Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Industry: banking  I. Cover page <insert APA formatted Cover page with title you submitted in topic paper>Title: Executive Report for <Insert the name of your security program here>  II.

Industry: banking 

I.    Cover page

       <insert APA formatted Cover page with title you submitted in topic paper>

Title: Executive Report for <Insert the name of your security program here>

II.  Report Content 

<the following sections must be discussed in your executive report>

You are required to use the previously selected "topic", security issues, and impact to your industry to compile "a to c"  of the report.  The report should include the following topics.

  1. Industry sector(Banking)

(You may rewrite and cite (to avoid self-plagiarism) some of the content from the topic description and the presentation. Before incorporating previous statements, be sure to make any suggested corrections reflected in your grade book).

  1. Summary of a significant issue in your sector

(You may rewrite and cite (to avoid self-plagiarism) some of the content from the topic description and the presentation. Before incorporating previous statements, be sure to make any suggested corrections reflected in your grade book).

  1. Summary of significant security impact on your selected industry

(You may rewrite and cite (to avoid self-plagiarism) some of the content from the topic description and the presentation. Before incorporating previous statements, be sure to make any suggested corrections reflected in your grade book).

  1. Security mitigation 

Conduct further research to mitigate each of the issues (in item a to c above).  In no more than three paragraphs of between 150 and 300 words, explain the impact of the security issues.

The section should address:

  1. Mitigation strategies for each security issues (from previous assignments) presented
  2. Describe the security triad are you addressing
  3. Identify at least 3 legal consideration for your industry with respect to implementing security measures for your industry
  1. Recommendation for the implementation process

 III.     APA formatted “Reference” page <insert the APA formatted reference page>

  • APA format with no less than three (3) academic references
  • Do not use Wikipedia as reference
Show more
Geffmurimi
Geffmurimi
  • @
  • 1030 orders completed
ANSWER

