StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

The Implementation of the Security Plan - Case Study Example

Comments (0) Cite this document
Summary
This case study "The Implementation of the Security Plan" focuses on the action plan that is to beef up the information security in the banks and ensure that all threats and vulnerabilities are reduced to a minimum. The program will use the various federal laws, policies and regulations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
The Implementation of the Security Plan
Read Text Preview

Extract of sample "The Implementation of the Security Plan"

Download file to see previous pages The implementation of the security measures will use the various software together to enhance security.
The purpose of the action plan is to beef up the information security in the banks and ensure that all threats and vulnerabilities are reduced to a minimum. The program will use the various federal laws, policies and regulations together with best practices from the industry to come up with an effective information security plan for the bank (Whitman & Mattord, 2014). The national institute of standards and technology is an important set the various information technology security measures that should be followed together with other bodies like national security agency, the office of management and budget among many others (Peltier, 2010). The paper will thus focus on the various programs and determine the various remedies that will help implement the system security plan.
To ensure that the information security regarding the business is safeguarded and that loopholes are dealt with immediately to prevent leakage and hacking and, therefore, unauthorized access to sensitive information of the bank and the accounts of the people.
To develop security measures and programs that will ensure that the employees and information regarding the assets of the company are safeguarded from outside threats and vulnerabilities and that will provide the bank with retaliatory programs in terms of preventing penetration to the banking information systems.
The plan covers all the banking departments, the managers, president of the bank, managers, supervisors, employees at all levels in the bank, all security personnel at the bank, interested parties and stakeholders, contractors and finally the guests who venture into the bank and access various facilities in the banks to name a few. The assets that the bank has and that can be accessed by individuals outside will be included in the implementation the action plan. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Implementation of the Security Plan Case Study Example | Topics and Well Written Essays - 1750 words, n.d.)
The Implementation of the Security Plan Case Study Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1873781-implementation-plan
(The Implementation of the Security Plan Case Study Example | Topics and Well Written Essays - 1750 Words)
The Implementation of the Security Plan Case Study Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1873781-implementation-plan.
“The Implementation of the Security Plan Case Study Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1873781-implementation-plan.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Implementation of the Security Plan

Implementation and Evaluation Plan

...The Implementation of the Security Plan... The Implementation of the Security Plan... Section D: Implementation Plan In the initial stages of this intervention, a program deign was made. Decisions were made based on the content, level of intensity and relevant issues to be addressed in the intervention program. Indeed smoking among nurses is a problem that has persisted for long, yet little has been done to mitigate it and its effects to this group of smokers. This plan for the implementation of the program actually does translate the design into a very effective operation that could alleviate the problem or reduce it to a greater extends. During planning for the implementation process, precision of relevant details and focused execution is of...
6 Pages (1500 words) Assignment

Change Implementation Plan

...The Implementation of the Security Plan... The Implementation of the Security Plan... implementation plan Introduction This paper attempts to analyze the current situation in the unit in the wake of the management’s decision toimplement the new shift plan. The nursing unit’s values and goals will be identified to understand goals and interests of the unit and the strategies needed to implement the plan. Attitudes, concerns and alternative strategies will also be studied to make the implementation of the plan effective while negotiating with all stakeholders. Aims and objectives Aim- The main aim of this paper is to identify potential pitfalls in the implementation of the new shift plan in the unit and to negotiate effective strategies of...
6 Pages (1500 words) Essay

Implementation Plan

...The Implementation of the Security Plan... The Implementation of the Security Plan... Plan Table of Contents Table of Contents 2 Executive Summary 3 2- Background Information 3 3- Scope 4 6- Implementation Schedule 6 9- Conclusion 8 Bibliography 8 1- Executive Summary The project development life cycle is a collection of activities those are performed to develop and manage projects. Each stage of business information system lifecycle is really significant for appropriate handling of the system and its effective development. The system implementation phase is the most significant system stage of development. In this stage we should be careful for the different aspects of the business system working in the original and physical working environment....
2 Pages (500 words) Essay

