StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Create a Security Policy - Essay Example

Cite this document
Summary
When dealing with finances, whether receiving money or preparing loans for the clients, every firm ought to have a security policy which enables it to serve its verify client’s details then go ahead and serve them with their services.
Some of the information that will have to…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Create a Security Policy
Read Text Preview

Extract of sample "Create a Security Policy"

Security Policy When dealing with finances, whether receiving money or preparing loans for the every firm ought to have a security policy which enables it to serve its verify client’s details then go ahead and serve them with their services. Some of the information that will have to be verified will include such information as personal details, and bank details. Financial statements that show that the client is able to service the loan is very important considering that this is a business operation.

McBride should not take chances with the fact that in the digital era, anything can be breeched even the most innocent must be subjected to a vetting process to ascertain the genuineness of the information and details they present for processing. To ensure that the McBride is successful, in processing these information, the key issue is to ensure that before the client is cleared to access the a loan, the firm is first aware of the clients loan status with any other institution if it exists, and whether he or she was able to service previous loans within the given time frames (IBM Redbooks. 2011). One of the security policies that will have to be put in place include the need for a guarantor, to ensure that the loan is secured.

This information should also be verifiable for instance, if a client has a vehicle, with a genuine log book, that property should be verifiable with car registration agencies.The other security policy involves members and or clients who will want to seek for the same service online. Clients will be required to register themselves to create an account in which communications will be dropped at. While registering, the password to be used will be tamper proof one, thumbprints will be used to ward of any local threat to growth.

The other aspect of security that will be used to ensure that the client taking the loan is able to pay back the full amount or lose the property is to be in possession of the title deed. The fact that McBride is the financier, means that it will be in the best interest of the business to be in possession of the title deed to ensure that incase the client fails to service the loan, the property will be repossessed with ease. The other most crucial security policy is that of conducting timely security audits to establish any areas of vulnerabilities that can be a setback to the mission of firm.

For instance, the chance that someone can infiltrate the network and fill in dummy data that will legitimize his or her application for a loan and perhaps the number of times that has happened. This audit will be targeted at strengthening the proofing system that McBride is using to ensure that it can detect real time attempt to change the same information (IBM Redbooks. 2011). An automatic client profiling system ought to be used to ensure that a client’s information can be captured and be made easy to query at all times.

While working in conjunction with the banks, some of the confidential information about a client’s ability to meet the financial requirement. For instance, while a client is able to service the loan, their real financial status will be coded to say “YES” or “NO” they can or otherwise instead of giving the actual details of their accounts. ReferencesIBM Redbooks. (2011). It Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager. Vervante.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Create a Security Policy Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Create a Security Policy Essay Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/information-technology/1642711-create-a-security-policy
(Create a Security Policy Essay Example | Topics and Well Written Essays - 500 Words - 1)
Create a Security Policy Essay Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/information-technology/1642711-create-a-security-policy.
“Create a Security Policy Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/information-technology/1642711-create-a-security-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Create a Security Policy

Commerce as the Transfer of Goods and Services

Therefore, once the seller has identified what to protect and what not to, he has successfully defined his security objectives and this help does Create a Security Policy which must be implemented.... Since anything that deals with the computer and the web to be precise is prone to hacking, spying, sabotage etc, it is important that a security component is emphasized when using the web.... This led to the need for beefing up security as far as e-commerce is concerned....
12 Pages (3000 words) Coursework

Developing Security Policy

Moreover, this is accomplished by listing a variety of alternatives that can be used a security policy specifically is the imperative foundation on which a valuable and complete security program can be developed.... a security policy is the most important way in which management's decision for security is converted into specific, measurable, and testable goals and objectives.... On the other hand, if there is an absence of a security policy guiding the decision makers, then decisions will be made on ad-hoc bases, by the individuals developing, installing, and maintaining computer systems, and this will result in a disparate and less than optimal security architecture being used or implemented (Weise & Martin, 2001)....
9 Pages (2250 words) Essay

Goals and Objectives of the Department of Homeland Security

There are seven assistant secretaries for the department including the assistant secretary of policy, foreign affairs, strategic management, and private sector.... The main secretary is Alan Bersin who has been employed as an acting secretary for the office of policy making (Design, 2014).... In the paper “Goals and Objectives of the Department of Homeland security” the author focuses on the main aim of the Department of Homeland security, which is to make sure that the nation is protected, secure as well as tough in opposition to terrorist activities....
2 Pages (500 words) Essay

The Rise of Militarization of American Police

The paper "The Rise of Militarization of American Police" provides a viewpoint that abandoning of community policing would be ill-advised in the light of all the achievements that it has helped bring about, being developed to not only combat crime but also as an important preventive technique.... hellip; Community-based policing emphasizes establishing connections with the communities and building good relations with them....
6 Pages (1500 words) Term Paper

Candidate for the position of Chief of the Virtual Police Department

If people believe that the community policy is in practice in their society, these people will be more possibly willing to give their good opinions, ideas and perceptions of these police.... I would not incorporate the interview with former officer since it would create some biases in my decision making....
5 Pages (1250 words) Research Paper

Performance and Security of Windows Server

The paper 'Performance and security of Windows Server' presents Windows Server 2003 which is the next generation of server operating systems.... hellip; By default, the server components of Windows Server 2003 are disabled for security purposes.... The IIS web server has improved performance and security.... One of the key features of Windows Server 2003 security is the Common Language Runtime software engine.... Another security feature of Windows Server 2003 is the ability to restrict the software running on any machine using software restriction policies....
8 Pages (2000 words) Case Study

E-commerce as a Popular Way of Doing Business

Since anything that deals with the computer and the web to be precise is prone to hacking, spying, sabotage etc, it is important that a security component is emphasized when using the web.... hellip; This report seeks to elaborate on the security aspect of e-commerce.... This led to the need for beefing up security as far as e-commerce is concerned.... The security function in the websites belonging to buyers has been the very essence of doing business....
12 Pages (3000 words) Coursework

Security Analysis of A2Z and Redesign of its Network

Finally, I will Create a Security Policy and a template for future security systems.... The author of this paper "Security Analysis of A2Z and Redesign of its Network" discusses the statistical network analysis on the examples of two companies, including the quantitive network analysis ranking of assets, NMAP, password cracking, policy creation, information about security policies.... hellip; The security systems will under updates, maintenance, and authenticity....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us