College
Essay
Design & Technology
Pages 15 (3765 words)
Download 0
Title: SECURITY ASSESSMENT CHECK FOR PREMIER COMMERCIAL BANK Name: Professor: Institution: Course: Date: EXECUTIVE SUMMARY I am a senior employee of the Premier Commercial Bank working as an Internal Systems Controller in the IT Department. My major duties involve ensuring that all systems and security measures within the bank are well advanced and kept up to date…

Introduction

I performed this security check in collaboration with Securex security firm Premier commercial bank is one of the largest asset financed bank in the region that has a broad customer base across the region. The bank deals in so many transactions and they are as outlined; depository transactions, withdrawal transactions, credit advancement services, Personal and business loan services, mortgages among others. In line with our mission statement, Premier commercial bank seeks to maintain proper custody and care of the client’s money at all times. This is done through ensuring that proper handling and correct security measures are complied with so as no to contradict our goal. Within the Bank there are certain sections that may be prone to security violation and they include: Automated Teller Machines, Mobile banking services, Internet banking, Electronic money transfers, physical building security, safety of cash in transit, Strong money room and the banking hall. All these are areas whose security has to be properly counterchecked at all times. The outlined areas are vulnerable and susceptible to vandalism. ...
Download paper
Not exactly what you need?

Related papers

The Security Professional and their role in Emergency, Disaster and Contingency Planning
It also explains the measures and techniques that the security professional use to handle different emergencies or disasters. An emergency refers to an unforeseen combination of circumstances whose resulting states of nature require immediate attention and actions. An emergency may be serious to the extent that if no immediate attention is provided, it can result to crucial and fatal situations. A…
Technology Support System For Homeland Security Program
Former Senator Rudman views the department to be a needed “formulation” in spite of the existing of great Army, Marine Corps and Air Force (2003). However, in assessing the organization and mission of the DHS, this proposal sees the agency to be wanting in resources and capacity along the aspects of independent mobilization and focus of initiatives. Organizationally, the DHS has to correlate…
Personal impression of Car designer "Chris Bangle" and his design
BMW simultaneously passed Mercedes Benz and took the global leader title in sale of premium cars. He stood firmly for his designs and defended them against any criticisms. He retired from BMW after introducing GINA, a car of stunning concept, in 2009 (Bangle 4). In 2010, he brought his unique insight and extensive knowledge of design as he featured in annual design festivals in Victoria. …
Overview of IS risk Assessment Part 11
The second step is to take the asset owners on board and define an asset classification scheme. This asset classification scheme defines the severity of all assets along with a value. This value will identify information assets connected on the computer network. Three of the important aspects that make the risk management framework recognizable are vulnerabilities, threats and exploits.…
can focusing on literacy improve controlled assessments
In short, well-designed controlled assessments show education professionals what not do; how not to prepare and present the test (Doyle 2008, pg. 22). Literacy is a critical aspect of controlled assessments because oral and writing skills play a huge role in pupils’ ability to understand and solve the challenges posed in controlled assessments. In this paper, I will explore the impact of…
Asset Inventory
Account Management Procedure Avoid transmission of un encrypted sensitive data Software Application and Operating system software Exploitation of faults in application and operating system software $2,000,000 High Malicious use, Unauthorized use and System compromise Change Management Standard High 0.8 Low 0.05 0.2 LOW $24,000 IT System Interoperability Security Standard Patches and updates from a…
Measuring IT Value Paper
Another possible way is to distinguish the initiative expected from the priority to the business. The payoff has to provide a value that drives the success of the business. There are numerous systems with the capability to generate value, but to make a decision on the most significant measure is essential for alignment with the policies of the business. Metrics that measure the effectiveness of…