Question

In: Computer Science

Based on your reading and on additional research on line, whatare the major components of...

Based on your reading and on additional research on line, what are the major components of an IT or cyber security policy? If you work for a company are you aware of what the policy is for the company? Please describe it and if it corresponds to the reading or your research. If you are only a student, pick either the school, a bank you do business with or other company whose policy you can view and evaluate it. Write a 2 to 3 paragraph synopsis of what you found and your analysis. please write 2 to 3 paragraph on Creating an IT or Cyber Security Policy please study above question and answe

Solutions

Expert Solution



These are the vital points in cyber security policy and I have made it easier to understand and succinctly. Hope you find it useful.
Solution: The following are the major Security elements in IT policy:
Integrity
Availability,
Utility,
Authenticity,
Nonfidentiality,
Nonrepudiation.

Solution: Yes, if i work in a company, the first thing is that I will thoroughly go through the policy.

Cyber security policy (bank sector):

The main components namely , security awareness , security policy , access control and Top level management suport should be examined when drafting bank cyber security .

The steps involved in Bank security policy are:

1. Collecting security risk assessments.
2. Consideration of security infrastructure strategy.
3.Deployment of access control without any constraints.
4. Integrating network and other security mechanism such as network intrusion detection systems etc..
5. Finally maintaining , updating and monitoring policies and process.



Challenges :

Tough regulations: Governing regulatory compliances is considered as a difficult task since huge amount of regulations have been deployed for larger and smaller banks which must satisfy
regulatory obligations.

Securing client data: The clients data are dynamic , therefore the bank has to adopt policies which updates reagulary.

Third party risk : Only confident and monitored third parties can be involved and certain must be made for third parties.

Evolving cyber threats : Each day more dangerous cyber threats are introduced therefore the bank must be in par to handle these evolving threats.

Approach to adopting bank secruuity policy consists of:

?1. Arrangement of plans: In this phase we can create blueprint for policies, formalising leadership and means to know the policy.

2. Create Design: Here we can make
requirements of systems engineering
And methods and finally build a policy.

?3. Deployment: Finally the policy plan can be deployed by overcoming the challenges.

?4.Transition of operations : The storage of policy reviews against frauds and threats can be managed and team concerning should take over.


Related Solutions

Based on your course readings in Module 1 and additional research, prepare and post to the...
Based on your course readings in Module 1 and additional research, prepare and post to the Discussion Area the strengths and weaknesses of healthcare delivery in the U.S., as compared to other developed nations such as England or Australia. In addition discuss the factors that contribute to the strengths and weaknesses of healthcare delivery in the U.S. Justify your viewpoint using examples. Note: You are encouraged to look for authoritative, peer-reviewed sources of information and then choose your own perspective...
how best to fund and ensure healthcare services in the U.S. Based on your reading, research,...
how best to fund and ensure healthcare services in the U.S. Based on your reading, research, and experience, which path of these our country should follow. A single-payer (Canadian) system 2. Employer-mandated health insurance with an individual mandate 3. Income-related tax credits
Identify three major components of the Medicare and Medicaid programs and, based on these components, identify...
Identify three major components of the Medicare and Medicaid programs and, based on these components, identify at least two patient coverage gaps for each of the programs. Be clear when you describe the coverage and the gaps as they may relate to specific ages, patient populations, or disease entities. Use primary sources to identify the components and the gaps. Additionally, discuss your stand (criticize or defend) regarding the relevance of the Social Security program to the American public. Should the...
Based on the article and additional research, discuss in detail in a real life scenario how...
Based on the article and additional research, discuss in detail in a real life scenario how AI and Blockchain can be used to advance the work of an accountant or an accounting function within an organisation.
Based on your reading and analysis of the case study, post your response to the following:...
Based on your reading and analysis of the case study, post your response to the following: What challenges does Brown, the CIO, face in creating a process-oriented organization? What are the requirements for creating a process-oriented culture in an organization? To what extend does Pinnacle West address these requirements? Where is it lacking? Is it necessary to push the process-oriented culture to the entire company, or is having a process-oriented information technology organization sufficient for driving value from business information...
In 250 words or more, A research based discussion of the components of organizational stability. How...
In 250 words or more, A research based discussion of the components of organizational stability. How are they are evident in the organization?
According to Dr. Sigmund Freud, personality is based on three major components the id, ego and...
According to Dr. Sigmund Freud, personality is based on three major components the id, ego and superego. Briefly define these components and state your opinion of Freud’s theory.   By choosing two of the agents of socialization, explain how both have influenced your own development in a positive and or negative way. Please the back to if needed.
Discuss the advantage s of your internet-research-based approach of your classmate's library research based work. Should...
Discuss the advantage s of your internet-research-based approach of your classmate's library research based work. Should the two papers be considered equal when graded? Do you think others will review the journal and book researched paper as being of stronger academic quality? is your web researched paper likely to have a different perspective?
Answer the following questions based on your reading of "Take Your Licks" -- this week's required...
Answer the following questions based on your reading of "Take Your Licks" -- this week's required reading: 1. What is the point of this essay? 2. Who was Sisyphus? 3. Do you have an allusion, like Sisyphus, that you can add to your reflective essay? 4. What makes her ending powerful
Cloud Computing In your chapter 5 reading assignment, you will learn all about the components of...
Cloud Computing In your chapter 5 reading assignment, you will learn all about the components of a traditional information technology infrastructure. This includes all the equipment, beyond your desktop or laptop computer, which allows you to communicate and share information with others. Some of this equipment includes cables, servers, network devices, telecommunications lines, data storage systems, and other devices. Many of these components are usually found behind the scenes in a data center. There has been a developing trend in...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT