iTechSolv - Security is a Process, Not a Product iTechSolv - Security is a Process, Not a Product

 

    Services & Solutions > iTechSolv’s iDefense Security Methodology

 

 

 

iTechSolv encompasses six-phase approach to information system security - structured for your success:

 

1.        Prepare

         Policy Review and Assessment

         Network Architecture Design Assessment

 

2.        Discover

         Identify & Prioritize Information Asset ( tangible and non-tangible )

         Identify Owner and / or Custodian

 

3.        Assess

 

3.1 Vulnerability Assessment

         Identify and characterized vulnerability

         look for exploitable situations created by lack of adequate security

         Vulnerability vs. Risk ( confidentiality, integrity and/or availability )

3.2 Intrusion / Penetration Testing

 

4.       Identify & Prioritize

 

         Threat Identification

         Identify intention & capabilities of threat

         Identify threat history

         Prioritize security issues in the way that makes the most sense to the business

         Asset Value to Business Needs

 

5.       Mitigate & Eliminate Root Cause

 

         Creates a security roadmap which clearly represents the risks

         Implement risk management strategies to reduce those risks.

         Reducing the exposure through security countermeasures ( People,Process,and Technology )

 

6.       Monitor and Measure

 

         Continuous process risk profile

         Develop risk-aware concept that understand, validate and implement safeguard

         Continuous monitor for policy violation

 

 

 

© Copyright 2005-2008 iTechSolv Sdn. Bhd. All rights reserved.