Saturday, September 10, 2005

Security Vulnerability Flowchart

See how your assets may be threatened. Your information systems face a variety of threats from a number of different sources. Consider the risks you face from:


  • Hackers scanning and probing access points to your network


  • Access to your corporate data from remote locations


  • Firewalls and their limitations


  • E-mail threats such as phishing and viruses


  • Internal security breaches


  • Business continuity and single points of failure issues


  • Web site threats including Denial of Service and defacing


  • Intruder detection and prevention systems


  • Data protection and encryption
Our security audit services provide an Executive Summary overview of how your information assets are threatened.

Labels: , , ,