StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Summarizing how information security - Essay Example

Cite this document
Summary
Summarizing How Information Security Overview Information is considered to be one of the major elements with regard to a business as it is believed to entail various details regarding the varied operations of an organization. The organizations in the present day context witnesses a large number of security challenges for the reason of safeguarding their business related information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Summarizing how information security
Read Text Preview

Extract of sample "Summarizing how information security"

Download file to see previous pages

Information Security System of Citibank With Respect To CIA Triangle CIA Principle The CIA triad namely Confidentiality, Integrity and Availability can be considered as one of the simple and widely applicable security models for an organization which assures to protect all kinds of information from external threats. These three major principles are supposed to be relevant with the entire security analysis of an organization (Imperial College London, 2012). Confidentiality: Confidentiality can be acknowledged as the ability to maintain secrecy of information from unauthorized external users.

It is possibly the major apparent aspect of the CIA triangle in terms of security assurance for an organization. However, this principle is frequently attacked by the external users through Cryptography and Encryption techniques in order to transfer files or information from one system to another (Imperial College London, 2012). In the context of Citibank, it has been found that the organization seeks to implement a well-built security system in order to protect the information related to financial aspects and other banking transactions of its 200 million customers (Citigroup Inc., 2012). Integrity: According to the CIA principle, the aspect of integrity can be stated as the ability to make sure of keeping or storing data or information in an appropriate and unaffected way.

It has been learnt that Citibank manages the personal data, records as well as information of each client in an appropriate manner and with the assistance of Citi Records Management Policy as well as Citi Data Management Policy. Furthermore, the organization implements advanced security processing system of each data, record or information that are collected from individual clients in terms of appropriate and secured storage capacity (Citigroup Inc., 2012). Availability: This principle of the CIA triad relates to the accessibility of transaction records or information by an appropriate and authorized user at the right time.

However, various security issues with respect to accessing transactional record and information of a client by other external or unauthorized persons have been recorded. The organization is known to adopt an advanced form of process to identify the appropriate and authorized persons (Citigroup Inc., 2012). Security Policies in Citibank Citibank ensures an effective and efficient form of security policy regarding maintaining and protecting data, information or record of its individual client. In the context of information security, it can be stated that the organization strictly maintains laws and regulations in order to increase the level of protecting information from external threats.

Citibank significantly pursues a formal set of rules and regulations pertaining to The Gramm-Leach-Bliley Act (GLBA) which is also known as ‘Financial Services Modernization Act of 1999.’ According to this Act, the financial service providers need to possess appropriate information security systems in order to maintain and protect the personal form of information of each client. Moreover, the regulatory Act also focuses on maintaining an effective and appropriate CIA principle with respect to the various transactions made by any financial institution

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summarizing how information security Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Summarizing how information security Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1458238-summarizing-how-information-security
(Summarizing How Information Security Essay Example | Topics and Well Written Essays - 750 Words)
Summarizing How Information Security Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1458238-summarizing-how-information-security.
“Summarizing How Information Security Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1458238-summarizing-how-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Summarizing how information security

Explain how coso framework can be applied in a computerised environment

security (application and Network).... Likewise, security guards and other company personnel shall prevent the entry of unauthorised persons into confidential computerised environments.... The information Technology department allows authorised employees to access certain databases such as the inventory and receivables databases.... how "Coso Framework" Can be Applied in a Computerised Environment Subject: Professor: February 9, 2012 The COSO Framework fits comfortably well in the computerised United Kingdom organisations' environments....
3 Pages (750 words) Essay

Effectiveness Of Federal Information Security

The paper "Effectiveness Of Federal information security" discusses whether the risk to information technology systems in Federal Agencies and the IT industry between 2002 and 2005 has been decreased as a result of implementing the Federal information security Management Act of 2002.... ) we shall focus attention on plans and efforts to implement the Federal information security Management Act (FISMA) by the computer security division of NIST....
36 Pages (9000 words) Research Paper

Security Management Implementation

security programs differ in scope, complexity, and purpose.... The security is needed for material, equipment, machinery tools, people, money, documents, technical and nuclear information, weapons, fuels, medical supplies, Research and development property, intellectual property, concepts, ideas etc.... All these elements need to be protected under the security management program.... hellip; The protection program can be executed against intrusion, trespass, acts of violence, theft, or fire. The principal purpose of the security management is the development and implementation of procedures, policies, standards, training, and methods for identifying and protecting information, personnel, facilities, property, operations, or material from unauthorized misuse, disclosure, assault, theft, espionage, vandalism, sabotage, or loss. organizing physical detection, alarm, response, and control systems; for many federal and private occasions and on regular basis....
13 Pages (3250 words) Essay

Types of training programs offered and how it impacts local communities

It shows how the tackling of these details can be critical to the success of the program.... This is a case study that pinpoints important details that enter into developing performance dependent on budgeting schemes — details that are not ordinarily taken out but are very much specific to the subject....
14 Pages (3500 words) Essay

Analysing specific financial issues in Oxford Instruments PLC

This paper will explore the financial performance of the Oxford Instruments Plc with special reference to how stock markets are related with the public limited companies and their performance, relationship between the investor values and financial performance of the firm, the gearing level and issue of debt to the investors besides summarizing the overall things with special reference to the limitations of the ratio analysis....
5 Pages (1250 words) Essay

Homeland Security Decisions

In the paper “Homeland security Decisions” the author provides a valuable model for evaluating homeland security decisions.... The study addresses the challenging task of homeland security policymakers of allocating their limited resources in a bid to reduce terrorism risk costs.... hellip; The primary research question for this article is to determine the use of a value model for homeland security decision making and consequently illustrate its use to assess terrorism risks, assess the benefits of countermeasures and develop a severity index for terrorism attacks....
2 Pages (500 words) Assignment

The Impacts and Problems of the Chinese Outbound Tourism

The same table's safety/security section indicated there were 11 respondents who affirmed safety/security is one of the major problems of China outbound travelers and 14 respondents who affirmed their No votes.... The same table's Impact section validated there were 21 respondents stating yes to the question whether the impact of language, safety/security, and/or culture variance may trigger a decline in the china outbound travelers traveling priorities, representing84 percent of the total respondentsSeveral recommendations are needed to resolve the above major problems....
9 Pages (2250 words) Research Paper

Foundations of Business Computing - Web-Based Collaboration

The author of this paper "Foundations of Business Computing - Web-Based Collaboration" will make an earnest attempt to describe the reasons why organizations are choosing to out-source business activities and define and contrast technology, information technology, and information system.... Helps in the utilization of information as well as simplifying information search within an organization  One of the major reasons why organizations outsource is to lower labor and operational costs (Flatworld Solutions Pvt....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us