Security policies-controls to overcome business challenges

Assignment Help Basic Computer Science
Reference no: EM133056494

Assignment: Use Security Policies and Controls to Overcome Business Challenges

1. Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.

2. Identify four IT security controls for a given scenario.

Assignment Requirements

- The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.

- Online banking and use of the Internet are the bank's strengths, given its limited human resources.

- The customer service department is the organization's most critical business function.

- The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.

- The organization wants to monitor and control use of the Internet by implementing content filtering.

- The organization wants to eliminate personal use of organization-owned IT assets and systems.

- The organization wants to monitor and control use of the email system by implementing email security controls.

- The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.

Using the scenario, identify four possible IT security controls for the bank and provide rationale for your choices.

Reference no: EM133056494

Questions Cloud

Define business intelligence : How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?
Trends in technology-internet of things-cloud computing : Define the following trends in technology : Internet of Things (IoT), Cloud Computing, Blockchain and Big Data, explain how they are interconnected?
Difference between discrete and continuous data : Discuss the general framework for classification. What is the difference between discrete and continuous data? Why is data quality important?
Advantage of organizing it security policies by domain : What is an advantage of organizing IT security policies by domain? What is a disadvantage of organizing IT security policies by domain?
Security policies-controls to overcome business challenges : Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
How does organization accomplish work : How does the organization accomplish work? Are they union/non-union? Do they work in teams? Are they a matrix organization?
Afford the entire set of tools : If you were building your own computer repair toolkit, which tools would you purchase first if you could not afford the entire set of tools?
Cruisin fusion contest : Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected?
Describe the benefits of clinical workflow : Describe the benefits of a clinical workflow and explain how an EHR-related workflow applies to informatics.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How procedure calls go before registers saved in memory

How deep can the procedure calls go before registers must be saved in memory? (That is, what is the maximum number of "active'' procedure calls that can be made before we need to save any registers in memory?)

  Performance of the employees of a small furniture

Make a strategic proposal for measuring the performance of the employees of a small furniture manufacturing company.

  Importance of normalization in relation to this project

Continue working on Service Request SR-ht-003, due in Week Five, by completing Change Requests 4 and 5.Create documentation describing the principles and importance of normalization in relation to this project and the process by which this project ..

  Distinguish web pages or web servers use for task

Suppose the role of the IT consultant to new nonprofit organization, Free Flu, to provides flu shots to the elderly. The organization requires the domain name. Distinguish between any Web pages or Web servers you would use for task.

  Contributes to the overall risk posture of the organization

What is the risk posture for each particular system as it contributes to the overall risk posture of the organization?

  How do the conditions for dk/nf correspond to the conditions

How do the conditions for DK/NF correspond to the conditions for BCNF?

  Convert into binary and perform

Write a C program that take two unsigned integer as input. then convert into binary and perform AND , OR , XOR and XNOR operation without using inbuilt logical.

  Compare the function of the plc program and data files

What does the memory map for a typical PLC processor consist of?

  Write the facts about vectors?

Write the facts about Vectors?

  Write a program that manipulates a database of product

The program should allow the user to add a record, find a record that matches a product name, and change the price and quantity of a product by a given amount.

  How can a company measure its competitive advantage

Examples of How can a company measure its competitive advantage, And how does a firm know if it is gaining or losing its competitive advantage?

  Question regarding the price fixing of interest rates

You have been hired by a firm because they believe that price fixing of interest rates has occurred at the bank. What steps should you take to investigate?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd