Question

In: Finance

At a recent graduate recruitment event, you talked with a number of different people on company...

At a recent graduate recruitment event, you talked with a number of different people on company stands. Each talked about the various modules that you took on your course, your ambitions and aims.

The next day, you received an e-mail from the Chief Executive Officer (CEO) at ABC Bank PLC. She explained that your ideas about the importance of cyber security were very interesting and thinks that someone of your skills and knowledge may be just what the bank is looking for, as a senior risk manager. In this capacity the senior executives of your organisation have come to you with concerns about reports concerning cyber-attacks and viruses affecting IT systems and the problem encountered by companies such as TSB Bank and VISA in Europe with their IT systems. They were alarmed by the continued growth of ransomware attacks in particular.

To reassure the senior management you are required to identify the cyber risk facing a financial institution and develop a risk management plan including ‘continuity planning’ (or “resilience”) for the organisation to enable the organisation to manage a cyber incident effectively and continue trading in the event of the risk occurring.

Solutions

Expert Solution

Numerous banks and money related foundations incorporate outsider administrations from different merchants with authority information, especially as the business digitizes. This intensifies the cyber risk presentation, expanding the establishment's weakness if the outsider seller doesn't have the right safety efforts set up. This can prompt the loss of client information, loss of client reserves, administrative fines and noteworthy reputational harm.

Banks and monetary establishments hold a plenty of delicate information, that whenever altered can be hard to distinguish and can make money related organizations cause a great many dollars in harm. Regardless of whether an insider worker looking for vengeance against a foundation, or a programmer hoping to affect the notoriety of the firm, banks have seen a pattern in pernicious attacks trying to cause devastation instead of concentrate information. The aftereffect of such an attack incorporates noteworthy legitimate expenses and administrative fines, just as business interference, reputational harm and reclamation costs. Types of Risk:

1. Credential Stuffing

Credential stuffing is a kind of cyberattack that typically focuses on the individual information of banking clients. Utilizing taken record credentials, programmers can increase unapproved access to client accounts utilizing mechanized enormous scope login demands. The taken data would then be able to be utilized to besiege sites and servers so as to attempt to access basic IT foundation. This training is known as credential stuffing. 2) Cloud Providers

Cloud administrations come in valuable by helping banks balance IT costs, support framework uptime and guarantee their information is being put away securely. In any case, the guarantees of the cloud have accompanied a couple of hard-earned exercises with regards to client information and security. 3. Phishing Attacks

Phishing is a typical kind of cyberattack that is regularly used to take client information, including login credentials and Mastercard numbers. Yet, recently, there's been an expansion in phishing attacks focusing on bank workers. Phishing happens when an attacker fools a clueless casualty into opening a vindictive connection, prompting an establishment of malware which at that point freezes the framework as a major aspect of a ransomware attack. 4. Ransomware

Ransomware is a sort of malware that scrambles information, making it inconceivable for the proprietors of that information to get to it except if they pay a strong charge. In March 2017, the WannaCry infection spread autonomously through the systems of unpatched Microsoft Windows gadgets, leaving a large number of PCs tainted and grabbing a sum of 327 installments totaling $130,700. 5. Web of Things (IoT) Exploitation

While a dominant part of misuse endeavors come from programming vulnerabilities, they can simply start from powerless bits of equipment. Anything from a representative gadget to a switch associated with an unbound system can put a whole association's advanced framework at risk.

For some CISOs, this may seem as though wasting time going on and on – yet unbeknownst to many is the manner by which effectively exploitable their IoT gadgets are since they're regularly not required to have a similar degree of security examination as PCs. Unbound IoT gadgets, for example, home switches, printers, and IP cameras are for the most part helpless against attacks. Ways of Risk Management :

1. Assess Your Cloud Security

Regularly audit your cloud infrastructure to guarantee it's cutting-edge. Assess your cloud security's present state compared to security benchmarks, best practices and compliance standards.

2. Monitor Your Cloud Security

Utilize a vulnerability management apparatus to assist you with automating threat recognition and secure against potential threats before they become an issue.

3. Establish Strict Access Management Policies

By just giving access consents to representatives who require it, you're guaranteeing your organization is all around shielded from inside – especially on the off chance that you utilize contractors or part-time laborers.

4. Establish a Disaster Recovery Plan

Having a plan in place causes you avoid data misfortune and allows your to limit personal time after a disturbance. This possibly works in the event that you backup your data regularly and frequently.

5. Encrypt Your Data

Encrypting your data cryptographically, and securing the cryptographic keys to that realm, guarantees your most delicate digital assets are always ensured – regardless of whether your IT structure is critically undermined


Related Solutions

You are applying for a graduate marketing role through a recruitment company and part of the...
You are applying for a graduate marketing role through a recruitment company and part of the graduate screening process requires them to determine whether or not you are familiar with the advanced segmentation techniques available to companies in this digital age and how these techniques can affect the consumer journey down the marketing funnel. Show that you have an understanding of the topic area by: Outlining they key concepts Identifying examples of how companies are using such advanced segmentation techniques...
CASE A bank embarked on a recruitment campaign of university graduates, and Francis, a recent graduate...
CASE A bank embarked on a recruitment campaign of university graduates, and Francis, a recent graduate applied for a position. Francis was interviewed by the bank, and following the interview, the bank offered Francis a position by letter which set out a salary, and a starting date. Francis accepted the position by return mail. A few days after Francis began work for the bank, he was called into the Manager’s office and presented with an employment contract that contained a...
You are applying for a graduate marketing role through a recruitment company for an unspecified client....
You are applying for a graduate marketing role through a recruitment company for an unspecified client. Part of the graduate screening process requires them to determine whether or not you understand the relationship between traditional integrated marketing communications, the rise of digital marketing and current media consumption behaviours of key Australian generations. Show that you have an understanding of the topic area by: Providing key definitions and concepts Drawing the key models relevant for the topic Identifying real examples of...
You are applying for a graduate marketing role through a recruitment company for an unspecified client....
You are applying for a graduate marketing role through a recruitment company for an unspecified client. Part of the graduate screening process requires them to determine your viewpoint on the ethical issues relating to marketing communications. Specifically you are to: 1. Outline the key concepts 2. Identify examples of companies perceived to be behaving ethically or unethically in relation to their digital marketing activities. 3. Provide your own opinion of the ethical issues regarding the use of marketing communications in...
3. Suppose you are the manager of an airline company. As a recent MBA graduate, you...
3. Suppose you are the manager of an airline company. As a recent MBA graduate, you decided to use all the knowledge you have acquired to improve the firm’s pricing decisions. To begin with, you search for a market survey company to find out the demand curve for flights. The market survey company sent you back a report stating that there are two distinct segments of consumers - tourists and business travelers – and that their demand curves are given...
Describe the recruitment process and how the different stages narrow the number of individuals under consideration
Describe the recruitment process and how the different stages narrow the number of individuals under consideration
In class we talked about a number of different welfare measures. a) Graphically identify twoalternative money...
In class we talked about a number of different welfare measures. a) Graphically identify twoalternative money measures of welfare for an imposed change in the level of an environmental service flow (S1 > S0). b) Discuss the pros and cons of the measures you demonstrated above c) Distinguish between the compensating and equivalent measures using both expenditure and indirect utility function approaches. Explain the difference between the two in words.
crows ltd a manufacturing company. they produce a number of different types of products. in recent...
crows ltd a manufacturing company. they produce a number of different types of products. in recent years one of their main products is incurring loss and they are considering to discontinue it. do you agree with the decision? explain what key factors they need to consider in arriving at the decision.
As a recent graduate of UB you were hired an analyst in the finance department of...
As a recent graduate of UB you were hired an analyst in the finance department of Sun and Sea Investment Company., a new firm in a profitable but risky high-tech business. Several growth opportunities have presented themselves recently, but the company doesn't have enough capital to undertake them. Stock prices are down, so it doesn't make sense to try to raise new capital through the sale of equity. The company's bank would not lend it any more money than it...
You are a recent college graduate with a bachelor’s degree in accounting and have little to...
You are a recent college graduate with a bachelor’s degree in accounting and have little to no experience and applying for your first job. Write a cover letter to apply for this job posting. be sure to distinguish your application with a persuasive cover letter or cover message. A cover letter/message has three purposes: (a) introduce your résumé, (b) highlight your strengths in terms of benefits to the employer, and (c) help you gain an interview. Job Posting: Entry Level/Recent...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT