Home

Residential Small Business Data Recovery Web Design Testimonials Downloads

 

Security


 

Your network is only as secure as it’s weakest link. Tejas Technologies specializes in helping businesses assess their network for vulnerabilities, then integrate and manage a complete security solution. By protecting against internal and external network threats, Tejas Technologies ensures business continuity in times of intrusion on your network.

 


The threat from computer crimes and other online security breaches has barely slowed, never mind stopped, according to a recent survey of 538 security professionals in U.S. corporations that was conducted by the Computer Security Institute and the FBI's Computer Intrusion Squad.

 

A study of 538 security professional

in U.S. Corporations:

  • Reported breaches is the last 6 months - 82%

  • Report financial loss in the last 6 months - 64%

  • Theft of proprietary information - $251.2M

  • Loss due to fraud - $132.1M


 

Our risk assessment process includes identification and evaluation of risks and risk impacts, and recommendation of risk-reducing measures. In assessing risks for an IT system, the first step we take is to define the scope of the effort. In this step, the boundaries of the IT system are identified, along with the resources and the information that constitute the system. Characterizing an IT system establishes the scope of the risk assessment. Identifying risk for an IT system requires an understanding of the system’s processing environment. As a network security consulting firm, our first step is to collect system-related information, which is usually classified as follows:

  • Hardware

  • Software

  • System interfaces (e.g., internal and external connectivity)

  • Data and information

  • Persons who support and use the IT system

  • System mission (e.g., the processes performed by the IT system)

  • System and data criticality

  • System and data sensitivity

The analysis of the threat to an IT system must include an analysis of the vulnerabilities associated with the system environment. The goal of this step is to develop a list of system vulnerabilities (flaws or weaknesses) that could be exploited by a potential threat sources.

It should be noted that the types of vulnerabilities that will exist, and the methodology needed to determine whether the vulnerabilities are present, will usually vary depending on the nature of the IT system . During this step, our risk assessment personnel determine whether the security requirements stipulated for the IT system and collected during system characterization are being met by existing security controls. If you are in a niche industry, we will utilize the industry specific network security assessment (e.g. Payment Card Industry security assessment). For most businesses, a thorough IT Security Audit is performed.

We will use a security requirements checklist will be that contain the basic security standards that can be used to systematically evaluate and identify the vulnerabilities of the assets (personnel, hardware, software, information), non-automated procedures, processes, and information transfers associated with a given IT system.

Security controls encompass the use of technical and non-technical methods. Technical controls are safeguards that are incorporated into computer hardware, software, or firmware , such as access control mechanisms, identification and authentication mechanisms, encryption methods, intrusion detection software). Non-technical controls are management and operational controls, such as security policies; operational procedures; and personnel, physical, and environmental security.

 

 

Click Here to Schedule a Visit

or call (817) 235-2749

Copyright © 1999 - 2010 Tejas Technologies, All rights reserved