who we are

Moving Target Defense: Common Practices
Moving Target Defense (MTD) uses counter-deception techniques that constantly change the target surface, so that attackers can’t get a foothold. There are three main categories of MTD:Network level MTD: Changing the network topology, including IP-hopping, random port numbers, extra open or

OUR MAIN PRINCIPLES

247 Cyber Solutions provides professional services to help businesses grow online. We’ll take care of your website, databases, and security, letting you devote all the time to business development. Our specialists will gladly assist you in different aspects, sticking to the following principles:

 

  • thorough examination and planning;
  • understanding customers’ requests;
  • implementing the most suitable solutions;
  • following current technology trends;
  • communicating ideas through design;
  • preventing data loss and system failures;
  • a proactive approach to security issues;
  • careful malware observation and analysis;
  • optimizing company’s functionality;
  • process automation for faster operations;
  • reliable support any time you need it;
  • personalized service plans.

WHAT WE OFFER

Moving Target Defense: Common Practices

Moving Target Defense (MTD) uses counter-deception techniques that constantly change the target surface, so that attackers can’t get a foothold. 

There are

Quantum Computing and Quantum Communication

August 9, 2016: This podcast discusses how one technology could completely change the public debate about secure communications and surveillance – quantum computing. While

Web Hosting Solutions

Is your website doing the talk in your absence? If not then you are leaving a lot of capital on the table. No successful website build is an accident. From the technology, to

WHY TRUST 247 Cyber Solutions?

Moving Target Defense: Common Practices
Moving Target Defense (MTD) uses counter-deception techniques that constantly change the target surface, so that attackers can’t get a
Quantum Computing and Quantum Communication
August 9, 2016: This podcast discusses how one technology could completely change the public debate about secure communications and
Web Hosting Solutions
Is your website doing the talk in your absence? If not then you are leaving a lot of capital on the table. No successful website build is
Elasticsearch Implementation
One of our recent projects was to install all of the components of the Elastic Stack, which includes Filebeat, a Beat used for forwarding

OUR CAPABILITIES

Moving Target Defense (MTD) uses counter-deception techniques that constantly change the target surface, so that attackers can’t get a foothold. 

There are three main categories of MTD:

  • Network level MTD: Changing the network topology, including IP-hopping, random port numbers, extra open or closed ports, fake listening hosts, and obfuscated port traffic as well as fake information about the host and OS type and version.
  • Host level MTD: Changing the host and OS level resources, naming and configuration.
  • Application level MTD: Changing the application environment. This includes randomly arranging memory layout, changing application type and versioning and routing them through different hosts, or changing setting and programming languages to compile the source code, altering the source code at every compilation.

All of these techniques are intended to morph the target, making it unfamiliar to the attacker. MTD forces the attacker to learn the target over and over again, increasing the likelihood of discovery and making attacks costly and unfeasible.

By using deception and MTA, attackers had the upper hand by camouflaging their next moves. The new MTD paradigm turns the tables by making the attacker operate in an uncertain and unpredictable environment. MTD at the OS and Application levels holds particular promise, as a successful attack depends on accurate information about the targeted operating system and application.

Source: http://blog.morphisec.com/moving-target-defense-common-practices