|
Home |
Company Security Checklist |
| ||
SCOPE OF WORK ASSIGNMENT: | |
|
Computer and network security breaches can cost a corporation millions of dollars. InfoSecPro will validate the current security architecture with corporate security policy and the current security threats. All associated residual risks will be documented.
InfoSecPro.com will demonstrate that your organization takes appropriate measures and exercises due care and due diligence to ensure the integrity and privacy of critical systems and information.
A Vulnerability Assessment will mimic the "outside-in" perspective of a hacker to your network. It will diagnose your network and help correct security weaknesses. Intrusion detection sensors will monitor continuously your network and will generate less false alarms when correlated with the known vulnerabilities of your system.
Our services provide solutions for:
Problem: | Service Description: | Time Frame: | |
If you have video surveillance needs, our solution will provide you with access from anywhere through the internet, including by using your cell phone or PDA. Resolution, refresh rate and band width can be customized to your particular needs. | Sample: |
Depending on the number of cameras to be deployed. | |
A Security Penetration/Vulnerability Analysis will demonstrate that an organization takes appropriate measures and exercises due care and due diligence to ensure the integrity and privacy of critical systems and information. | InfoSecPro uses the following steps to generate a security penetration/vulnerability analysis: Validate the Network Access Control Rules. InfoSecPro will validate the your network against the corporate security policy and the known Internet attacks. Risk analysis will be performed using the industry standard risk profile matrix. Use Hacker Tools. InfosecPro uses a wide variety of tools to uncover weaknesses in your current configurations. Wireles access point audit will also be performed. Platform Misconfigurations. Optionally, this analysis can test for platform misconfigurations. It will also verify the strengths of user passwords. Security Penetration/Vulnerability Analysis Report The report will document any exploits found and suggest possible security solutions to alleviate the vulnerability. |
The time necessary for a security penetration/vulnerability analysis depends on the size of the organization and their security awareness, as well as, resources. It may also include:
Network diagrams. | |
Security Audit/Assessment Computer and network security breaches can cost a corporation millions of dollars. InfoSecPro will validate the current security architecture with corporate security policy and the current security threats. All associated residual risks are documented. This will reduce the likelihood of a long-term outage, while making it faster and easier to recover from service disruption. |
InfoSecPro uses the following steps to perform a security audit/assessment: Review the Corporate Security Policy A corporate security policy is the foundation upon which all information and security related activities are based. The security policy must keep pace of the information systems technology that allows access to corporate resources. InfoSecPro will review your corporate security policy and suggest modifications, if necessary. Review the Current Security Architecture System security architecture represents a specialized view of the overall system architecture that emphasizes the security services and security mechanisms needed to satisfy the corporate security objectives and requirements. InfoSecPro consulting will review your corporate security architecture and suggest enhancements, if necessary. Generate a Security Audit/Assessment report A security audit/assessment report documents all residual-operating risks associated with the security architecture. |
The time necessary for a security audit/assessment depends on the size of the organization and their security awareness, as well as, budgetary constraints. It will include:
Network diagrams. |
|
Home | Company Security Checklist |