Communication and Information Security
The expert teams at Yugoimport-SDPR are also highly active in the field of information security. This area includes modern services, products, and consulting in the domain of defense against cyber-attacks, including APT (Advanced Persistent Threat) campaigns and "ethical hacking." The damage from cyber-attacks can cause serious long-term consequences, thus states and all other defense industry actors are increasing their defense capacities. As cyber warfare tools are very destructive and easily accessible, appropriate defense capabilities and strategies are critical.
Our services and products include:
- Software development, customization, testing, and analysis of research tools – intended for security agencies and organizations for the analysis of digital data.
- Cyber warfare tools: procurement, customization, testing, and analysis.
- Information security tools: gathering information from publicly available sources, analysis, and interpretation.
Defense against cyber-attacks:
- Strategic consulting
- Regulatory development
- Development, implementation, and compliance with standards and regulations
- Technological risk assessment
- Vulnerability testing
- Security assessment of network, system, and software infrastructure
- Development of CERT/CSIRT procedures
- Planning and implementation of SOCs (Security Operations Centers)
- Development of information security plans
Incident resolution:
- Remote and on-site support
- System and data recovery
- Incident analysis
- Creation of procedures for incident resolution
Communication security:
- Service for secure encrypted non-verbal and text communication
- Operational security
- Secure infrastructure
- Provider services
Research and development:
- Evaluation of hardware and software solutions
- Security verification of the supply chain and delivered hardware and software
- Software testing laboratories
- Verification of encryption algorithms
- Software development
Consulting and services in the field of information security:
Consulting in the operational domain of information security
- APT simulations and campaigns
- Development of APT tools
- Gathering information from publicly available sources
- Development of cyber-attack protection tools