Importance of information security policies

Assignment Help Other Engineering
Reference no: EM132908126

Learning Objectives and Outcomes

Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.

Identify four IT security controls for a given scenario.

Scenario

The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.

Online banking and use of the Internet are the bank's strengths, given limited its human resources.

The customer service department is the organization's most critical business function.

The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.

The organization wants to monitor and control use of the Internet by implementing content filtering.

The organization wants to eliminate personal use of organization-owned IT assets and systems.

The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.

The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.

Assignment Requirements Using the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.

Reference no: EM132908126

Questions Cloud

Outline fictitious assets : Outline fictitious assets. Come again is the connotation_of a uninterrupted or periodic inventory system? Pardon is the abbreviation of VAT?
What is the market value of the firm expected fcf : Consider a firm, HGT Inc., that will produce free cash flows one year from today, and no subsequent cash flows. The free cash flows one year from today will be
What is identity theft : What is identity theft? How is consumer financial information protected by the Federal government? How does Private Industry protect this information?
Which strategy has the highest expected final? payoff : Suppose the? risk-free interest rate is 4%?, and the stock market will return either +34% or -24% each? year, with each outcome equally likely. Compare the foll
Importance of information security policies : Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
Calculate the sales mix for the three products : The variable selling of the MINI will increase by $8. Fixed cost for the company are said to be $245,784. Calculate the sales mix for the three products
Define executive accounting : Define executive accounting. Randy Bozarth loosened his grip on the tiller of his sail boat and let the bow turn slowly into the breeze.
System architecture is descriptive representation : System architecture is the descriptive representation of the system's component functions and the communication flows between those components.
What motivate hackers to attack computer networks : Provide an example based on your professional experience of what motivate hackers to attack computer networks?

Reviews

Write a Review

Other Engineering Questions & Answers

  What is a communication flow

What is a communication flow? System architecture is the descriptive representation of the system's component functions and the communication

  How should a schedule be presented to an owner

How should a schedule be presented to an owner? Discuss what are the key points to be included? Why is important to identify constraints in the project schedule

  Calculate the income from this stream over the next 5 years

A company that services a number of vending machines considers its income as a continuous stream with an annual rate of flow at time t given.

  ELEC376 Electronic Devices and Systems Assignment

ELEC376/676 Electronic Devices and Systems Assignment Help and Solution, Macquarie University, Australia - Write down the expanded equation for the square wave

  Find article with an incident when physical security failed

Find a minimum of two articles with an incident when physical security failed. Write a 3-page paper in academic format giving and overview of the incident

  Attacker to deliver payload through cache

How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?

  Compute the rms and maximum peak instantaneous value

Compute the RMS and maximum peak instantaneous value of the fault current, for a balanced three-phase fault.

  Discuss the importance of the apriori algorithm

Discuss the importance of the Apriori algorithm. Is it part of Frequent item set mining? What are the applications of Apriori Algorithm.

  Determine the static pressure and quantity curve

Detail the design and construction of a pressure balance stopping - Determine Graham's ratio and its implication - determine the static pressure and quantity curve

  Obtain the complement function for the match logic

Obtain the complement function for the match logic of one word in an associative memory. In other words, show that M/ is the sum of exclusive OR functions.

  Transform the system into the frequency domain

Transform the system into the frequency domain and give the individual transfer functions and the transfer function of the complete system

  Summaries a study on grating cut-outs

A STUDY ON GRATING CUT-OUTS by SAJAL VERMA, KHANDEKAR MAINUL ALAM, SANJAY SEHDEV, BHAVEN PAREKH You need to summaries this study in basic language that every

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd