Security assessment is focused on determining the degree to which information system security controls are correctly implemented, whether they are operating as intended and whether they are producing the desired level of security. Vulnerability assessment is focused on determining the weaknesses inherent in the information systems that could be exploited leading to information system breach. Without Security and vulnerability assessments, the potential exist that information systems may not be as secure as intended or desired.
This Security Assessment Policy applies to all information systems and information system components of JGC Construction International Pte Ltd (JCON). Specifically, it includes:
Perform security and vulnerability assessments against enterprise networks and information systems:
Violation of any of the constraints of these policies or procedures will be considered a security breach and depending on the nature of the violation, various sanctions will be taken: