Information Technology Security Assessment (IT Security Assessment) is an explicit study to locate IT security vulnerabilities and risks.
In an assessment, the assessor should have the full cooperation of the organization being assessed. The organization grants access to its facilities, provides network access, outlines detailed information about the network, etc. All parties understand that the goal is to study security and identify improvements to secure the systems. An assessment for security is potentially the most useful of all security tests.
The goal of a security assessment (also known as a security audit, security review, or network assessment[1]), isto ensure that necessary security controls are integrated into the design and implementation of a project. A properly completed security assessment should provide documentation outlining any security gaps between a project design and approved corporate security policies. Management can address security gaps in three ways:Management can decide to cancel the project, allocate the necessary resources to correctthe security gaps, or accept the risk based on an informed risk / reward analysis.
The following methodology outline is put forward as the effective means in conducting security assessment.
A security assessment report should include the following information:
IT security risk assessments like many risk assessments in IT, are not actually quantitative and do not represent risk in any actuarially-sound manner. Measuring risk quantitatively can have a significant impact on prioritizing risks and getting investment approval.[2]
Quantitative risk analysis has been applied to IT security in a major US government study in 2000. The Federal CIO Council commissioned a study of the $100 million IT security investment for the Department of Veterans Affairs with results shown quantitatively.https://web.archive.org/web/20040202203225/http://www.cio.gov/documents/aie_report_final.pdf United States Department of Veterans Affairs
There are common vendor-neutral professional certifications for performing security assessment.
There are common tools for automatic security assessment for self/third party usage.
Casas III, Victoriano. 2006. "An Information Security Risk Assessment Model for Public and University Administrators." Applied Research Project. Texas State University. http://ecommons.txstate.edu/arp/109/