-
Essay / Banking Solutions Inc. Security Plan - 1676
IntroductionBanking Solutions Inc. needs a tailored IT security plan to achieve strategic advantage, regulatory compliance and risk mitigation. As an organization that relies on IT for innovation and technical advantage, it is essential to invest in the necessary security controls. This will ensure that the infrastructure supports a multi-layered security posture to detect, deter, eliminate or reduce as many vulnerabilities and exposures as possible. It is the responsibility of senior management to determine the level of exposure and risk their organization is willing to accept. Objectives The primary objectives of this security plan are to outline a security strategy and identify recommended technologies to ensure that Bank Solutions has the ability to achieve its objective. and ensure that the organization's mission and objectives are positively impacted.Security StrategyOur security strategy is a methodology for defining the necessary security policies and controls. This includes assessing all possible types of risks, namely: malicious hacking; also predicting different types of attacks, for example logic bombs and viruses. This plan includes a proactive and reactive strategy to protect the confidentiality, integrity and availability of our organization's information and data. The proactive strategy involves predicting possible damage, determining all vulnerabilities, then implementing plans, developing policies and security controls to best minimize these. vulnerabilities. The reactive strategy involves assessing the damage and determining possible causes, then implementing and developing security policies and controls to repair the damage. Finally, implement a contingency plan to prevent this from happening again. The annual review of these plans and po...... middle of document ......itepapers/threats/vulnerabilities-vulnerability-scanning-1195Kinn, D., & Timm, K. (2002, July 18) . Justifying IDS Spending, Part 1: An Overview of IDS ROI | Symantec Connect Community. Retrieved from http://www.symantec.com/connect/articles/justifying-expense-ids-part-one-overview-rois-idsReferences (continued)Mortazavi, SH & Avadhani, PS (2013). RSA cryptography algorithm: an impressive tool for reducing vulnerabilities of intrusion detection systems in network security. International Journal of Innovative Technology and Exploring Engineering, (4), 306. Retrieved from: http://www.ijitee.org/attachments/File/v2i4/D0527032413.pdfSANS Institute, (2001). Understand intrusion detection systems. SANS Institute InfoSec Reading Room. Retrieved from: https://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337