Security Risk Assessment

Description

Security is of the utmost concern when you have private or sensitive data that cannot leak out. Black Box looks at your physical and virtual infrastructure and understanding their entry points and vulnerabilities. We conduct a risk assessment based on the information being protected and then provide recommendations to reduce or eliminate and vulnerabilities found.

On the tip of everyone’s mind, “Is my system secure from an outsider?” Can an unauthorized person just walk into by building and steal my data? Can a hacker gain access to my internal network and manipulate my data? Can I detect these threats? Black Box with your cooperation will evaluate how an unauthorized person could walk away with your information presenting you all details.

Threats to your data don’t just come from the outside. Evaluation of your organizations internal threat detection and mitigation must also take a top priority. According Forrester Research around half of data breaches are caused by internal actors. Black Box will look at your physical access controls, the systems that authorize information access, data access procedures and present to you potential breach points.

Why It’s Valuable and How It’s Beneficial

Depending on your domain a data breach could be costly in a series of the different ways. The most direct is when your organization is fined (e.g. It loses Private Health Information under HIPPA). Another is a competitor getting direct access to your research and gaining an advantage. In taking preventative action, you can avoid these direct and indirect costs.

What You Purchase and Receive

Black Box ensures that our Security Risk Assessment service provides the expertise and effort necessary to conduct the following plan in order to generate the following report:

  1. Security Risk Assessment Plan (SRAP): A plan containing the policies, procedures, and work instructions for a security risk assessment, how it is to be conducted, who is responsible for each activity, when the activities are supposed to occur, and what resources and access privileges are required.
  2. Security Risk Assessment Report (SRAR): A report containing the results of the security risk assessment, which provides a full breakdown of the assessment’s identified risks, the system’s characterizations, an impact analysis, risk likelihood determination, and professional security recommendations.

How Much It Will Cost

The cost of our Security Risk Assessment service is determined based on your deadlines and expectations, and the amount of time and effort necessary to provide the deliverables guaranteed by our service level expectations.

How We Will Work Together

All research materials, information, and documentation will be maintained, compiled, and stored by Programming and Application Services, and directly accessible over secure channels or through Black Box secure systems. Private Black Box accounts are created and assigned to our clients as soon as work begins, providing them with limited access to information and documentation related to ongoing design and development requiring client feedback or input.

Portfolio Showcase

Funded by the National Science Foundation, Coweeta LTER has evolved from a site-based to a site- and region-based project centering on the effects of disturbance and environmental gradients on biogeochemical cycling, and the underlying watershed ecosystem processes that regulate and respond to those ecological cycles. Our current research program, entitled "Southern Appalachia on the Edge" focuses on the impacts that ex-urbanization and climate change are having on water quality, water quantity, and other ecosystem services.