Penetration Testing - Cyber Security
![F8th Inc.](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/company/8617/avatar/medium-b45435c7-5259-4d41-8a01-2b862b4adba0.png)
![Admin Project Manager](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/employer/55231/avatar/medium-82024e32-fc50-421a-9645-ce4bc51b5d87.png)
Preferred learners
- Anywhere
- Academic experience
Categories
Skills
Project scope
- What is the main goal for this project?
-
Description
F8th Inc. provides more protection with less complication. F8th Inc. creates a solution that people actually want to use due to its convenience, simplicity, and absence of friction. By analyzing how people use their mouse, keyboard and touchscreen, the F8th solution collects thousands of data points such as clicking speed, mouse speed, angle of the curve of the mouse, and typing cadence. Then, the artificial intelligence uses this data to create a behavioural biometry that can uniquely identify each user through their session while maintaining their privacy.
- What tasks will learners need to complete to achieve the project goal?
-
Project Scope
This project will follow the famous Red Team, Blue Team and White Team in the Cybersecurity World.
Red Team: Offensive security professionals who are experts in attacking systems and breaking into defenses
Blue Team: Defensive security professionals responsible for maintaining internal network defenses against all cyber attacks and threats
Project Objective
Red teams simulate attacks against blue teams to test the effectiveness of F8th’s network’s security
- What is the main goal for this project?
-
Description
F8th Inc. provides more protection with less complication. F8th Inc. creates a solution that people actually want to use due to its convenience, simplicity, and absence of friction. By analyzing how people use their mouse, keyboard and touchscreen, the F8th solution collects thousands of data points such as clicking speed, mouse speed, angle of the curve of the mouse, and typing cadence. Then, the artificial intelligence uses this data to create a behavioural biometry that can uniquely identify each user through their session while maintaining their privacy.
- What tasks will learners need to complete to achieve the project goal?
-
Project Scope
This project will follow the famous Red Team, Blue Team and White Team in the Cybersecurity World.
Red Team: Offensive security professionals who are experts in attacking systems and breaking into defenses
Blue Team: Defensive security professionals responsible for maintaining internal network defenses against all cyber attacks and threats
Project Objective
Red teams simulate attacks against blue teams to test the effectiveness of F8th’s network’s security
- How will you support learners in completing the project?
-
Support & Requirements
A team of at least 10-15 people will be required for this project. All members will be added to a channel on zoom where there will be constant communication. Communication can be low touch and project objectives can be discussed once a week.
Please email Kartik Khatri at kartik.khatri@f8th.ai for an introductory meeting.
About the company
- https://www.f8th.ai/
- 2 - 10 employees
- Banking & finance, It & computing, Technology, Business & management
F8th’s mission is to provide solutions to organizations against the latest cyber threats, enforce user privacy and corporate data security, and mitigate the massive damages and losses caused by data breaches.
F8th’s behavioural biometric analysis (BBA) works by analyzing mouse, keyboard and touchscreen movements to discern the unique identity of the user. Unlike conventional two-step authentication systems, F8th uses artificial intelligence, machine learning and deep learning to analyze 100s of these inputs in real time to identify an authorized user vs a fraudster. Moreover, F8th passively protects the customer and corporate data by continuously authenticating users through their human behaviors. Unlike every other tracker, F8th uses data that websites need to provide services, hence it is not impacted by browser tracker blockers, and is completely compliant with the new data privacy regulations.