Wednesday, December 25, 2019

The Security Systems Of Bank Solutions - 975 Words

Most organizations incorporate information technology of some kind. The most fundamental factor in the use of technology is appropriate security of the system and information that is transmitted. The confidentiality, integrity, and availability (CIA) triad is a framework designed to protect information from being disclosed, modified, or accessed by unauthorized parties (Hansen, 2012). Using the CIA model, the security systems of Bank Solutions (BS) were evaluated with proposed recommendations and implementation timeline. Security and Technology Concerns BS’s primary vulnerability is with back-up procedures and the ability to protect and retrieve the company’s information to efficiently conduct business. They lack a comprehensive security plan and do not have an enterprise-wide process for recovering disrupted systems and networks, and are at risk for not being able to resume normal operations when issues arise. It would be in their best interest to adopt a single system approach and consistent measures that reduce the impact of system disruptions and increase system availability. Strategy to Mitigate Security Vulnerabilities The action plan in this paper, based on the risk assessment, focuses on minimizing negative impact to BS’s business operations. Overall, implementation a cloud-based backup solution would address their security vulnerabilities and the recommended steps needed to accomplish this project are as follows: †¢ Review risk assessment and action plan with keyShow MoreRelatedInformation Technology And Security Gaps Of The Bank Solutions Inc.1457 Words   |  6 Pagesclarify that information security is an important asset to any organizations regardless of its size. To be more precise, information security is much important for financial institutions like Bank solutions Inc. whose main priority is to protect the confidentiality, integrity and availability of assets, individuals, information and information systems. Purpose The main purpose of this paper is to elaborate on the information technology/security gaps of the Bank solutions Inc. Disaster Recovery/BusinessRead MoreFinancial Institutions in Pakistan Face Security Challenges Essay623 Words   |  3 PagesInstitutes are facing large security challenges as they confront a changing threat landscape, managing the complex password policies and counterstriking the password hacking by social engineering/online tools and the shift towards greater mobility are quite challenging tasks for IT professionals. NIB Bank is the largest foreign bank in Pakistan in terms of its branch network and one of the largest corporate entities of the country with a paid up capital of Rs.103 billion. The Bank through its banking footprintRead MoreImplementing An Exclusive Audit On Bank Solutions Operations And Process Protocols Essay1692 Words   |  7 Pages Having done an exclusive audit on Bank Solutions’ operations and process protocols, several security loopholes were realized and inevitably are great threat-posing factors to the institution. Responsively, new technology and security measure have to be implemented in order to fill the gaps and heighten security standards in order to enhance customer privacy, information protection, the institution’s credibility and generally adherence to the standard security policies and controls. The technologiesRead MoreWhat Is The Host-Based Intrusion Detection System?1194 Words   |  5 PagesOne positive quality uncovered by the inspectors was the vigorous host-based intrusion detection system (IDS) that encompassed a thorough incident logging and reporting resource that was implemented by Bank Solutions. However, nothing was established regarding guidelines, policies or the DRBCP that would focus on managing security incidents, actions to take, or point of contacts to connect in case of incidents. A policy is simply an all-purpose proclamations or administrative instruction intendedRead MoreInformation Technology And Security Gaps1357 Words   |  6 PagesInformation technology /security gaps identified It was noted that with the aid of an external consultant, Bank Solutions had their current data center DRBC Plan written down in the year 2007 and was last tested in the same year. The testing was a shallow table-top walk-through with no intensive assessments to ensure dependability and compliance to industry standard security frameworks. The plan has taken long before being updated hence some elements of the plan may not be adequately addressed asRead MoreExternal Security Risks Associated With Internet Banking Essay969 Words   |  4 PagesExternal Security Risks associated with Internet Banking Introduction In recent years, The Internet Banking, namely, online banking means the transitions of banking activities including checking account information and payment of bills through the website (Singhal and Padhmanbhan, 2008; Ahasanul et al, 2009) is popular in the worldwide. Abdou (2014) shows that in the UK, the number of online banking user was increased from 63% to 70% between 2011 and 2012, and 47% of Americans used online bankingRead MoreInformation Technology And Security Gaps1344 Words   |  6 PagesInformation technology/security gaps identified. It was noted that with the aid of an external consultant, Bank Solutions had their current data center DRBC Plan written down in the year 2007 and was last tested in the same year. The testing was a shallow table-top walkthrough with no intensive assessments to ensure dependability and compliance to industry standard security frameworks. The plan has taken long before being updated hence some elements of the plan may not be addressed wholly as purposedRead MoreBank Solutions Inc. Security Plan Essay1691 Words   |  7 PagesIntroduction Bank SolutionsInc. is in need of a tailored IT security plan for strategic advantage, regulatory compliance, and risk mitigation. As an organization that relies on IT for innovation and technical advantage, it is essential to invest in necessary security controls. This will ensure the infrastructure supports a layered security posture to detect, deter, eliminate or reduce as many vulnerabilities and exposure as possible. It is the responsibility of executive management to determineRead MoreThe Protocol Of Operations Of Bank Solutions Essay1476 Words   |  6 PagesAbstract After the assessment and audit carried out on the protocol of operations of Bank Solutions, we identified uncontrolled access to event logs as one of the biggest security threat factor the institution is currently faced with. It goes without saying that as a result of this phenomenon, the institution’s information is at a great risk of alteration and even access by external entities. As a result, consumer protection is far from being guaranteed, as well as privacy policy being highly compromisedRead MoreDisaster Recovery And Business Continuation Pl Security Gap Analysis Essay1358 Words   |  6 PagesRecovery and Business Continuation Plan: Security Gap Analysis Arlecia Johnson October 31, 2016 Information technology/security gaps identified. It was noted that with the aid of an external consultant, Bank Solutions had their current data center DRBC Plan written down in the year 2007 and was last tested in the same year. The testing was a shallow table-top walkthrough with no intensive assessments to ensure dependability and compliance to industry standard security frameworks. The plan has taken long

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.