StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security and a Recommendation Memo to the CIO - Business Plan Example

Cite this document
Summary
This business plan "Security Plan and a Recommendation Memo to the CIO" is meant to establish and state the policies that govern Banking Solutions Inc.’s IT standards as well as practices. The plan will protect the organization’s information and its critical data resources…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful

Extract of sample "Security and a Recommendation Memo to the CIO"

Banking Solutions Inc. is currently facing significant information security problems. The sensitivity of its business operations requires the use of highly secured information systems. An information security plan has been designed to help solve the problem. The plan incorporates three key technological security programs. These include firewall protection technology, account lockout technological process, and a remotely controlled access technology. A combination of these technologies would ensure that all possible threats to the organization’s information are mitigated.

The security plan will ensure that security on information is promoted with respect to the organization’s policies and government regulations. The main objective will be ensuring continuity of the business, minimizing information security risks, and maximizing the returns on investment (ROI). A close analysis has shown that although the investment cost would be relatively high, the financial benefits would be high. This is because the number of risks would be minimized greatly. Investors are likely to be attracted to the business because of the increased profitability and decreased risks of losses. This follows the fact that security controls would be in place to increase customer confidence as well. It is therefore recommended that the plan be reviewed the soonest possible in order to facilitate the necessary steps for implementation. It is also advisable to initiate any changes on the plan where necessary to perfectly meet the organization’s needs and budget especially given the prevailing changes within the business environment.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Plan and a Recommendation Memo to the CIO Business Example | Topics and Well Written Essays - 1250 words, n.d.)
Security Plan and a Recommendation Memo to the CIO Business Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/2090005-security-plan-and-a-recommendation-memo-to-the-cio
(Security Plan and a Recommendation Memo to the CIO Business Example | Topics and Well Written Essays - 1250 Words)
Security Plan and a Recommendation Memo to the CIO Business Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/2090005-security-plan-and-a-recommendation-memo-to-the-cio.
“Security Plan and a Recommendation Memo to the CIO Business Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/2090005-security-plan-and-a-recommendation-memo-to-the-cio.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Plan and a Recommendation Memo to the CIO

Assignment 3 Acquisition Planning

The procurements in the DHS are awarded by the Office of Procurement Operations (OPO) in consultation with the Component IT and Procurement communities and Chief Information Officer (cio).... In HHS, each contracting activity shall prepare an annual Acquisition plan as far in advance with each fiscal year as possible.... c) Formal acquisition plan- a formal acquisition plan identifies all vital cost, technical and business issues of a requirements and gives certain or specific solutions to address any critical issue that might arise during the acquisition proposes (Herz & Baller, 1971)....
3 Pages (750 words) Assignment

Project Specification for the Auditors

The author highlights the security plan to guarantee the exchange of information, B2B infrastructure, and transfer security as well.... Even though it's frequently intelligent to extend to five-year plan for IT security, new practical application and new risks are consistently rising....
8 Pages (2000 words) Essay

Vulnerability Assessment Systems

My analysis suggests that VAS and IDS have separate internal functions for the security of the computer systems and both must be a part of a computer system for complete security control.... ulnerability assessment systems are those security scanning tools that assess level of threat that can penetrate a system.... "Generally, the tools can detect known security flaws or bugs in software and hardware, determine if the systems are susceptible to known attacks and exploits, and search for system vulnerabilities such as settings contrary to established security policies"....
11 Pages (2750 words) Essay

Prevention: Human Factors

This system is very data sensitive and requires extensive security policies to gain credit with international customers.... he employee training for the use of systems is There is a lack in the security training which we have observed.... The employee training for the use of systems is adequate but there is a lack in the security training which we have observed.... At The Company Employee training so far regarding security has been confined to six hours of lectures followed by a video and an annual guest lecture which is more of socializing than a purposeful study and evaluation....
35 Pages (8750 words) Essay

Success of WorldCom

The paper 'Success of WorldCom' presents WorldCom which appeared to be a great success story.... In 1983 partners led by former basketball coach Bernard Ebbers, sketched out their idea for a long-distance company on a napkin in a coffee shop in Hattiesburg, MS.... hellip; The author of the paper states that Bernard Ebbers was named CEO in 1985 and the company went public in Aug....
9 Pages (2250 words) Case Study

The Success of Flayton Electronics

The following paper entitled 'The Success of Flayton Electronics' presents Flayton Electronics firm that noted that the security of its customer data had been compromised and they had to make decisions on steps they should undertake to deter such invasions.... The managers of Flayton Electronics did not carefully take a key interest in the area that receives constant and careful attention, which is the security of the customers' data.... According to the case study, the critical success factors in Flayton Electronics firm were to ensure that the security of the customer's data, attract and satisfy new customers, and to create successful relationships with the customers....
5 Pages (1250 words) Case Study

Promoting Information Security in Banking Solutions Inc

Besides, only some key plan participants have been issued with a plan copy, with the rest of the copies being stored on the network.... Information about the plan could thus be accessed by untargeted individuals, which is a major security threat (Hurst, 2013).... The banking organization has not even provided adequate training to the critical plan participants regarding the use of DRBCPs.... This case study "Promoting Information security in Banking Solutions Inc" focuses on the major information security issue faced by Bank Solutions Inc....
5 Pages (1250 words) Case Study

Information Security Policy for ABCD University

At the core of this protection plan and strategy are the university's research and structural project-derived data, information, and technology.... This paper "Information security Policy for ABCD University0 " outlines the institution's plans and strategies to be used in safeguarding its information and physical technology facilities.... This paper discusses different types of security, controls and programms.... The information security policy is thus instrumental in ensuring the university protects and makes confidential its information, data and IT assets....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us