Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Risk Management Expert

Attempt all the problems.

Section-A

problem1) prepare brief notes on:

a)  VISA Security Model

b)  RADIUS and TACACS.

c)  CISO

problem2) Describe in detail the cryptography and encryption based solutions.

problem3)a) What do you understand by top-down approach to security implementation? Give its advantages.

b) What is Cost Benefit Analysis?

problem4) What is Intrusion Detection Systems (IDS). Describe different reasons for using IDS and various terminologies associated with IDS.

Section-B

Case Study: INFORMATION SECURITY MANAGEMENT

The following case material contains excerpts of some burning issues relating to information security concerns by several stakeholders.
Using banking industry as a point of reference, detail how you will, as a consultant whose services have been engaged for five (5) weeks, create a comprehensive security plan, which addresses several concerns and at the same time transform your client’s organisation into a more customer driven organisation under girded by the robust security system.

Issues to address should not only include information management concepts and tools, but also look at governance and standards, business continuity, leadership and compliance among others. References must be made to current best/good practices in other organisations, particularly banks and other finance-related establishments like insurance, mortgage and fund management firms.

A full professional report must be produced at the end of this consultancy exercise.

Call centre workers in Bristol who face-having jobs transferred to India have voted to go on strike.

The workers, who deal with Direct Debits for the TV Licence Authority, are taking action over plans by Capita to transfer 35 jobs.
Capita won franchise to operate call centres in Temple Street and the Pithay in the city in 2002.

The Communications Workers Union said it wanted talks with Capita. The strike would be held in the week of 22 January.
Banking information

Communication Workers Union spokesman Kevin Beazer told BBC News: "It's about 35 jobs but they won't give any commitment that there will not be further work going abroad.

“We've tried to move this forward but now members have balloted 96% to take industrial action.
"We do not feel people's personal banking information would be secure in India."

Nationwide building society says it is tightening security after theft of an employee's laptop containing customer information.
Security experts have raised fears that company's 11m customers can have been put at risk of …..

WASHINGTON - State Department employees snooped through passport files of three presidential candidates — Sens. Barack Obama, Hillary Rodham Clinton and John McCain — and department's inspector general is investigating.

State Department spokesman Sean McCormack said violations of McCain and Clinton's passport files were not discovered until Friday, after officials were made aware of the unauthorized access of Obama's records and separate search was conducted.
The incidents raise problems ……

Two new payment systems remove risk of giving credit card details online, but if the banks will not play ball the hackers would pounce
Two new systems claim to make it easier and safer to shop online, by letting you pay for goods directly from your bank account without having to hand over card details. But experts are warning consumers not to be "lulled into a false sense of security".

The POLi and eWise systems, launched this month, offer option to pay directly from bank account at supporting online retailers' checkout pages. Shoppers selecting the option are automatically taken to their bank's log-in page where, after they have manually logged in, a page appears on which the necessary payment fields are "pre-populated" with the correct amount and the retailer's bank account details.
Once the consumer has accepted the purchase, the funds are transferred and the retailer is given a confirmation code so they can ship the goods.

Without access to the banks, the crux of the potential security risk each system poses is that users need to download software to allow POLi and eWise to fill out payment forms on their behalf. While POLi requires users to download a Microsoft .Net application for the payment, eWise requires users to download an ActiveX program (which will only run in Internet Explorer, on Windows).
Systematic Failings

Few dispute the fact that the loss of two CDs holding 25m child benefit records, followed by 3m learner drivers' details has far-reaching implications for the transformational government programme. The erosion of trust in the security of public sector IT has dampened, if not eroded, fervor among officials and acceptance by the public of the need for large-scale  data sharing.

A full professional report should be produced at the end of this consultancy exercise. In addition to the above case material and scenarios, you are expected to do the following:

Provide an evaluative account of information management practices in the financial services sector, in particular you must:

• Identify and investigate problems relating to information security in the financial services sector.

• Identify critical success factors for effective information management, with particular reference to information security.

• Critically discuss future of information management in financial services sector, with the growing consciousness of and on information security.

Risk Management, Finance

  • Category:- Risk Management
  • Reference No.:- M93722

Have any Question? 


Related Questions in Risk Management

Empirical studies have established that the betas of

Empirical studies have established that the betas of conglomerate firms have been significantly above 1. What does this imply about diversification as a strong motive for conglomerate mergers? Over a long period of time ...

Interpret the following statements about value at risk so

Interpret the following statements about Value at Risk so that they would be easily understood by a nontechnical corporate executive: a. VAR of $1.5 million, one week, probability = 0.01 b. VAR of $3.75 million, one year ...

Discussionrisk managementas the work of your risk

DISCUSSION Risk Management As the work of your risk management team (from the first discussion question) continues, the discussion of your team's risk management plan outline moves on and considers the following question ...

Case 17 questionsseattle cancer centerleasing decisions1 as

CASE 17 QUESTIONS SEATTLE CANCER CENTER Leasing Decisions 1. As a baseline, assume all cash flows have the same risk; that is, ignore residual value risk and use the same discount rate for all lessee and lessor cash flow ...

As we discussed in the chapter futures can be used to

As we discussed in the chapter, futures can be used to eliminate systematic risk in a stock portfolio, leaving it essentially a risk-free portfolio. A portfolio manager can achieve the same result, however, by selling th ...

Assignment organizational risk appetite and risk

Assignment: Organizational Risk Appetite and Risk Assessment Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization h ...

Risk management paper you have the choice of one of two

Risk Management Paper you have the choice of one of two assignments. For your Risk Management Paper you have the choice of one of two assignments. 1) A term paper discussing the evolution of risk management in publicly t ...

Managing financial risk is an important responsibility of

Managing financial risk is an important responsibility of medical managers. Risk management is an important process to keep the finances of all healthcare organizations safe. Discuss the following: 1. What are the financ ...

Discussionrisk managementassume you have just been assigned

DISCUSSION Risk Management Assume you have just been assigned to a project risk team composed of five members. Your task, as project manager, is to develop a process for handling risks to the project. Because this is the ...

What is the function of an insurance-linked note for risk

What is the function of an insurance-linked note for risk management? What methods can a company use to transfer risk? How does a core risk differ from a non core risk? How can derivatives be used in risk management? Wha ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen