Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

IT Controls and Countermeasures

Objective: Analyze the compliance and regulatory issues that face U.S. companies with regard to cybersecurity and information technologies and how to address them within the policy framework.

Competencies: Critical thinking, decision making

In 8-10 double-spaced pages, each student analyzes the policies, vulnerabilities, risks and internal controls for a French bank that was a victim of a large scale fraud and recommends improvements to the company's IT security policies. Relate the identified policies, vulnerabilities, risks and internal controls to the technical material and vulnerability identification & exploitation materials presented in the Erickson and Weidman texts.

This assignment calls for a systematic analysis of an organization's policies, vulnerabilities, risks, and internal controls as well as their relationship to current vulnerability identification and exploitation technologies. Many scientific, engineering, information, and accounting disciplines advocate general steps to problem solving utilizing a systems approach. At this point in your academic career, you should be proficient at applying such a general approach to solving specific problems. Select and adapt such an approach with which you are most comfortable from your prior professional and academic experiences to apply to this assignment. Suggested steps to the general systems approach to problem solving are as follows:

1. Define the problem
2. Identify evaluation criteria/measures of effectiveness
3. Identify alternatives/solutions
4. Evaluate/analyze alternatives utilizing analytical techniques consistent with step 2 criteria/measures
5. Select and display preferred alternative(s)/solution(s) consistent with the analysis in step 4
6. Implement and monitor step 5 solution(s)


Refer to the French Bank in the following URLs
• http://www.spiegel.de/international/business/0,1518,530673,00.html
• http://www.msnbc.msn.com/id/22818054/ns/business-world_business/t/french-bank-blames-trader-billion-fraud/
• http://www.cbsnews.com/stories/2008/02/04/business/main3785088.shtml

and your specific readings regarding security controls, audits, inspections, risk assessment, and countermeasures. Utilizing an appropriate methodology for analysis (which may be adapted from the above 6 steps), identify a set of 7-10 recommendations toward solving the fraud issue of the French Bank. The systems analysis approach as applied within the areas of risk analysis, vulnerability assessment, internal audits, and policy analysis should yield adequate justification for your recommendations.

There are three additional things to keep in mind. First, defining the problem or issue will require a data gathering stage. Second, problem solving is not a once-through sequence of steps always performed in a specified order. It is full of iteration and feedback loops. Finally, you will not be able to implement and monitor your recommendations in this assignment. Perhaps that means provisions for implementation and monitoring should be part of your evaluation criteria. It does not help the client to offer solutions that are prohibitively costly to implement.

The students

• identify and discuss the policies, vulnerabilities, risks and internal controls for the French bank

• evaluate the weaknesses and impact on secure bank operations

• recommend and discuss 7-10 security controls and countermeasures for mitigating problems in and improving the bank's security posture.

• discuss the methods that organizations can use to effectively achieve the adoption and implementation of the security policies, controls and countermeasures.

Prepare your paper in either Word or PDF format as your instructor requires. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. References are NOT included in the page count.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91524566
  • Price:- $80

Priced at Now at $80, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Question 1 for rsa encryption we need a modulus that is the

Question : 1. For RSA encryption we need a modulus that is the product of two prime numbers, p and q. Assume p = 11 and q = 13, and thus n = p*q = 143. In this case, the RSA encryption exponent e must be relatively prime ...

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As