CMC Security Audit

Information system security testing services include testing and evaluating server systems, database systems and other equipment to compare information security status at the time of the old assessment. security standards of the organization apply, thereby posing risks existing in the system. In order to ensure that the defensive methods for the information technology system still operate effectively and for the right purposes

Risks will be categorized according to 3 criteria: Level of impact, ability to exploit and ability to overcome

Impact level: High, Medium, Low, N / A (No effect)

The ability to exploit: Easy to exploit, can exploit, difficult to exploit, can not exploit other

Remedy: Complex, Requesting plan, Fast

Implementation process