User Tools

Site Tools


security_considerations

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
security_considerations [2016/12/14 16:18]
lucy
security_considerations [2019/02/15 12:38] (current)
lucy
Line 13: Line 13:
   * **Ability to monitor all system activities**:​ http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=log_files_in_lucy ​   * **Ability to monitor all system activities**:​ http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=log_files_in_lucy ​
   * **Ability to monitor the system in real time**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=system_performance_monitoring   * **Ability to monitor the system in real time**: http://​phishing-server.com/​PS/​doc/​dokuwiki/​doku.php?​id=system_performance_monitoring
 +  * **Data Security, Processes Privacy (GDPR)**: https://​wiki.lucysecurity.com/​doku.php?​id=company_application_and_data_security
  
  
 Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https://​www.owasp.org/​). If you still should experience a security issue, please contact us under support@lucysecurity.com. Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https://​www.owasp.org/​). If you still should experience a security issue, please contact us under support@lucysecurity.com.
  
security_considerations.1481728712.txt.gz ยท Last modified: 2016/12/14 16:18 by lucy