top of page

Security assessment

      Assessment (assessment) of the state of security of information resources in information, telecommunication and information and telecommunication systems

is a set of measures aimed at identifying threats to information resources and preventing unauthorized actions regarding information in information, telecommunication and information-telecommunication systems.

      Assessment of information security in information, telecommunication and information-telecommunication systems

- measures to identify technical solutions in ITS that create prerequisites for violating the confidentiality, integrity and availability of the information processed in them.

TYPES OF WORK

CREATION OF KSZI IN THE AUTOMATED SYSTEM

 

Comprehensive information protection system (hereinafter - KSZI) 

Drawing

Audit and formation of requirements for KSZI in ITS

Development of information security policy in IT

Development of the Terms of Reference for the creation of KSZI

KSZ design

Security

Implementation of KSZI and assessment of information security in IT

Support of KSZI

Security

Creation of protection of information in computer systems against unauthorized access

Creation of tzi complexes at the objects of information activity

Examination and attestation of KSZI

Documents

IMPLEMENTATION OF ISO/IEC 27001:2005

 

Examination (definition of the field of activity, selection of critical business processes that are subject to protection)

Development of the organization's security policy

Determination of information security risk assessment methodology and acceptable level of risks

Identification of risks

Risk analysis and assessment

Preparation of a plan for handling critical risks

Development of ISMS policies and procedures

Implementation of protection mechanisms according to the risk management plan

Preparation for ISMS certification

The Company's specialists have experience in the field of technical and cryptographic protection of information, experience in designing and creating KSZI in information and telecommunication systems of various types and complexity

bottom of page