Security plan

...The Implementation of the Security Plan... The Implementation of the Security Plan... head: Security plan for batteries + business Security Plan for Batteries + Business Affiliation December 2009 Table of ContentsTable of Contents 2 Abstract/Executive Summery 5 1- Business Background 6 2- Scope 6 3- Security Plan responsible person 7 3.1 Batteries+ IT Security Officer 7 3.2 Batteries+ IT Security Manager 8 3.3 Notification 8 4- Unit Plans 8 4.1 Requirements 8 4.2 Mandatory Topics 9 4.2.1 Plan Title 9 4.2.2 Plan Scope 9 4.2.3 Responsible Personnel 9 4.2.4 Host and User Identification 10 4.2.6 Management Responsibility 10 4.2.7 Optional Topics 10 5- Critical Resources 10 6- IS technology Security Initiative 11 7- Servers Security 13 7.1- General 13 ...
15 Pages (3750 words) Essay

Globalization and Implementation Plan

...The Implementation of the Security Plan... Morocco is one of the most famous Arab countries with a population of about 31,627,428 (July est according to the world fact book of CIA. It has a land total of 446,550 sq km and shares its borders with Algeria, Western Sahara, Spain (Ceuta), Spain (Melilla). Arabs and Berber comprise of 99.1% population and others are 0.7% along with 0.2% Jew population. Morocco offers a favourable business environment as they are found to be encouraging foreign investments and are willing to facilitate them with a number of macro economic policies, by providing trade liberalization and a number of structural reforms. But according to the World Banks 2009 report, there is an excessive bureaucratic red tape in Morocc...
7 Pages (1750 words) Research Paper

Implementation Plan

...The Implementation of the Security Plan... The Implementation of the Security Plan... Security Implementation Plan Bryant Wiersema American Public System Professer Foltz The paper is a preparation of MEMATECH Solutions Limited Information Security Implementation Plan. The paper covers and discusses the areas of ISCBK (Information Security Common Body of Knowledge) that incorporates the various groups of information security. It also touches on the success principles and the information security. In addition, the paper outlines the planning guidelines towards the aims, security policies, and standard taxonomy. The set policies and guidelines comply with rules and standards of HIPAA security. Consequently, the policies and guidelines of the...
20 Pages (5000 words) Essay

Implementation plan

...The Implementation of the Security Plan... The Implementation of the Security Plan... Implementation Plan Project Implementation Plan The VOSS premium bottled water brand is sourced from Norway, and distributed in different countries. It has established itself as an ultra premium brand of water sold as a luxury brand in top restaurants and hotels. It targets the upper class, which appreciates class associated with a basic product. The introduction of VOSS bottled water in Qatar followed a similar business strategy. It targeted only the top restaurants and hotels in big cities. The firs focus was the Doha city. The implementation of launching the product in Qatar involved numerous tasks scheduled to take place at different times. In an effort to...
2 Pages (500 words) Case Study

Implementation Plan

...The Implementation of the Security Plan... The Implementation of the Security Plan... Plan al Affiliation INTRODUCTION The purpose of this paper is to draft an implementation plan for installing a new information system for the DaimlerChrysler (DC) Company. The current system operated by the organization is not integrated with all the essential components of the entire company network. That is why the current audit has revealed major gaps within the current information system that have to be resolved in order to streamline the business processes. The implementation proposal aims to lift up the organization’s value through minimizing operational costs by cutting down on unnecessary budgets and spending (Crespi, Criscuolo & Haskell, 2007). This...
5 Pages (1250 words) Case Study

Implementation plan

...The Implementation of the Security Plan... The Implementation of the Security Plan... Plan Introduction Catheter Associated Urinary Tract Infection (CAUTI) is increasingly becoming common in today’s world. CAUTI accounts for up to forty percent of health care associated infections and is responsible to the high rate of mortality in patients affected. Use of the indwelling catheters is the most common cause of CAUTI. A good number of patients who currently have indwelling catheters are at greater risk of infection from bacteria. Women are the most affected. Once bacterial infection sets in, some of the patients go on to develop CAUTI. CAUTI is particularly common in patients under long-term care (LTC). Method of Obtaining Approval The number one ...
6 Pages (1500 words) Essay

Security Policy Implementation

...The Implementation of the Security Plan... The Implementation of the Security Plan... Security Policy Implementation Table of Contents Policy ment Tier will have an effective information security policy which will hinder intruders from accessing company information and also guarantee safety of the company information. Purpose The purpose of the information policy is to ensure safety of the Tier 1 information and data. Scope The policy will cover all technicians and workers working at Tier 1. Definition Security information security policy is the guidelines and procedures to govern the information and data. Tier 1 will have an effective information security which will guarantee safety of company’s data. Risk Organization’s information is sensiti...
3 Pages (750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic The Implementation of the Security Plan for FREE!

Contact Us