Security Consulting

Application Security Review

Web applications are an increasingly common avenue of attack for hackers seeking access to confidential information. An improperly configured application can present an open door for such an attack. A security review of a software application evaluates its vulnerability to attack. The review process applies guidelines based on industry best practices to assess an application for known security vulnerabilities. If any security vulnerability is found, a solution will need to be identified and a timeline developed for applying a solution.

A security review may consist of the following elements:

  • Dynamic Analysis - Automated tools are used to analyze the application while it is executing. This typically requires the preparation of test input.
  • Static Analysis - This analysis is performed without actually executing the program code. Analysts may work with or without automated tools to review the source code for possible design, coding and syntax patterns associated with security vulnerabilities.

Server/Workstation Security Review

Assistance is available for security reviews of servers and workstations. The review uses guidelines based on industry best practices to assess for known security vulnerabilities. If any security vulnerability is identified, recommendations can be provided to correct problems or deficiencies with a timeline for applying a solution.

Getting Started

To request this service, email itss@tamu.edu or call 979.847.4877.

Contact Information

To contact, email itss@tamu.edu or call 979.847.4877