Security Assessments - Information Security Office - Computing Services - Carnegie Mellon University (2024)

The following is a list of security assessment services offered by ISO. Each follows a standard process flow and can be customized in many ways to meet the needs of a particular customer. In situations where ISO does not have the capability to assess a particular platform or application or when requested timeframes cannot be met, ISO may contract an external partner to assist with delivering requested services. Associated costs may need to be passed along to the requesting organizational unit.

Application Vulnerability Assessment

An Application Security Assessment evaluates the functionality and resilience of an application to known security threats including but not limited to buffer overflows, cross site scripting, cross site request forgery, improper data sanitization, injection attacks and weak authentication. This assessment analyzes all components of an application infrastructure including how each component is deployed and how each component communicates with both the client and server environments. A collection of commercial and open-source tools are used to perform this assessment as well as manual testing. Application credentials may be requested to conduct a more comprehensive review of a particular application. Typically, some host and network security practices are reviewed as part of an Application Vulnerability Assessment.

Enterprise Security Assessment

An Enterprise Security Assessment is a comprehensive review of an entire infrastructure including host, network, application and environmental controls. This assessment also includes a review of existing policies and procedures.

Host-Based Security Assessment

A Host-Based Security Assessment analyzes the security of a specific workstation or server. ISO will look for both local and remotely exploitable vulnerabilities by analyzing access controls, patch levels and system configurations. A collection of commercial and open source scanning tools are used for this type of assessment. Additional hands-on inspection may also be necessary.

Network-Based Security Assessment (Attack and Penetration)

A Network-Based Security Assessment, commonly referred to as an Attack and Penetration Test, evaluates a system for network-based vulnerabilities such as missing patches, unnecessary services, weak authentication and weak encryption. This type of assessment includes components of an Application Vulnerability Assessment and a Host-Based Security Assessment. At the discretion of the customer, this type of assessment can be performed with no prior knowledge meaning ISO is provide only an IP address prior to the assessment. This allows for a more accurate attack simulation. A Network-Based Security Assessment will help determine how vulnerability a system is to Internet and intranet attacks, whether intruders can gain access to sensitive information, whether social engineering techniques are effective and whether current operational controls are effective.

Physical Security Assessment

A Physical Security Assessment typically involves interviews with key staff, review of existing documentation and a visit to the site to evaluate physical and environmental controls. This type of assessment will help determine whether systems are susceptible to physical attacks and whether environmental controls are adequate.

Click here to get started!

Security Assessments - Information Security Office - Computing Services - Carnegie Mellon University (1)

Revision History

Last Reviewed: 02/11/2014

Security Assessments - Information Security Office - Computing Services - Carnegie Mellon University (2024)
Top Articles
Your eBay Free Shipping Supplies Coupon Code and Where to Find It
Investments
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 6459

Rating: 4.2 / 5 (43 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.