Assessment for the evaluation of all jurisdictional or standard specific requirements for system security.
- Security Audit: Assessment of the security of processes and technologies supporting the business of the customer. Evaluation might be performed around jurisdictional requirements or international recognised standards.
- Vulnerability Assessment: Testing of the exposure of a network to known technical vulnerabilities. No attack will be perpetrated for this type of activity as the assessor will just report to the customers the risks he is being exposed to.
- Penetration Testing: Testing of the security of the network by trying to exploit known vulnerabilities besides getting access to the resources of the customer by the use of known practices.