Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2019, Vol. 45 ›› Issue (12): 93-96.

Previous Articles    

In-depth, proactive corporate cybersecurity assessment

  

  • Online:2019-12-15 Published:2020-11-19

Abstract: The enterprise is an indispensable part of social and economic development. With the rapid development of new information technology, the dependence of the enterprise on the network continues to increase, and the network security risks it assumes are also increasing. Spirent’s Data Vulnerability Assessment Solution (CyberFlood DBA) implements closed-loop security solutions by performing stress tests on security policies when they are secure.

Key words: network security, data security, data vulnerability, security assessment