Bank Solutions Inc. Security Plan

1676 Words4 Pages

Introduction
Bank SolutionsInc. is in need of a tailored IT security plan for strategic advantage, regulatory compliance, and risk mitigation. As an organization that relies on IT for innovation and technical advantage, it is essential to invest in necessary security controls. This will ensure the infrastructure supports a layered security posture to detect, deter, eliminate or reduce as many vulnerabilities and exposure as possible. It is the responsibility of executive management to determine the amount of exposure and risk their organization is willing to accept.
Objectives
The main objectives of this security plan are to describe a security strategy and identify recommended technologies to ensure Bank Solutions has the ability to achieve their objective and ensure that the mission and goals of the organization are positively impacted.
Security Strategy
Our security strategy is a methodology for defining security policies and necessary controls. This includes the assessment of all possible types of risk i.e.: Malicious hacker; also the prediction of different types of attack for example, logic bombs and viruses. This plan includes a proactive and reactive strategy to protect the confidentiality, integrity, and availability of our organizations information and data.
The proactive strategy is to predict the possible damage, determine all vulnerabilities then implement plans, develop security policies and controls to best minimize those vulnerabilities. The reactive strategy is to assess damage and determine the possible causes, and afterwards implement and develop security policies and controls to repair the damage. Lastly, implement a plan of contingency to prevent further occurrence. The annual review of these plans and po...

... middle of paper ...

...itepapers/threats/vulnerabilities-vulnerability-scanning-1195
Kinn, D., & Timm, K. (2002, July 18). Justifying the Expense of IDS, Part One: An Overview of ROIs for IDS | Symantec Connect Community. Retrieved from http://www.symantec.com/connect/articles/justifying-expense-ids-part-one-overview-rois-ids

References (cont.)
Mortazavi, S.H. & Avadhani, P.S. (2013). RSA cryptography algorithm: An impressive tool in decreasing intrusion detection system vulnerabilities in network security. International Journal of Innovative Technology and Exploring Engineering, (4), 306. Retrieved from: http://www.ijitee.org/attachments/File/v2i4/D0527032413.pdf
SANS Institute, (2001). Understanding intrusion detection systems. SANS Institute InfoSec Reading Room. Retrieved from: https://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337

Open Document