What are the two primary lines of security defense

Assignment Help HR Management
Reference no: EM131847307

Banks Banking on Security Bank of America, Commerce Bancorp, PNC Financial Services Group, and Wachovia were victims of a crime where a person tried to obtain customer data and sell it to law firms and debtcollection agencies. New Jersey police seized 13 computers from the alleged mastermind with 670,000 account numbers and balances.

There is no indication the data were used for identity theft, but it highlights how increasingly difficult it is to protect information against such schemes as the market value of personal information grows. In the past, banks were wary of the cost or customer backlash from adopting network security technologies. Today, banks are beefing up network security as more customers begin to view security as a key factor when choosing a bank.

BANK OF AMERICA

Bank of America is moving toward a stronger authentication process for its 13 million online customers. Bank of America's new SiteKey service is designed to thwart scams in which customers think they are entering data on the bank's Web site, when they are actually on a thief's site built to steal data. This occurs when a worm tells a computer to reroute the bank's URL into a browser to another site that looks exactly like the bank's. SiteKey offers two-factor authentication.

When enrolling in SiteKey, a customer picks an image from a library and writes a brief phrase. Each time the customer signs on, the image and phrase are displayed, indicating that the bank recognizes the computer the customer is using and letting the customer know that they are in fact at the bank's official Web site. The customer then enters a password and proceeds. When signing on from a different computer than usual the customer must answer one of three prearranged questions.

WELLS FARGO & COMPANY

"Out-of-wallet" questions contain information that is not found on a driver's license or ATM card. Wells Fargo is implementing a security strategy that operates based on "out-of-wallet" questions as a second factor for network password enrollment and maintenance. It is also offering network security hardware such as key fobs that change passwords every 60 seconds, and launching a two-factor authentication pilot in which small businesses making electronic funds transfers will need a key fob to complete transactions.

E-TRADE FINANCIAL CORPORATION

E-Trade Financial Corporation provides customers with account balances exceeding $50,000 a free Digital Security ID for network authentication. The device displays a new six-digit code every 60 seconds, which the customer must use to log on. Accounts under $50,000 can purchase the Digital Security ID device for $25. BARCLAY'S BANK Barclay's Bank instituted online-transfer delays of between several hours and one day.

The delays, which apply the first time a transfer is attempted between two accounts, are intended to give the bank time to detect suspicious activity, such as a large number of transfers from multiple accounts into a single account. The online-transfer delay was adopted in response to a wave of phishing incidents in which thieves transferred funds from victims' bank accounts into accounts owned by "mules." Mules are people who open bank accounts based on an e-mail solicitations, usually under the guise of a business proposal.

From the mule accounts, the thieves withdraw cash, open credit cards, or otherwise loot the account. Barclay's also offers account monitoring of customer's actions to compare them with historical profile data to detect unusual behavior. For instance, the service would alert the bank to contact the customer if the customer normally logs on from England and suddenly logs on from New York and performs 20 transactions

Questions

1. What reason would a bank have for not wanting to adopt an online-transfer delay policy?

2. What are the two primary lines of security defense and why are they important to financial institutions?

3. Explain the differences between the types of security offered by the banks in the case. Which bank would you open an account with and why?

4. What additional types of security, not mentioned in the case above, would you recommend a bank implement?

5. Identify three policies a bank should implement to help it improve information security.

6. Describe monitoring policies along with the best way for a bank to implement monitoring technologies.

Reference no: EM131847307

Questions Cloud

What are the therapeutic actions for drugs : What are the therapeutic actions for drugs used to decrease acid content( H2 receptor antagonists, antacids, proton pump inhibitors and prostaglandins)?
How many words will be used for the hash table itself : If chaining is used, how many words will be used for the hash table itself? How many words will be used altogether for the n nodes?
Theories about the pathophysiologic process : Question: What are the current theories about the pathophysiologic process for peptic ulcer disease?
What is the state of michigan structure system : What is the state of Michigan's structure system? Include a description of what courts exist and their relationships to each other
What are the two primary lines of security defense : Explain the differences between the types of security offered by the banks in the case. Which bank would you open an account with and why?
Adjustment in pain medication : QUESTION 1: Which adjustment in pain medication may be needed for an elderly person with elevated liver enzymes due to anticonvulsant therapy?
What differences do you find among the firms : What differences do you find among the three firms? For example, do some tailor their message for different stakeholders? Are some firms more creative.
Write a program that will read a molecular formula : Write a program that will read a molecular formula such as H2SO4 and will write out the molecular weight of the compound that it represents.
Define community policing and its goals : Define community policing and its goals. Identify at least three successful initiatives of community policing in the United States

Reviews

Write a Review

HR Management Questions & Answers

  Improve problem solving capabilities within organization

Types of teams as to their effectiveness that will improve problem solving capabilities within organizations.

  Influence tactics help in reducing organizations politics

Explain the different types of influence tactics that will be of a help “if adopted” in reducing the organizational politics.

  Report on citigroup''s hr service level agreement

Human Resources or Human Resource Management deals with HR Service Level Agreement. HR Service Level Agreement is an agreement made between the employer and the employee, which states that the employee would work under any client and sometimes any ti..

  A project report on hrm

Human Resource Management as the name suggests, it is a management discipline which deals with the human i.e. the workforce aspect of organizations. Need and practices of HRM are inevitable in present scenario of extreme competition where "Talent War..

  Hrp: recruitment and selection

Recruitment and Selection is the initial ladder of any Human Resource Planning process and contains an immense significance for any organisation.

  A project report on study of statutory complainces

Statutory compliance and its immense knowledge are crucial to be understood in an organization. It contains all the forms, procedures and acts applicable in a company.

  Operant conditioning and Reinforcement

Operant conditioning is a learning process where behaviour is controlled by its consequences. In this process an individual's behaviour can be modified through the use of positive or negative reinforcement.

  Effectiveness of training programs in achieving customers an

The main motive for conducting this research is to provide broad range of research of the literature and their reviews related to training and development and assisting the employees in providing customers satisfaction.

  A critical analysis of hr processes and practices in fedex c

FedEx is illustrious for its novel HR processes and practices that have greatly accounted for its success.

  Integrating culture and diversity in decision making

People in the organization are known as Google where they share common goals and have common vision.

  Impact of employee attrition on people management in organis

Talent management implies recognizing a person's inherent skills, traits, personality and offering him a matching job.

  Labour dissonance at maruti suzuki india limited: a case stu

This Case Study focuses on various issues related to Labour Unrest at Maruti Suzuki India Limited.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd