Assessing the Adequacy of Security for Publicly Accessible Web Applications
Our work will include, but not be limited to, interviewing company officials, performing vulnerability assessments, and analyzing documents and data associated with the objective. Our initial interviews will be with Information Technology department officials. Our requests for documents will be made as our work progresses. We will work to minimize disruptions to the company by coordinating interviews with staff in advance.