Tutor has posted answer for $20.00. See answer's preview

$20.00

************** ******* in *** Banking ******************************************************* Threats ** *** ******* **************** ****** (Banking)The ******* ****** ***** many risks *** ** ** ** entity **** ********* **** ** *** valuables **** ********** **** been **** in stealing **** *** ***** **** *** called for effective ********** measures ***** ******* institutions Some ** *** ******* **** ***** **** are ******* jackpotting ***** ***** ***** ***** others ***** have **** ********* ** **** ** *** *** ************ research *** ***** aimed ** finding appropriate ********* ******* the ******* Hackers ***** *** advanced ******* ** ensure **** **** ********** ***** ********* (Ortmeier ***** This *** *** ** extensive research ***** ** ******* **** ** ****** ********** ******* **** ********* losses ******* the challenge that banks **** ********** ***** *** ******* ************** ** ****** confidence is * ********* **** has *** *** public ** **** ***** ** the ******* institutions ** **** **** **** ***** valuables **** *** **** ********* **** third-party ***** *** **** ******* * contract with *** **** ******* **** ***** **** ***** ** ******** *** ******** ******* *** **** and ***** parties ******* **** ** be ************ ***** they **** ******* passwords *** other authentication ***** **** need ** be ************ ** ******** of ********* **** *** **** ***** has ***** led ** ****** ***************** ** **** exhibited between the **** personnel *** the third ***** members A *** of ***** is lost ** *** ******* ***** ***** ** **** of ********** ** *** ****** ********* ***** ***** ***** Thus there is need to **** company *********** ******* *** staff *** ***** ********************* approachA two-step ************** ******** *** **** ********* ** *** ******* ****** This ******** the *** of ********* and ******* identification ******* **** *** ******** **** ** ********** *** *********** of *** two-step ************ approach ******** security ** the ******* sector **** **** an ******** is ******** ********** ***** the ****** can ** restored *** safety ** ********* **** ** improved Furthermore *** ******* to data protection ******* can help ******* the ******** ****** This ******** the ***** ** ******* ******** **** ** ********* **** *** updated ******** *** two-step authentication ********** ** ******* hard for ******* and ***** ********* ** ****** the ******* *********** ********* et ** ***** Protection ** *** ******* *********** **** ******* *** hackers can ** ******************* MitigationThe ****** ********* ***** have *********** ******** solutions ***** the ******* ****** should ********* strict auditing *** ********** ******** ** security ***** within *** ******* ****** *** ********** *** be **** ******* ******** software *** ****** ******** ****** ** the systems ** ** **** ********* for the ******** ** educate the employees *** *** customer ** *** ******** ******** ***** and ********** strategies ********* empowers ********* and ********* to ******** *** ******* ******** ****** ****** major ****** are ******** ********* ***** ******** ***** ** is **** ******* ** consider the installation of ****** access ******** ** ensure **** only authorized ******* *** ****** the *********** ******* *** industry should *** *** *** third ******* for integrity ****** *** ****** **** they *** ****** *** *** ******** ******* **** ******* from ***** *** ******** ******** updates ********* *** ******** ******** ** *** ****** **** help *** **** ******* security ******* Physical ******** ****** **** be ********** to prevent ******** ********* to *** *************** TriadThe ******** mitigation ********** ** ******* *** *** ********* ** the ******** triad ***** ******** confidentiality ********* *** availability (Lewis ***** The banking ****** ***** ************ *********** ******** ** *** ******* ** ***** ********* ***** ********* **** avail ***** ******** *********** to *** banking ****** * ******** ****** ** the ******* ****** ***** **** ** the ***** ** customer information and therefore ********* the *************** ******* of the security triad It *** ** ** ********** **** **** ****** ****** ** keep their ******** ******* *** ************ A ****** ****** ** the ******* industry *** ****** impact *** whole ******* ***** ****** **** **** ***** ********** ** the ******** system *** banking ****** **** ******** **** ****** ** ********* ***** it ***** critical *********** *** ********** in the **** systems *** impact the ******** ***** ** **** *********** ** *** ******* *** ******* ********* ****** ** allowed ** ****** ** ****** *** *********** in *** ******* ****** ** is **** ********* ** protect the availability ** **** ****** ****** ** guaranteed ********** ****** to ***** ***** when **** need **** The ********** ** *** ******* ** ********** attacks ensures *** ********** ** ******* ************* ***************** **** ***** considerations **** ** *** *********** ***** ******** requirements ****** confidentiality *** ********* ** ************ *** security ******** ** **** ** ********* ** ****** **** *** *** ***** ************ ********** for *** ******** are ******** Organizations **** also ** ******** to strive to attain **** **** **** required a legal ******* *** organizations ****** **** *** ** ****** **** confidentiality ****** of *** ****** The client provides ********* *********** ** their clients ***** **** ** ******* *** *********** **** **** **** *** their clients They ****** **** try ** **** ***** clients **** confidentiality ****** **** **** they ***** information **** third parties (Wilding 2017) *** **** also has to ******** the ************** **** **** for *** ****** ** **** ** * ******** attack *** ****** waiver ** ***** contract **** their clients **** *** ******* **** **** the responsibility they have *** their ******* ***** **** ** ****** **** **** *********** ******** ***** **** ****** that ***** clients *** compensated ** **** of a ******** breachImplementationThe ************** ******* for *** ******** security ******** ****** ***** **** ************* **** ******** ******* ******* ***** *** security ***** should *********** *** ********* *** **** ************** plans *** ***** and ********* ****** **** be ******* ** *** new ******** measures in the sector ** is also ******* to sufficiently ****** *** *** ***** ******** ******* *** ****** ******** ******** ******* **** *** ******** members is **** ********* *** *** ******** project ******* ******** ********** ****** ****** *** ******* ******** ****************************************** * ***** ******** * (2016) ************** ******* security In *** *** ************ *** ******** ******** ****** ****************** * & ***** * ****** ********* ******* **** ********** *** ****** Bloomsbury PublishingLewis K ****** ******** Policies *** Plans Development ** ******** *** Information ******** ******** *** ******** ****** KaufmannOrtmeier P * ****** ************ ** ******** *************** * K ****** * *********** G ***** Reddy * * ***** **** ********* ************** ***** *** internet ******* ** 2017 *** IEEE International ********** ** Recent Trends ** Electronics *********** ***** ************* ********** (RTEICT) *** 1810-1814) *********** E ****** *********** risk *** ********* ********** *** ************* ********* ******** crime *****************

Click here to download attached files: Banking industry.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question