IT SECURITY SURVEYS



Rooman regularly examines access rights in the organization as a weapon against data theft, identity theft, SESSION theft, backdoor mechanisms, strength of mechanism, compartmentalization of access rights as defense against unauthorized data access, system data loss checks using multiple methods, including via cryptography.


Testing includes system defense checks against:

  • Hidden Field Manipulation
  • SQL Injections
  • Cross-Site Scripting
  • Cross-Site Request Forgery
  • Parameter Tampering
  • Buffer Overflow
  • Session Hijacking
  • Cookie Poisoninge
  • HTTP Parameter Pollution
  • Command Injection