Securitate cibernetică. Soluții cu Sursă Deschisă

Securitatea cibernetică – protecție împotriva atacurilor care apar prin accesul la rețea, injectarea de date sau cod și controlul accesului fizic la echipamente.

Scanarea vulnerabilităților și testarea de penetrare. Audit de securitate IT.

Securitatea computerelor, securitatea cibernetică, securitatea digitală sau securitatea tehnologiei informației (securitate IT) reprezintă protecția sistemelor și rețelelor informatice împotriva atacurilor de către actori rău intenționați care pot duce la dezvăluirea neautorizată de informații, furtul sau deteriorarea hardware-ului, software-ului sau datelor, după cum precum și de la perturbarea sau direcționarea greșită a serviciilor pe care le furnizează.
Securitatea cibernetică (securitatea computerelor) este un set de metode și practici pentru protejarea computerelor, serverelor, dispozitivelor mobile, sistemelor electronice, rețelelor și datelor de atacurile intrușilor.


Securitate cibernetică – Prezentare generală

Indicatori de securitate cibernetică

Legislație. Securitate cibernetică


Recomandări.
Dacă vreuna dintre soluții vă interesează, sau credeți că are o bună perspectivă de dezvoltare, sau puteți adapta software-ul la nevoile cetățenilor, autorităților, afacerilor sau organizațiilor obștească din Moldova, atunci puteți:


1. Soluții internaționale

# Open Source Solution Web Licence
1 Google / OSV-Scanner
Use OSV-Scanner to find existing vulnerabilities affecting your project’s dependencies.
OSV-Scanner provides an officially supported frontend to the OSV database that connects a project’s list of dependencies with the vulnerabilities that affect them. Since the OSV.dev database is open source and distributed, it has several benefits in comparison with closed source advisory databases and scanners.
google.github.io/osv-scanner BSD-3
2 18F / development-guide
A set of guidelines and best practices for an awesome software engineering team.
Technology Transformation Services (TTS) Engineering Practices.
TTS offices and programs — including 18F, Centers of Excellence (CoE), Presidential Innovation Fellows (PIF), and Solutions — promote team best practices across specialty areas through guilds. These guilds support their members in whatever way deemed most appropriate by those members themselves.
This repo is where the TTS Engineering Practices Guild keeps its guide to best practices and resources for software development. Documentation is written using Markdown syntax and published as HTML using the Jekyll static site generator.
engineering.18f.gov CC0-1.0
3 cisagov / development-guide
Cybersecurity and Infrastructure Security Agency. Commit today, secure tomorrow.
A set of guidelines and best practices for an awesome engineering team.
Heavily „inspired” by the 18F Development Guide.
no website CC0-1.0
4 Hack-with-Github / Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers.
no website CC0-1.0
5 sqlmapproject / sqlmap
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.
sqlmap.org GNU
6 sullo / nikto
Nikto web server scanner.
cirt.net/Nikto2 GPL-2.0
7 aquasecurity / cloudsploit
CloudSploit by Aqua – Cloud Security Scans.
CloudSploit by Aqua is an open-source project designed to allow detection of security risks in cloud infrastructure accounts, including: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Oracle Cloud Infrastructure (OCI), and GitHub. These scripts are designed to return a series of potential misconfigurations and security risks.
aquasec.com GPL-3.0
8 OWASP / Nettacker
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information.
owasp.org/www-project-nettacker Apache-2.0
9 OWASP / www-project-zap
OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. Great for pentesters, devs, QA, and CI/CD integration.
owasp.org/www-project-zap Apache-2.0
10 greenbone / openvas-scanner
This repository contains the scanner component for Greenbone Community Edition.
greenbone.github.io/…/openvas-scanner GPL-2.0
11 OpenSCAP / openscap
Open Source Security Compliance Solution.
The oscap program is a command line tool that allows users to load, scan, validate, edit, and export SCAP documents.
open-scap.org/tools/openscap-base LGPL-2.1
12 wapiti-scanner / wapiti
Web vulnerability scanner written in Python3.
wapiti-scanner.github.io GPL-2.0

2. Soluții învechite

Soluții Open Source care nu se actualizează mai mult de 1 an, dar ar putea fi interesantă pentru Utilizatorii finali.
Nu facem nicio recomandare de utilizare sau de a nu folosi soluțiile enumerate mai jos. Decizia ta depinde în totalitate de dvs.

# Open Source Solution Web Licence
1 craigz28 / firmwalker
A simple bash script for searching the extracted or mounted firmware file system.
It will search through the extracted or mounted firmware file system for things of interest.
No website GPL-3.0