Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Bank Enterprise Information Security Policy

12/10/2020 Client: bingyanj Deadline: 7 Days

  The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)Here are some technical parameters of the Bank of Bowie.· Headquarters is located in Bowie, MD· Headquarters building has corporate offices and a branch on the lower level· Two branch offices are located in Bowie and Laurel

· Each of the three branches employees the following staffo Branch Managero Branch Security Officero Six Tellerso Two Loan Officers

· Corporate Headquarters employs the following staffo Officers and Directors§ Chairman/CEO/President/Director§ Vice-President/Secretary/Director§ Financial Officer/Treasurer§ Assistant Treasurer § Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes§ Chief Compliance Officer

o Employees§ Head Loan Officer § Senior Loan Administrator§ Two Loan Processors§ Escrow Processor§ Eight Customer Service Representatives§ Internal Auditor§ Compliance Officer§ Two Human Resources Personnel§ Five Information Technology Personnel

· Bank Offeringso Savings and Checking Accountso Loanso Deposit Products such as IRAso Online Banking

Information Technology Landscape· Primary corporate databases are maintained at the Headquarters and a backup location· Data is replicated routinely from the branches to the Headquarters· Headquarters and branch personnel use desktops for their day-to-day activities· Software consists of a number of standard applications, e.g., Office, and customized banking applications· The Bank of Bowie website provides static information about the bank· Electronic banking activities are outsourced to other providers· Data is archived by a third-party provider· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures

Vision/MissionBank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]

RegulationWe will simplify the government regulations for this activity. You must account for federal requirements for the following.· All financial transactions must have integrity.· All financial transactions must be audited and audit data must be retained for a period of six years.· Social Security Numbers must be kept confidential.· Customers must have access to their accounts at least every 48 hours.· Interest rates and other loan terms and conditions must be clearly disclosed to customers.


Submission One – Policies


Bank of Bowie requires a set of policies to guide their efforts. Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.  

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Writer Writer Name Offer Chat

Writers are writing their proposals. Just wait here to get the offers for your project...

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Headphones and earbuds paper docx - Origins reflection powerpoint - 1756 en2tr eds file download - Social Business Networking and E-Commer - Year 11 legal studies practice exam - Civilization and its discontents summary sparknotes - What accounted for high voter turnout in 1828 and rising voter turnout in the 1830s? - Is liz claiborne a devil worshipper - Doctor buenos días. no tiene usted muy (1) , ¿qué le ocurre? - Changing our lives thesis statement - Health Care Delivery Discussion 1 Reply - Parkinson's disease case study example - I sing because you are good - Nagios xi performance graphs - ME - Main - Dis 5 - 2002 yamaha v star 1100 stator - What is the true meaning of christmas essay - Julius caesar discussion questions - Inventory aggregation supply chain - Exxon Mobil and Chevron Corporation - Discussion: Using the Walden Library - Week 4 discussion - Trading account format pdf - Lickable nail polish - Which fact is not used to prove that pqr is similar to str? - 1 2 7z 4 1 5 5z 15 - Write an essay about the poem "The love song of J.Alfred Prufrock" - Fahrenheit 451 character analysis - Accounting 202 final exam answers - The objectification of women whose fault is it - Highly stretchable and tough hydrogels - Finding the best buy case study - Coaguchek xs system manual - Atlantic coast high school graduation 2019 - Craap test - Flat anterior bite plane - Our fear of immigrants - Pvc - Why is brian loftus leaving channel 8 - How does web 2.0 change security for the internet - Evaluation for internship student sample - COMMUNITY ASSESSMENT GROUP PRESENTATION - MUST BE RELATED TO COVID-19. 8- PAGES POWERPOINT - Track software inc integrative case 2 - Read and answer, business article - 2 year old observation paper - Which of the following bonds is the weakest - Understanding motivation and emotion 6th edition pdf - Mcdonald's recently made productivity gains by cutting the - Psychology essay writing tips - What is an appendix report - Case 3 walmart manages ethics and compliance challenges answers - 47th annual reelfoot arts & craft festival - Example of a 4 mat review paper - For each of the following errors considered individually - Repeaters inside communications satellites are known as - Compsis case study solution - Where did garrett's popcorn originate - Annotated Bibliography-Biology (Virginia Bog-Eared Bat) - Srm cloud computing - Walsingham youth pilgrimage 2016 - Sa desert parks pass - Jim cathcart fremantle arts centre - Short Essays - Public key cryptography and pki lab report - Conveyor belt project part 5 answers - MACLA2 - The death of the ball turret gunner answers - Boxer in animal farm represents - A countershaft carrying two v belt pulleys - Week 3 Project - Vcat service of documents - Worksheet molecular and ionic equations answers - Should college athletes be paid speech - Swagger wagon music video toyota - Sociology of Sport VI Essay - Assignment #1 - Rmf incident response plan template - Jack lukeys oyster saloon & caviar bar - Academic watch list - Bd high commission sydney camp - I formation playbook powerpoint - Rels201 wk3 paper - Big data 5v pdf - How to calculate true power - Acca p1 examiner name - Canadian spelling of neighbor - Talking cookie jar kmart - Koch ag and energy solutions wichita ks - 2 responses - Woolworths car insurance payment - Series circuits 14.1 worksheet answers - Answering questions - How to make a basic website using notepad - Nimbus inc makes brooms and then sells them - Old spice competitors - 5 star napkin folding - Na s h2o l naoh aq h2 g - Broward college math flow chart - Az-900 exam dumps pdf free download - His 200 historical analysis essay