Saturday, September 10, 2005

Security Vulnerability Flowchart

See how your assets may be threatened. Your information systems face a variety of threats from a number of different sources. Consider the risks you face from:

  • Hackers scanning and probing access points to your network

  • Access to your corporate data from remote locations

  • Firewalls and their limitations

  • E-mail threats such as phishing and viruses

  • Internal security breaches

  • Business continuity and single points of failure issues

  • Web site threats including Denial of Service and defacing

  • Intruder detection and prevention systems

  • Data protection and encryption
Our security audit services provide an Executive Summary overview of how your information assets are threatened.

Labels: , , ,