RKMJ Security Associates -Call us: 703-555-8700 or Visit us:

1

RKMJ Security Associates -Call us: 703-555-8700 or Visit us:

Table of Contents

Introduction...... 3

What is Information Security ...... 3

Information Security Threats and Vulnerabilities...... 4

Products and Services ...... 5

Conclusion...... 5

Introduction

The purpose of this white page is to provide your small business with guidance and solutions to protect your information assets. Our products and services will help and ensure your organization has the proper protection and solutions for conventional and complex information security threats and vulnerabilities.

What Is Information Security?

“The term “information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide—

(A) Integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity;

(B) Confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and

(C) Availability, which means ensuring timely and reliable access to and use of information.” [1]

Three fundamentals of information security (mnemonic - "CIA") are:

  • Confidentiality
  • Integrity
  • Availability

Information Security Threats and Vulnerabilities

The following threats and vulnerabilities are key elements that affect the confidentiality, integrity, availability, non-repudiation, authentication, authorization and risk management of an organization’s information asset.

  • Malware
  • Careless employees
  • Social networking
  • Zero-day exploits
  • Cloud computing security threats
  • Denial Of Service Attacks
  • Cyber espionage
  • Social engineering
  • Phishing
  • Mobile devices

Products and Services

A TCP SYN Cookie
Detects and protects against DoS.
Item #: TSC-874
Type: DoS Attacks / Cisco Guard XT
Detects and defenses against complex DDoS attacks
Item #: CGXT-124
Type: DDoS ATTACKS
mALWARE Protection
Protects against malware.
Item #: MAL-521
Type: Software / Anti-vIRUS sOFTWARE
Protects againits, worms, virus and phishing.
Item #: AVS-432
Type: Software

Conclusion

  • Cost and Benefits of Effective protection measures:
  • Business Continuity
  • Protection against loss of profits
  • Reduction of Risk Management
  • Reduction in cost of litigation
  • Cost and Penalties of Ineffective or nonexistent protection measures:
  • Insider theft of intellectual property
  • Corruption of electronic files
  • Increase cost of litigation
  • Damage to company’s Reputation

References

44 USC § 3542 - Definitions | LII / Legal Information Institute. (n.d.). LII | LII / Legal Information Institute. RetrievedSeptember20, 2012, from

Cisco Guard DDoS Mitigation Appliances - Products & Services - Cisco Systems. (n.d.). Cisco Systems, Inc. RetrievedSeptember22, 2012, from

Definition of Information Security | UNLV Office of Information Technology (OIT). (n.d.). UNLV Office of Information Technology (OIT). RetrievedSeptember22, 2012, from

MOYLE, E. (2011, March 15). The Neverending Quest for IT Security. TechNewsWorld: All Tech - All The Time. RetrievedSeptember22, 2012, from

Top 10 information security threats for 2010. (2010, January 14). Help Net Security. RetrievedSeptember22, 2012, from

Vijayan, J. (2012, September 21). Cyber espionage campaign targets energy companies - Computerworld. Computerworld - IT news, features, blogs, tech reviews, career advice. RetrievedSeptember22, 2012, from

Weiss, A. (2012, July 2). How to Prevent DoS Attacks - eSecurity Planet.eSecurity Planet: Internet Security for IT Professionals. RetrievedSeptember22, 2012, from

1

[1]44 USC § 3542 - Definitions | LII / Legal Information Institute. (n.d.). LII | LII / Legal Information Institute. RetrievedSeptember20, 2012, from