RKMJ Security Associates -Call us: 703-555-8700 or Visit us:
1
RKMJ Security Associates -Call us: 703-555-8700 or Visit us:
Table of Contents
Introduction...... 3
What is Information Security ...... 3
Information Security Threats and Vulnerabilities...... 4
Products and Services ...... 5
Conclusion...... 5
Introduction
The purpose of this white page is to provide your small business with guidance and solutions to protect your information assets. Our products and services will help and ensure your organization has the proper protection and solutions for conventional and complex information security threats and vulnerabilities.
What Is Information Security?
“The term “information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide—
(A) Integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity;
(B) Confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and
(C) Availability, which means ensuring timely and reliable access to and use of information.” [1]
Three fundamentals of information security (mnemonic - "CIA") are:
- Confidentiality
- Integrity
- Availability
Information Security Threats and Vulnerabilities
The following threats and vulnerabilities are key elements that affect the confidentiality, integrity, availability, non-repudiation, authentication, authorization and risk management of an organization’s information asset.
- Malware
- Careless employees
- Social networking
- Zero-day exploits
- Cloud computing security threats
- Denial Of Service Attacks
- Cyber espionage
- Social engineering
- Phishing
- Mobile devices
Products and Services
A TCP SYN CookieDetects and protects against DoS.
Item #: TSC-874
Type: DoS Attacks / Cisco Guard XT
Detects and defenses against complex DDoS attacks
Item #: CGXT-124
Type: DDoS ATTACKS
mALWARE Protection
Protects against malware.
Item #: MAL-521
Type: Software / Anti-vIRUS sOFTWARE
Protects againits, worms, virus and phishing.
Item #: AVS-432
Type: Software
Conclusion
- Cost and Benefits of Effective protection measures:
- Business Continuity
- Protection against loss of profits
- Reduction of Risk Management
- Reduction in cost of litigation
- Cost and Penalties of Ineffective or nonexistent protection measures:
- Insider theft of intellectual property
- Corruption of electronic files
- Increase cost of litigation
- Damage to company’s Reputation
References
44 USC § 3542 - Definitions | LII / Legal Information Institute. (n.d.). LII | LII / Legal Information Institute. RetrievedSeptember20, 2012, from
Cisco Guard DDoS Mitigation Appliances - Products & Services - Cisco Systems. (n.d.). Cisco Systems, Inc. RetrievedSeptember22, 2012, from
Definition of Information Security | UNLV Office of Information Technology (OIT). (n.d.). UNLV Office of Information Technology (OIT). RetrievedSeptember22, 2012, from
MOYLE, E. (2011, March 15). The Neverending Quest for IT Security. TechNewsWorld: All Tech - All The Time. RetrievedSeptember22, 2012, from
Top 10 information security threats for 2010. (2010, January 14). Help Net Security. RetrievedSeptember22, 2012, from
Vijayan, J. (2012, September 21). Cyber espionage campaign targets energy companies - Computerworld. Computerworld - IT news, features, blogs, tech reviews, career advice. RetrievedSeptember22, 2012, from
Weiss, A. (2012, July 2). How to Prevent DoS Attacks - eSecurity Planet.eSecurity Planet: Internet Security for IT Professionals. RetrievedSeptember22, 2012, from
1
[1]44 USC § 3542 - Definitions | LII / Legal Information Institute. (n.d.). LII | LII / Legal Information Institute. RetrievedSeptember20, 2012, from