Tuesday, January 7, 2020

Information Technology And Security Gaps Of The Bank...

Introduction There is no debate to clarify that information security is an important asset to any organizations regardless of its size. To be more precise, information security is much important for financial institutions like Bank solutions Inc. whose main priority is to protect the confidentiality, integrity and availability of assets, individuals, information and information systems. Purpose The main purpose of this paper is to elaborate on the information technology/security gaps of the Bank solutions Inc. Disaster Recovery/Business continuity plan (DR/BCP) and to develop a security strategy to protect the confidentiality, integrity, and availability (CIA Triad) of assets, individuals, information and information systems of this organization. Definition Confidentiality: Ensures that data or an information system is accessed by only an authorized person (Techopedia, n.d.). Integrity: Assures that the data or information system can be trusted (Techopedia, n.d.). Availability: Data and information systems are available when required (Techopedia, n.d.). Technology/Security Issues After performing risk assessment task of the Bank Solutions incident handling, business continuity, and disaster recovery strategy, the findings of the assessment task issued numerous technology and security issues that are needed to be addressed in a timely manner. Some of the concerns that resulted from the risk assessment tasks are as follows: 1. Outdated DR/BCP DR/BCP was originally createdShow MoreRelatedThe Face Of Face Communication1274 Words   |  6 Pagesand electronic communication. Prosodica can help improve electronic communication. In addition, a face-to-face solution can help monitor team/employee activity and understand how one performs in a team and as an individual contributor. †¢ Sales team group dynamics: Sales representatives need skills that can help land a deal or increase the value of a sale. Therefore, the face-to-face solution can share the interaction summary of sales representative and how one can improve to boost sales midst increasingRead MoreO Experience Driving Large Scale Change With Management System Deployment?1482 Words   |  6 Pageso Experience driving large scale change with Management System deployment? ï‚ § SkyTech Inc. - Lead Project Manager of 5-person team on critical CRM implementation for a regional multi-million dollar General Aviation sales firm spanning multiple geographical locations. Implementation was the first time company upgraded from a home grown CRM to an Off-the-shelf solution. Overcame Senior Executive leadership’s reluctance to migrate IP to new platform. Worked closely with Marketing Director to ensureRead MoreCybercrime715 Words   |  3 Pagestransactions have moved online as software and websites are the medium through which funds are exchanged, cyber theft has taken alarming proportions. Initially the fear with a hacked computer meant that someones internet time would be stolen, but as banks introduce branchless banking and online payments have rendered the exchange of cash currency useless cyber crime has become a significant crime. In this context officials at state level are involved in getting their hands on the culprits engaging inRead MoreId entity and Access Management1965 Words   |  8 Pages Amit Kumar Cell: (864) 205-4309 | E-Mail: ak151170@gmail.com | 351 77th St , Richfield, MN 55432 CAREER FOCUS Amit Kumar is an IDAM Subject Matter Expert (SME) , Architect and Information Security Specialist with over 13+ years of technology industry experience. His background consists of several Architectural , Technical Lead and Leadership roles wherein he led teams of varying size through the Planning, Design, Implementation, and Deployment phases of critical IDAM based infrastructureRead MoreMobile Payment Services1788 Words   |  8 PagesPayments are payments for goods, services, and bills, invoices with a mobile device (such as a mobile phone, smart-phone, or Personal Digital Assistant) by taking advantage of wireless and other communication technologies (such as mobile telecommunications networks, or proximity technologies)† (Dahlberg et al., 2008) Turowski, and Pousttchi (2004) defined the Mobile Payment as a procedure of electronic payment transaction procedure in which at least the payer pays mobile communication techniques inRead MoreThe Relevance of Information Technology in Managing Small and Medium Scale Enterprises2709 Words   |  11 PagesA PROPOSAL ON THE RELEVANCE OF INFORMATION TECHNOLOGY IN MANAGING SMALL AND MEDIUM SCALE ENTERPRISES IN NIGERIA. BY: AMULUDUN OLUWABUSAYO R. 090201049 CHAPTER ONE INTRODUCTION 1.0 BACKGROUND OF STUDY Globalization of the economy has led to the emergence of information technology, especially the growth of the Internet and other communication network. Growing diversity of business transactions and increased competition, companies are changing the way they communicate withRead MoreThe Impact of Instant Messaging in the Financial Services Industry: Benefits, Challenges and Recommendations5657 Words   |  23 Pages2009 Executive Summary Unfortunately, while Instant Messaging (IM) systems have the ability to change the way financial service companies interact for the better, many of today’s implementations pose problems and challenges to address. IM technology has the benefits of gathering input from many different people in dispersed locations. This adds speed and ease to workplace communication, and presence detection eliminates the time typically lost to missed telephone calls and wasted trips to seeRead MoreComputer Security and Sony Data Breach Essay3532 Words   |  15 PagesInformation Systems for Management: BUSI 502 Subject Matter: Sony Reels from Multiple Hacker Attacks Sony’s PSN Hackers’ Incident New Cost Estimates for the Hacking Incident General data breach issues. According to Osawa (2011), costs associated with the 2011 Sony data breach involving Sony Corp.’s online videogame are over a billion dollars as it takes steps to repair its customers’ base and protect its customers. Nobuo Kurahashi, as Mizuho Investors Security analyst maintained thatRead MoreUnity Bank Integration Case Study2116 Words   |  9 PagesThe merger and acquisition of Delta by Unity Bank forces the integration of two companies with different core competencies, Information Systems and organizational structures and cultures. The CIO of operations, Stuart Irving must decide on the best strategy that would maximize the benefits of the merger by leveraging synergies against the potential costs and risks. Following the recommendation of the IT Governance Institute, newly merged company should establish effective duopoly IT governance withRead MoreBest Buy Case Study3836 Words   |  16 Pages | | | |Best Buy Co., Inc. [pic] | |Strategic Audit

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.