.

By regularly monitoring the customer’s webs, detection of changes in existing assets or new assets, scanning, reporting, creating a risk map of the vulnerabilities of these assets and planning actions against security vulnerabilities that arise are rendered possible via vulnerability analysis products and services.

In the light of the experience gained from the many data center projects it has realized, HAVELSAN offers cabinets, system rooms, data centers and security solutions for their infrastructure systems, biometric ID verification, physical security, CCTV and a wide range of solutions and services in infrastructure security.

SERVICES

• Net Security
• Event, Records Management and Monitoring
• Asset and Vulnerability Management
• Infrastructure Security
 
.
Most common attacks on Internet and Telecommunications are MOM (Man of the middle attacks);
your landline or Gsm line is attacked and monitored from MOM points ( simulated fake GSM towers OTA - so called IMSI catchers ).

Ok, VPN's are not 100% sure. Trustable VPN's support HTTPS and some cryptpgraphic methods; but most providers
do DPI ( Deep Paket Inspection) and try to cut the line or have alreday the crypt key.

Open SSL is a moderate and acceptable solution.
But nevertheless, your IP and the target IP will be located.
What can you do to protect your privacy on Internet ?

You can use JAPJONDO, plus TOR-Onion routing and secure Firefox or Onion browsers.

Best is if you operate a virtual machine started only from a LINUX LIVE CD or use a portable Onion system on a USB stick and use anonymous PC's.

For secure GSM you can use some pretty good programs from Apple or Play Store, if your counterpart use it also, you can share the key and be sure that non legitimated "Mafiosi" will not be able to intercept and monitor you.

For business people and politicians are professional solutions available with up to 4096 bit encryption.

Privacy is a human right.
 
. .
you can do JAPJONDO project from TU Dresden PLUS TOR Onion , JAPJONDO is almost 100% secure and don't log,

you should please read the full description;

MOM attacks can even made bey your neighbor with equipment for 1000 Euros, simulating a virtual cell tower.

Against Gov. attacks you can trust in JAPJONDO paying with paysafe card. The project is global the securest and up to know TU Dresden was forced in one single case to monitor one account of a student, with high court decision. It is going around minimum 5 routings in different countries, a gov. institution would need for every single country a high court decision and that NEVER happened.
 
Last edited:
. .
Anonymous claimed that they attack Turkish websites;
but I believe that Russian Hackers are on Job as they did in the Baltic's before.

5679744918c7732e88cdb553.jpg
 
.
The size of the attack was comparable low 40 GBps referring to official sources. The greatest known was 400 GBps using NTP.
 
. . . . . . . .

Country Latest Posts

Back
Top Bottom