Cyber Security Services | Hashcash Consultants

Page 1


SESSION SESSION FOCUS FOCUS

INTEGRATION DELAY


POST ATTACK WORK FLOW

STEP 1

Notification Detailed statistics and attack vector information to trigger an investigation.

STEP 2

Reports Listing of suspect files that have been corrupted. Including number of files, location, owner, etc.

STEP 3

STEP 4

Diagnosis

Recovery

Report on event logs to determine user account and executable used for data corruption.

Delete corrupt files or replace with last good version to avoid business interruption.


BLOCKSCAP - CYBER RESILIENCY TECHNOLOGY SOLUTION BLOCKSCAP BELIEVES

SERVICES • BLOCKSCAP FIREWALL • BLOCKSCAP ACCESS CONTROLS • BLOCKSCAP VPN • BLOCKSCAP SERVICE API • BLOCKSCAP HASH FILTER • BLOCKSCAP AUTHORIZED FILESYSTEMS

DETECT • INTRUSION SOURCE • WEB API GATEWAYS • SPAMMING • CRYPTOJACKING HASH • FILESYSTEM HANDLING

PREVENT • INTRUSION PREVENTION • SECURE WEB API GATEWAYS • SPAMMING • BOTNETS • DOS & DDOS • CRYPTOJACKING • MITM • SPEAR PHISING • DRIVE BY ATTACK

PROTECT DATA

CONTINUITY

RE-INSTATE DATA

 An ounce of prevention is worth a pound of cure  The mistakes of the world are warning message for you  Presumption is the opposite of Prevention


BLOCKSCAP SOLUTION MODEL DIAGRAM

GUI ENVIRONMENT

FIREWALL

BLOCKSCAP CORE GENERATE SEED

REQUEST

HC NET CORE MANAGE ACCOUNT

POLICY VALIDATE USER INTERFACE

MAPPING SERVER WEB SERVER

SEED REQUEST & VALIDATE

LOGICAL ENVIRONMENT

REGULATORY SERVER

STORE INFO

BLOCKSENSE ENGINE CONTROL VAULT

APPLICATION SERVER

DATABASE SERVER

REQUEST VALIDATE & FORWARD RESPONSE

VALIDATE API REQUEST

PERSIST & FETCH DATA BIND APP SERVICES WITH AURORA API

MANAGE API

AI CORE


SOLUTION ARCHITECTURE


BLOCKSCAP WORKFLOW FOR CYBER SECURITY IMPLEMENT POLICIES Definition of policies and method bindings are core process. It segregates the services & policies for detection and prevention.

RESTRICT INTRUSION Blockscap abstraction layer validates the policies and request origin before establishing the process communication with the business layer.

IMPLEMENT POLICIES

RESTRICT INTRUSION

RE-INSTATE DATA Blockscap ensures higher availability of data by re-instating the primary database to the current state by analyzing the last persisted transaction hash with the recent transaction hash present in the blockchain database

RE-INSTATE

DETECT THREAT ANALYTICS

DETECT ANNOMALIES Blockscap scans critical data sources archived in the policy vault. This includes unstructured files & services, hashes, request origin and databases to create an observation. .

ANALYTICS More than 40 statistics generated from each observation. Statistics include analysis of file entropy, similarity, corruption, mass deletion/creations, and much more.


BLOCKSCAP BENEFITS


BLOCKSCAP IMPLEMENTATION PROCESS

Setup Blockchain Node

Integrate Blocksense Engine Define Policies & Controls Configure connection with Primary DB

Append Node Service RPC


SESSION Q&A



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.