1.  Plan Information Systems Security

      Discretionary Practices       Sample Formats       Software Tools

Plan Information Systems Security

DO IT YOURSELF Program - Purchase the Straw man (templates), fill-in the blanks, honestly answer the questions and move your company to the highest level of security you required!  Our templates when used completely can prepare your company to meet the government mandated "C2 level of security". 

INTEK SERVICES - Engage our EXPERTS to ensure your company is protected and secure.  Call us... 800-651-8788

Description

Information systems security requirements are included as part of our security services and systems design activities to preserve integrity, availability, and confidentiality of critical program technology and information. System security requirements shall be established and maintained throughout the acquisition life-cycle, as applicable.

File Owner: Jim Tracy
Organization: INTEK-
Email: jimt@INTEK-.net
Phone: (314) 596-8750
File Last Reviewed: NOV 2005

 
Discretionary Practices: Top of Page

     Company-Wide Practices:

          INTEK-MC - Security Awareness, Training & Education (SATE)  

Network Security Basics Training
 3 hours $500.00

at your facility - travel and expenses, if required are not included
(Call Jim Tracy at 314-596-8750 to schedule)

 

 

 

 

 

 

 
Sample Formats & Examples: Top of Page

     Company-Wide Sample Format:  (Deliverable Documents - Available for Purchase)

            INTEK-MC - BLISS External Analysis - (Sample Report)

                 INTEK-MC - Strawman Risk Analysis 

            INTEK-MC - Strawman Network Security Plan   

            INTEK-MC - Strawman Security, Test, and Evaluation  

INTEK Services are charged on an hourly basis starting at $125.00 per hour.   With Service Agreement the hourly rate goes as low a $65. per hour.

The above services may be INCLUDED with your INTEK Service Agreements - Call 314-596-8750 for more information.

 

 

 

 

 

 

 
Software Tool Descriptions: Top of Page

 
Company-Wide Testing of all Internet Connectivity:
Test and identify your company vulnerabilities!
BLISS - Base Line Internet/Information Security Service
$300 - Test your Internet Connection 
for more than 1700 KNOWN Vulnerabilities - one time 
$1,000 - Unlimited TESTING 
daily or more if required 
per Internet Connection for one year
 
INTERNAL NETWORK ASSESSMENT
Provides Complete Security Assessment Scanning (BLISS) on all Computers and network devices INSIDE of your company network.  The good guy side!
 Requires on-site service to implement.
(Custom quote required.)
 

Identify all your assets including software applications

NETWORK AUDIT TOOL (PDF sample report) - Basic system info

Provides:

Hardware Audit

Operating System Audit

Application Software Audit

Detail of Report

Pricing

 

 

 

 

 

 

 

 

 

 

 

 



Hardware Auditing:

Identifies unique assets logged in to the network giving model types and manufacturers, CPU speeds with color coded speed warning category that tells that a current CPU may not support new software technologies because the minimum CPU speed is too slow, and therefore may not be able to be upgraded.  Another category indicates current technology CPU's that may be considered unsupportable in 12-24 months.  The BIOS (Basic Input/Output System) is identified because it is recommended to update system BIOS whenever possible to help reduce unknown system crashes and improve overall Input/Output performance.  System Disk Size, available free space and network drives are also identified.

BACK

 

 

 

 

 

 

 

 

 

 

 

Operating System Auditing:

Identifies all operating systems (OS) in use on the network.  Based on the OS that was packaged with the hardware purchase and/or the site license information on file you can determine your exposure to unlicensed units, what OS the majority is using (Windows XX) as well as all variations of OS's (Windows 95, 98, NT4, W2k, XP).  For ease and uniformity of technical support and security it is recommended that Windows 95 users be upgraded to Windows 2000 or Windows XP as soon as possible.  Identifying the OS also identifies the users that are currently running old revisions of software.  These Service Packs are available at no cost and should be implemented as soon as possible.  Memory usage and Free disk space on each OS identified is another benefit to identify which systems to run disk clean-up, scan disk and defragmentation utilities on.  

BACK

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Application Software Auditing:

Prevents MAJOR EXPOSURE to license infringement:
Identifies all application software installed on the audited assets.  Applications that are installed on 5 or more assets are typically ASSUMED to have site licenses because this would be the least expensive method to distribute.  Applications with only 1 or 2 occurrences are ASSUMED to be either a single user license or packaged software application installed by the end user.  Anything that does not fall into the SITE or Single User is UNKNOWN and the location of the REQUIRED license will need to be researched. 
Application name, version and serial number are recorded with hot links to the Vendor License Requirements.

BACK

 

 

 

 

 

 

 

 

 

 

 

NOW YOU WILL KNOW-MAKE INFORMED TECHNOLOGY DECISIONS

Each asset is detailed individually with:
Asset NAME, 
User NAME, 
user ID, 
Network Address, 
System Type, 
System Serial, 
Category (Desktop), 
CPU Speed, 
BIOS, 
BIOS update availability, 
Memory Size, 
System Disk and Size, 
Available Free Space, 
Network Drives and logical paths, 
Application Name, 
Serial Number and 
link to vendor License Requirements.

 

 

 

 

 
CALL FOR A QUOTE
Pricing starts at $5,000.00
 
NETWORK AUDIT TOOL - In-depth system info
Registry Auditing Tool
Pricing starts at $7,500.00



Last Updated: 13, March, 2011

BACK       BEGINNING