Talk With an Expert

B.A.S.E. - A Security Assessment Methodology

B.A.S.E. - A Security Assessment Methodology (PDF, 4.81MB)Published: 05 May, 2005
Created by
Gregory Braunton

At a fundamental level, much like a chain, the Internet is a collection of organizations' business networks inter-linked that form the digital infrastructure of the world. This infrastructure forms a global information grid that harnesses the potential (good and bad) for any node to access any other node worldwide. Some are personal home networks, some are small office networks, while still others are enterprise in size and scope. Regardless their size or purpose, the collective security posture of the Internet rests, metaphorically speaking, upon each link being fortified against the rampant swarm of malicious attacks and the infestation of pestilent viruses. Presently, the information security industry recognizes this environment as one ripe for entrepreneurship to hock their procedural 'best practices' and 'best of breed' technologies. Yet to build a fortified chain each link must have the relative strength of its neighbor. The weak link must be avoided! This can only be achieved by 'forging' each link with nearly similar techniques and tools. So with the myriad of proprietary vendor hardware software and procedural solutions (complete with premium cost) available which is universally adaptable executable and accessible to the Internet community en masse? The answer - none.

B.A.S.E. - A Security Assessment Methodology