Home .....................Biz security

Security System Study

SECURITY SYSTEM STUDY

Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.

Why do we need a security policy?

  • Confirmation that the organisation is acting in accordance with the polices ,objectives and procedures
  • Verify and monitor the implementation of the statutory and regulatory requirements
  • Monitor and verify the implementation of security policy
  • Assessment of information security related risk
  • Evaluation of the risk treatment methods
  • Maintain and improve the security policy
  • Monitor and review the security policy
  • Ensure availability of resources

Security Policy

  • Develop, establish and maintain standards, procedures and guidelines to promote the security and uninterrupted operation of computer based application systems.
  • Planning disaster recovery & risk analysis in evident response, crisis management, asset allocation, performing security audit and penetrating testing
  • Data classification, guidelines, standards and procedures
  • Recommending & configuring security products
  • Educating employees in security policy
  • Developing security plans

Security System Audit

  • Developing security plans
  • Educating employees in security policy
  • Recommending & configuring security products
  • Data classification, guidelines, standards and procedures
  • Planning disaster recovery & risk analysis in evident response, crisis management, asset allocation, performing security audit and penetrating testing.
  • Develop, establish and maintain standards, procedures and guidelines to promote the security and uninterrupted operation of computer based application systems