Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
AssignmentList at least five security threats (types and definition) Banking industry, then answer the following 2 questions:How do these threats impact your industry(banking)what are some counterme
Assignment
- List at least five security threats (types and definition) Banking industry, then answer the following 2 questions:
- How do these threats impact your industry(banking)
- what are some countermeasures you (the security professional) use to protect the organization
Submission format
Use the "Assignment Format" below to prepare and submit a PowerPoint Presentation
Create a presentation consisting of approximately 6-8 slides...Should include (no more than 8 slides):
- One title slide (same topic Banking )
- One topic introduction slide
- Approximately 6-8 content slides
- One conclusion slide
- One current APA formatted reference slide
- @
- 1030 orders completed
- ANSWER
-
Tutor has posted answer for $13.00. See answer's preview
******** ******* in the Banking ************************************************************* ******* ** *** ******* IndustryIntroductionThe banking ****** ** ** default exposed to security ******* ***** ** ** ******* **** *** ********** of valuables ******** robberies ** *** ***** **** **** overtaken ** ****** ****** since ***** ******** **** ** ***** services ** *** * **** platform ************* ****** *** * ***** threat ** *** ******* ****** ***** they are ****** ******** ****** the traditional ******* robberies **** of ***** ******* **** led ** financial losses *** mistrust of the ******* systemsInsider ********** ******* ******* relate ** ******** ******* **** **** **** *** ******* ********* *********** **** ** these ******* *** intentional while others *** unintentional ***** **** suffer ******* ********* losses due ** *** **** level ** ****** **** ** the employees **** in *** ************* **** ** ***** frauds *** take years ****** ********* ***** *** ********* *** **** **** **** ********* ******* Such frauds cost *** ******* sector *** reduce ****** ***** ** *** industry *** ******* ******* *** ** minimized ** *** introduction ** ****** controls **** only ***** access ** those ******* ** access ******* data ** *** ****** Employee ******** **** ***** ******* ******* **** phishing ******* ******** ******** ****** ******** *************** of ******* ******* *** **** ******** ********* mechanismsThird PartiesBanking ************ **** ** **** third ******* for the provision ** certain ******** *** ***** parties are * possible ****** ***** **** ******* independently from *** ******* systems Third ******* **** ********** ******** ******* *** ** a ******* ******* ***** ******* can ****** the ******* ****** The ***** parties ********** *** **** ******* ***** ********** with *** **** ** ***** ******** *********** (Jacobs 2015) ************ of the *********** systems *** **** ** financial ****** *** ***** of ******** information The banking ****** ***** since the ******** ***** their ***** ** them ****** *** ****** **** ***** the banks *** not ***** vigilant *** ******** others ** ****** their *********** ** ******* **** *********** *** banking ****** should improve *** vetting ******* *** *********** *********** *** diligence is ******* ** ****** *** ******** ******* ***** by *** third party Frequent reviews ** ***** ******** *** procedures *** ********* ** assess ***** ******** preparedness ***** *** **** require *** ***** ***** to pay for *** ****** **** *** ****** ******* from ***** sideMalwareMalware attacks *** ****** ** *** ********* world ***** ******* attacks ***** ******* with *** ******* ******** system The malware can ****** *** *** **** or *** ******* ****** ******* ******* are **** to ****** other ******* to *** ******* ****** (Bhardwaj 2017) The attacks **** ** ********* ****** *** crippling of banking ******** *** loss of customer ********** Two-Factor authentication ******** *** *** ** ****** *********** through ******* ******* Banks ****** ******* against ****** ***** ******** ******* *** ********** ** ********** ******** ******** *** ******** ******* *** *** *** ** ******* ********* *** the ***** ***** *** bank ****** also ******* *** ***** and customers ** ******* ******** ************* ******** ********************** ** * threat ** *** ATM ******* in ***** ********* ****** *** cash stored in *** ATM ****** *********** ******** **** ******** *** ************* ** *** ****** *** ********** **** *** ATM ** ****** its computer ****** ****** hacking *** ****** ******** & ***** 2018) After the hack *** *** will **** all *** **** This threat **** ***** ** millions of ****** in *** banking sector ** ** * ***** threat to *** ******** ***** **** ****** *** **** *** over *** ******* ** **** *** customer access ***** easilyThe crime *** ** ********* through ********* ********* ******* *** ATMs ****** ** ********** ** **** ********* ******** when *** ****** detects ******** ******** **** ** the removal ** the ***** an ************ ** *** system ** *** ************ of malware ******** ******** such ** ******** should be introduced to ******* the ATM computer ****** ************ ******* ****** ** ***** ** ****** ******* activity **** importantly *** ******** ****** be ********** ******* ** *** ******* ***** exploited by **************** ******** ********* ********* ******* content on ******** identity and ****** synthetic identities ***** * ********* ******** the ********** make multiple ******** for loans until **** ****** * ******* ****** ******* ******* ***** **** the ****** history is ****** *** ***** ***** ****** **** ***** ** these ********* identities **** fraud leads ** ****** ** the ******* ****** **** ********* ******* ** ****** card ************** ***** *** ** prevented through ** ********* ************ process ***** ****** *** **** on ****** ****** ** issue ***** ** credit cards **** should ******** ***** ************ process *** ***** ****** ******** ***** ******* **** *** ****** ******** ************** ** ******* *** registration ******* *** **** should ******* social security ******* ***** *** birthdays **** *** ****** Security ************** *** bank should **** ******* ******** ******** **** ** ******* ******** ****** *********** **** **** ***** Primarily the **** should ******* *** ************ ******* ****** ******* ******** AttacksDenial of service ******* involves ********* the ****** **** ******** ******** **** end ** locking *** ********** customers *** ******* *** ***** **** ** **** the company’s ********** ** **** ** ******* ***** (Wilding ***** ***** attacks lead ** financial ****** ** the ******* ****** ** the intended ***** ** ********** The attacks **** lower *** ********** of *** ******* ****** in ***** ** ***** security ************ *********** ** leads ** ************** *** loss ** customer ***** ** **** customers *** *** ****** ****** * *** *********** can prevent DOS ******* ******* ********** ********** ** ****** *** identify *** attacks ********** also helps to ensure the ********** requests *** ********* The **** ****** **** ****** **** **** **** ** *********** ******** plan ** **** ** mitigate *** effects ** ** ****** *********** a ***** recovery plan should ** ** ****** to ****** the ***** *********** ** ****** ************************* threats ** *** ******* sector ******** lead ** ********* ****** *** *** **** ** public confidence ** *** sector The bank ** ********* **** ********** ******** wealth *** ** ****** employ ******* ******* ** ********** ******* ***** ****** ******** educating *** ****** and *** ********* ** ******** ******* **** ****** **** ******* ***** ********** ** ******* ******* ******** ********** and ****** help ******** *** ******* vulnerabilities ******* ** *** ****** *** ******* ********** ****** ****** ******* *** ***** ****** ******** ***** verification process ** ****** that only ********** ********* *** ****** ******* ******** security ***** **** *********** ********* **** ********* *** systems ** *** banks and ********************************************************** * ****** *********** * rising ****** ** new *** ******* ********* In ****** Banking ******** ******** *** **** ********** *** ******** *** ************ * (2016) Graph ********** the *** ** ********* ***** ********** Computer Fraud & Security ******* ********* * (2015) *********** *********** ********* *** *********** of ******* *********** ******** ** ******* *********** assurance John Wiley ***** *********** E * & ***** * ****** *** Security: * **** ***** ** ******** ******* ************* ******* of ******** ******* ** ********* ******* *** Engineering ***** ****** G ****** ***** **** ************** to ****** ** ******* breach ******** Fraud ***** ******** 2017(8) ********** E ****** *********** **** *** security: ********** and ************* workplace ******** ***** ***********