An independent professional security review that tests and examines a company's compliance with existing controls, the results of which enable an auditor to recommend necessary changes in security controls, policies, and procedures.
An examination of the server access and file ownership privileges to verify that no security holes exist.
An examination of networks and computer systems to determine an organizationâ€(tm)s vulnerability to attacks from hackers, viruses or other sources.
A review of the security vulnerability in an organization.