Information Security

ORB Consultants Private Limited strongly believes in and has zero tolerance on misuse of information. Therefore, ORB always tries its level best to ensure the information security of its valuable clientele across the globe from its three fundamental bases as Confidentiality, Integrity and Availability.

A. CONFIDENTIALITY

It is all about limiting the data access. Confidentiality measures protect information from unauthorized access and misuse. There are many countermeasures that organizations put in place to ensure confidentiality. Passwords, access control lists and authentication procedures use software to control access to resources. These access control methods are complemented by the use encryption to protect information that can be accessed despite the controls, such as emails that are in transit. Additional confidentiality countermeasures include administrative solutions such as policies and training, as well as physical controls that prevent people from accessing facilities and equipment.

B. INTEGRITY

It is all about your data is accurate. Integrity measures protect information from unauthorized alteration. These measures provide assurance in the accuracy and completeness of data. There are many countermeasures that can be put in place to protect integrity. Access control and rigorous authentication can help prevent authorized users from making unauthorized changes. Hash verifications and digital signatures can help ensure that transactions are authentic and that files have not been modified or corrupted. Equally important to protecting data integrity are administrative controls such as separation of duties and training.

C. AVAILABILITY

It is all about accessibility to those who need it. In order for an information system to be useful it must be available to authorized users. Availability measures protect timely and uninterrupted access to the system Availability countermeasures to protect system availability are as far ranging as the threats to availability. Systems that have a high requirement for continuous uptime should have significant hardware redundancy with backup servers and data storage immediately available. For large, enterprise systems it is common to have redundant systems in separate physical locations. Software tools should be in place to monitor system performance and network traffic. Countermeasures to protect against DoS attacks include firewalls and routers