Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Risk Management Expert

Attempt all the problems.

Section-A

problem1) prepare brief notes on:

a)  VISA Security Model

b)  RADIUS and TACACS.

c)  CISO

problem2) Describe in detail the cryptography and encryption based solutions.

problem3)a) What do you understand by top-down approach to security implementation? Give its advantages.

b) What is Cost Benefit Analysis?

problem4) What is Intrusion Detection Systems (IDS). Describe different reasons for using IDS and various terminologies associated with IDS.

Section-B

Case Study: INFORMATION SECURITY MANAGEMENT

The following case material contains excerpts of some burning issues relating to information security concerns by several stakeholders.
Using banking industry as a point of reference, detail how you will, as a consultant whose services have been engaged for five (5) weeks, create a comprehensive security plan, which addresses several concerns and at the same time transform your client’s organisation into a more customer driven organisation under girded by the robust security system.

Issues to address should not only include information management concepts and tools, but also look at governance and standards, business continuity, leadership and compliance among others. References must be made to current best/good practices in other organisations, particularly banks and other finance-related establishments like insurance, mortgage and fund management firms.

A full professional report must be produced at the end of this consultancy exercise.

Call centre workers in Bristol who face-having jobs transferred to India have voted to go on strike.

The workers, who deal with Direct Debits for the TV Licence Authority, are taking action over plans by Capita to transfer 35 jobs.
Capita won franchise to operate call centres in Temple Street and the Pithay in the city in 2002.

The Communications Workers Union said it wanted talks with Capita. The strike would be held in the week of 22 January.
Banking information

Communication Workers Union spokesman Kevin Beazer told BBC News: "It's about 35 jobs but they won't give any commitment that there will not be further work going abroad.

“We've tried to move this forward but now members have balloted 96% to take industrial action.
"We do not feel people's personal banking information would be secure in India."

Nationwide building society says it is tightening security after theft of an employee's laptop containing customer information.
Security experts have raised fears that company's 11m customers can have been put at risk of …..

WASHINGTON - State Department employees snooped through passport files of three presidential candidates — Sens. Barack Obama, Hillary Rodham Clinton and John McCain — and department's inspector general is investigating.

State Department spokesman Sean McCormack said violations of McCain and Clinton's passport files were not discovered until Friday, after officials were made aware of the unauthorized access of Obama's records and separate search was conducted.
The incidents raise problems ……

Two new payment systems remove risk of giving credit card details online, but if the banks will not play ball the hackers would pounce
Two new systems claim to make it easier and safer to shop online, by letting you pay for goods directly from your bank account without having to hand over card details. But experts are warning consumers not to be "lulled into a false sense of security".

The POLi and eWise systems, launched this month, offer option to pay directly from bank account at supporting online retailers' checkout pages. Shoppers selecting the option are automatically taken to their bank's log-in page where, after they have manually logged in, a page appears on which the necessary payment fields are "pre-populated" with the correct amount and the retailer's bank account details.
Once the consumer has accepted the purchase, the funds are transferred and the retailer is given a confirmation code so they can ship the goods.

Without access to the banks, the crux of the potential security risk each system poses is that users need to download software to allow POLi and eWise to fill out payment forms on their behalf. While POLi requires users to download a Microsoft .Net application for the payment, eWise requires users to download an ActiveX program (which will only run in Internet Explorer, on Windows).
Systematic Failings

Few dispute the fact that the loss of two CDs holding 25m child benefit records, followed by 3m learner drivers' details has far-reaching implications for the transformational government programme. The erosion of trust in the security of public sector IT has dampened, if not eroded, fervor among officials and acceptance by the public of the need for large-scale  data sharing.

A full professional report should be produced at the end of this consultancy exercise. In addition to the above case material and scenarios, you are expected to do the following:

Provide an evaluative account of information management practices in the financial services sector, in particular you must:

• Identify and investigate problems relating to information security in the financial services sector.

• Identify critical success factors for effective information management, with particular reference to information security.

• Critically discuss future of information management in financial services sector, with the growing consciousness of and on information security.

Risk Management, Finance

  • Category:- Risk Management
  • Reference No.:- M93722

Have any Question? 


Related Questions in Risk Management

Summarize in one sentence how each of the following

Summarize in one sentence how each of the following organizations failed to practice risk management: a. Metallgesellschaft b. Orange County c. Barings d. Proctor and Gamble

Assignment risks responsibility planfor this assignment you

Assignment: Risks Responsibility Plan For this assignment, you will determine how you will monitor the risks that you have projected, as well as the unknown risks that occur during the course of the project. You will als ...

Identify and explain the primary methods of managing credit

Identify and explain the primary methods of managing credit risk for derivatives dealers ? Identify and explain four forms of netting ? Critique each of the three methods of calculating Value at Risk, giving one advantag ...

Risk response plan paperuse the wk2 team paper project plan

Risk Response Plan Paper Use the WK2 Team Paper project plan attached for you business model. Use the cpmgt300_r10_gg_wk3_risk_res_plan (1) as a guide for writing the paper. It is how it will be graded. Write a 1,050- to ...

1 risk-free rate what is a risk-free rate give an example

1. Risk-Free Rate. What is a risk-free rate? Give an example of an investment with a risk-free rate. Why is there no risk? 2. Risk Premium. What is a risk premium? Who might take advantage of it? Calculating a Risk Premi ...

Assignment risk management on hippa complianceonce your

Assignment: Risk Management on HIPPA compliance Once your topic has been approved by the faculty, you will develop a 500-750 word comprehensive outline that communicates the approved risk management topic. The outline is ...

Suppose you own 50000 shares of stock valued at 3550 per

Suppose you own 50,000 shares of stock valued at $35.50 per share. You are interested in protecting it with a put that would have a delta of 0.62. Assume, however, that the put is not available or is unfairly priced. Ill ...

Discussionrisk managementas the work of your risk

DISCUSSION Risk Management As the work of your risk management team (from the first discussion question) continues, the discussion of your team's risk management plan outline moves on and considers the following question ...

In one of his annual letters to shareholders of berkshire

In one of his annual letters to shareholders of Berkshire Hathaway, Warren Buffett wrote that trading derivatives has much more counterparty risk than does trading stocks or bonds because "a normal stock trade is complet ...

1 what are io and po strips which tends to be more volatile

1. What are IO and PO strips? Which tends to be more volatile in price? Why? 2. In what ways is a CMBS structure different from a CMO backed by residential mortgages? Why is default F risk in a CMBS offering given more a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro