CMC Security Audit
Information system security testing services include testing and evaluating server systems, database systems and other equipment to compare information security status at the time of the old assessment. security standards of the organization apply, thereby posing risks existing in the system. In order to ensure that the defensive methods for the information technology system still operate effectively and for the right purposes
Risks will be categorized according to 3 criteria: Level of impact, ability to exploit and ability to overcome
Impact level: High, Medium, Low, N / A (No effect)
The ability to exploit: Easy to exploit, can exploit, difficult to exploit, can not exploit other
Remedy: Complex, Requesting plan, Fast