Identify four it security controls for a given scenario

Assignment Help Computer Engineering
Reference no: EM132627533

Assignment: Using Security Policies and Controls to Overcome Business Challenges

Learning Objectives and Outcomes

• Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.

• Identify four IT security controls for a given scenario.

Scenario: • The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.

• Online banking and use of the Internet are the bank's strengths, given limited its human resources.

• The customer service department is the organization's most critical business function.

• The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.

• The organization wants to monitor and control use of the Internet by implementing content filtering.

• The organization wants to eliminate personal use of organization-owned IT assets and systems.

• The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.

• The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.

Assignment Requirements

Using the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.

Length: 1-2 pages

Reference no: EM132627533

Questions Cloud

Which argument is based on the assumption of john lintner : John Lintner believe that the required return on equity increases as the dividend payout ratio is decreased. Their argument is based on the assumption that
Planning the change in direction for the company : What role do you think goals would play in planning the change in direction for the company? List some goals you think might be important.
Explain the transformative power of love : How does "love" work from the perspective of a servant leader as well as from the perspective of those who are led?
The early theories of human development : Briefly describe the Freud, Erickson, and Piaget theories regarding development. Provide the major similarities and differences between each.
Identify four it security controls for a given scenario : Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
What are the import and export prospects of china : What are the import and export prospects of China? Based on the business environment give recommendation about selecting China
Find financial performance on a monthly basis : Why is it important to project the first-year financial performance on a monthly basis and the subsequent yearly budgets, on a quarterly basis?
Eligibility requirements for medicaid : Examine at least two eligibility requirements for Medicaid. Debate the extent to which you agree with the fairness of these requirements.
Differentiating between what is right and what is wrong : When we think of ethics, we usually think of guidelines for differentiating between what is right and what is wrong. For example, consider the Golden Rule.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss the business requirements for solving that problem

determine the business requirements for solving that problem, including the requirements that any new technology needs to meet

  Create a GUI that can be used by a community group

Create a graphical user interface that can be used by a community group to enable youths to sign up for different sporting events.

  Design a network for a hospital

The project aims to design a network for a hospital. The hospital has three buildings and each building has five floors.

  Write a c function that computes the length of a string

Write a C function that computes the length of a string. Use the following function declaration int length(const char *str).

  What is the starting address of displacement 0

What is the ending address? Exactly how many bytes are contained in the segment? What is the starting address of displacement 0?

  List all sentences with a probation officer assigned

List all sentences with a probation officer assigned. List the sentence ID, criminal ID, and probation officer ID.

  What is the length of the pic-eighteen program counter

What is the length of the PIC18 program counter? How many different program memory locations can be addressed by the PIC18 MCU?

  Compose the three parts of a complete email message

When the application starts, the text area will display a message listing the options which can be selected.

  Write a function do graphics that will take a list as input

Write a function do Graphics that will take a list as input. The function do Graphics will start by creating a canvas from the 640x480.jpg file in media.

  Calculate the total time required to download the webpage

The sizes of the objects are 25,000 Bytes, 40,000 Bytes, 60,000 Bytes and 75,000 Bytes respectively. The bandwidth is 10 Mbps.

  Next generation technology grants access based on human

next generation technology grants access based on human attributes?

  Key characteristics for web security and training programs

Describe your results. Put them in a table describing the training program and cost. You will assess the programs in terms of time, money, and effectiveness.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd