Security
Your network is only as
secure as it’s weakest link. Tejas Technologies specializes in
helping businesses assess their network for vulnerabilities,
then integrate and manage a complete security solution. By
protecting against internal and external network threats, Tejas
Technologies ensures business continuity in times of intrusion
on your network.
The threat from computer crimes and other online
security breaches has barely slowed, never mind stopped,
according to a recent survey of 538 security
professionals in U.S. corporations that was conducted by
the Computer Security Institute and the FBI's Computer
Intrusion Squad.
|
A study of 538 security
professional
in U.S. Corporations:
-
Reported breaches is
the last 6 months - 82%
-
Report
financial loss in the last 6 months - 64%
-
Theft of
proprietary information - $251.2M
-
Loss due to
fraud - $132.1M
|
|
Our risk assessment
process includes identification and evaluation of risks and risk
impacts, and recommendation of risk-reducing measures. In
assessing risks for an IT system, the first step we take is to
define the scope of the effort. In this step, the boundaries of
the IT system are identified, along with the resources and the
information that constitute the system. Characterizing an IT
system establishes the scope of the risk assessment. Identifying
risk for an IT system requires an understanding of the system’s
processing environment. As a network security consulting firm,
our first step is to collect system-related information, which
is usually classified as follows:
-
Hardware
-
Software
-
System
interfaces (e.g., internal and external connectivity)
-
Data and
information
-
Persons who
support and use the IT system
-
System mission
(e.g., the processes performed by the IT system)
-
System and data
criticality
-
System and data
sensitivity
The analysis of the
threat to an IT system must include an analysis of the
vulnerabilities associated with the system environment. The goal
of this step is to develop a list of system vulnerabilities
(flaws or weaknesses) that could be exploited by a potential
threat sources.
It should be noted that the types of vulnerabilities that will
exist, and the methodology needed to determine whether the
vulnerabilities are present, will usually vary depending on the
nature of the IT system . During this step, our risk assessment
personnel determine whether the security requirements stipulated
for the IT system and collected during system characterization
are being met by existing security controls. If you are in a
niche industry, we will utilize the industry specific network
security assessment (e.g. Payment Card Industry security
assessment). For most businesses, a thorough IT Security Audit
is performed.
We will use a security requirements checklist will be that
contain the basic security standards that can be used to
systematically evaluate and identify the vulnerabilities of the
assets (personnel, hardware, software, information),
non-automated procedures, processes, and information transfers
associated with a given IT system.
Security controls encompass the use of technical and
non-technical methods. Technical controls are safeguards that
are incorporated into computer hardware, software, or firmware ,
such as access control mechanisms, identification and
authentication mechanisms, encryption methods, intrusion
detection software). Non-technical controls are management and
operational controls, such as security policies; operational
procedures; and personnel, physical, and environmental security.
Click Here to Schedule a Visit
or call (817) 235-2749