answersLogoWhite

0


Best Answer

An IT Security Accessment can mean two things (depending on the context)

The first meaning is when a business asks the IT department (or more usally an outside consulting company who specialises in this area), to analyse their LAN and or website, or in the case of a large multi-site company it can mean to access the integerty of their network(s).

The way this IT Security team will run tools and see if all systems (the software like operating systems and their applications) are patched against known vulnerabilities (these are published by Bugtrac , Microsoft and other companies).

Sometimes, but not always the IT Team will check the physical computers themselves, for example in some government building, the computers are tied to the desk or wall to prevent theft.

The second meaning, is when people confuse an "IT Security accessment" with Penetration testing, which is the same, except that the IT Security Team will activley attempt to break into the company network (a NDA is used in this case and absolves the people doing this of legal action, also known as a "get out of jail free" card)

Protocol Solutions, is a network security company based in Ireland and there is free chat on the website, where you can ask staff questions like this.

The website address is at : http://www.protocolsolutions.co.UK/

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is IT Security Assessment?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about General History

What is the primary goal of assessment?

To evaluate data


What was the American assessment at the beginning of the revolutionary war?

taxes paid to england


1700s security for declaration of independance?

There was no security. None was needed.


What is the short term effects of the Vietnam War?

Assessment of Military science & technology.


How much it costs to study to become a librarian?

please answer my question it's for an assessment i am doing

Related questions

What companies offer a network security assessment in London?

There are several companies in London that can offer one with network security assessment in London. There is Calyx, Commissum, and Computer Network Defence.


Where can one learn about a security risk assessment?

One can learn about a security risk assessment online via the search function of the browser. There are many sites that talk about this potential issue.


Cloud Security Audits: A Step-By-Step Guide & Checklist?

Cloud security audits are essential to ensure that an organization's cloud infrastructure remains secure, compliant, and resilient against cyber threats. The process begins by identifying the cloud service provider (CSP) and reviewing security policies, configurations, and access controls. A thorough audit involves assessing data protection, user access permissions, and encryption methods in place. Key areas to evaluate include security incident management, backup strategies, and third-party integrations. Following a structured checklist, organizations can identify any vulnerabilities and implement remediation measures effectively, ensuring compliance with industry standards like GDPR or HIPAA. At Securify, a leading cybersecurity company, cloud security audits are designed to assess and fortify your cloud infrastructure against emerging threats. Their expert team follows a comprehensive step-by-step guide to ensure every aspect of your cloud setup is evaluated, from network security to data integrity. With Securify's tailored audit services, businesses can confidently secure their cloud environment, mitigate risks, and comply with regulatory requirements, thus safeguarding their operations in an increasingly digital world.


What items are assessed by an application security assessment?

Items that are assessed by an application security assessment are broken authentication, broken access control, invalidated input and many more. These are essentials components for the application.


What is conducted after each incident of unauthorized disclosure of classified information in cases involving espionage or leaks to the public media to determine the effect of a compromise on national security?

Damage assessment


Are All IAC employees are required to undergo a STA?

yes


What is the importance of maintaining the security of belongings in salon?

It is important for health reasons to maintain salon security of belongings in the salon. Security Legislation is a guide of risk assessment and security measures for beauty salons.


What is the importance of maintaining salon security of belongings in the salon?

It is important for health reasons to maintain salon security of belongings in the salon. Security Legislation is a guide of risk assessment and security measures for beauty salons.


What are some features of PowerTech security software packages?

PowerTech security software packages offer a comprehensive package of system security service. Some features of the PowerTech security packages are security assessment, special security projects, training, network security and many more.


What are the three components of a solid risk recovery plan?

risk assessment, security plan and budget


How do you calculate risk assessment in life insurance?

Risk assessment value is calculated on the basis of 3 variables. Operational security, actual security and the number of loss control. You must first aggregate and associate all of your input information in to the categories. Assign a base number.


What does BSAA stand for in resident evil the video game for the Xbox 360?

Bioterrorism Security Assessment Alliance.