
Our
Holistic Security Approach
In order to
reduce security risks to minimum, a holistic
approach to security is required. Our
security processes are born out of a clear
definition of the threats to our system.
Security
threats are a result of the various
interaction points that an application
provides to the external world, and the
various users that can interact with these
interfaces. For instance Your Customers,
Your Resellers, Your staff, Our Staff,
Anonymous Internet Users and Third Party
Servers are interacting with our Systems at
any given point of time. Each of these
actors need to have different access levels
and different rights and permissions.

Security
Goals
Privacy -
Information
within our infrastructure and systems will
only be accessible by authorized users
Integrity -
Data and information within our
infrastructure cannot be tampered with by
any unauthorized user
Data Protection
- Data within the systems cannot be harmed,
deleted or destroyed
Identification and Authentication
- Ensures that any user of the system is who
he claims to be and eliminates chances of
impersonation
Network Service Protection
- Ensures that networking equipment is
protected from malicious hacking attempts or
attacks that threaten uptime
|