Money First Security Strategy

Great Essays
Money First is one of the largest banking institutions in the nation. The main goal of Money First is the satisfaction of their customers. This is a multi-facetted goal which includes the accepts of security and data backup. For the past 50 years, data has been increasingly being considered to be an asset to organizations. Therefore, organizations are becoming more concerned about data security strategies and backup management plans. Money First is no different. Customers expect their information, money and recourses to be secure and available.

Security Strategy
Money First security strategy is a complete plan that will set in place strategies to mitigate the risk from potential or actual threats. Money First security strategy must include
…show more content…
Employees of Money First can make errors that can greatly impact the day-to-day operations of Money First. Access Controls can be broken down into two parts: controlled access to the computer system and controlled access to the database. Computer systems should be set up with a combined ID and password that is necessary to get into the computer. IDs can be setup with the user/employees name, which is publicly known, but the passwords must be kept private/secret. Passwords should not be written down and change periodically; this will minimize the risk of hacker learning employees’ passwords. After securing access to the computer systems, next is to securing access to the data itself. Database security will be set differently that computer systems security. Access to specific data must be restricted so that certain people have access to retrieve and/or modify certain the data. The principle of least privilege should be used for access controls. The principle of least privilege is a strategy of limiting access to the bare minimum level that will allow operational functioning. This means that with, the principle of least privilege Money First employees will be given the minimal level of user rights that they can have to do their …show more content…
Banking data must be separated into levels of security. At the highest level of security would be customer information (this includes: customer name, date of birth, social security number, balance, etc.). Another high level of security must be banking employees’ information (this includes: customer name, date of birth, social security number, etc.). In order to keep the data secure, we must secure the database. To properly secure that database, there are key areas that should be considered: Users and roles, Default account, Patching, Password Management, Parameter settings, Privileges and permissions, Profiles and

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Criteria should be developed on who has access to what information, and appropriate technical safeguards should be put into place, so information is only…

    • 614 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Disaster Recovery Plan Wichita State Shockerthon is a company focused on creating awareness and support by raising money for the Children’s Miracle Network. Shockerthon uses a database to store many of our clients personal medical information, donor emails, and supporter credit card/debit card information. It is important that Shockerthon creates a plan of action incase the information system is threatened. These threats could arise from natural disasters, security breaches or a virus. Although Shockerthon may not be comparable to Koch Industries, in size, it is imperative to have a plan for any situation concerning the threat of information systems as risking personal information may discredit the reputation Shockerthon has built for itself.…

    • 519 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Managers should have access to see their subordinates’ personnel files but not files of other employees within the company. The HR personnel should be able to see all of the employees’ personal information as well as payroll information. Access to the system needs to be based on specific job functions and position…

    • 686 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Summary: Data Integrity

    • 736 Words
    • 3 Pages

    Data Integrity Data Integrity in an organisation such as Kirby College must ensure Data integrity is an assurance that stores confidential data over the network and those only authorised are granted access. This should only be controlled through environmental physical of the network. The people in Kirby College must install security systems located around the important parts of the building, as this will prevent any security servers and network breach which will stop unauthorised users. The security level must be configured on users account so that staff and students in Kirby College can only access certain information that match the security level which are only necessary. Files that are confidential must be protected with strong password and configure the security level on the file to prevent information being accessed by users who are unauthorised.…

    • 736 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Control measure In order to cover above mentioned vulnerabilities and threads, the studio can consider to apply below methods to protect its confidential information. Following the NSTISSI 4011 Security Model, there are three main steps, which the company needs to consider including: policy, technology, and training & education. Firstly, the policies should be discussed, reviewed then established. Next to technology step, many applications and solutions can be applied and setup to protecting, monitoring and recovering business information.…

    • 1311 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Raghav Gangarapu is a Database Administrator that works for the insurance firm, Allstate. Allstate is the the second largest personal lines insurer in the country. The corporation offers a variety of packages mainly in the property and casualty sector of insurance. Being a Database Administrator for Allstate, caused Raghav to be immersed a complex sample set of millions of people confidential insurance information. Raghav’s job is to create, update, and protect the databases Allstate uses for storing the information of clients.…

    • 1019 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The Three Pillars of Security When it comes to security of information there are three distinct levels involved in the protection of corporate information. In this paper, I will be examining each of these three levels of security, providing an example for each. The first and possibly the most noticeable is physical security, also known as enterprise security. The next level necessary in an organization is information security or managerial security.…

    • 817 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Telemedicine Case Study

    • 776 Words
    • 4 Pages

    Product Overview Telemedicine is a combination of network technology and medical technology, which generally includes several major parts as: remote diagnosis, expert consultation, information service, online examination and remote communication. Based on computer and network communication, it realizes the transmission, storage, query, comparison, display and sharing of medical data, remote video and audio information. Customer Demand The Africa sees 25% of the diseases in the world, but the number of medical workers takes up only 3% of the world total. In India, about 75% of medical infrastructure and medical staff are concentrated in cities that have only 27% of the population.…

    • 776 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Mysql Case Study

    • 727 Words
    • 3 Pages

    Other information needed would be the security needs of the database. If the database is planned to hold sensitive information, the database needs to be setup with security groups and users, each of the groups may have certain access controls to access different data. For an example, an accounting group may allow users in the accounting section to financial information and no access to any other part of the database. The creator of the database will need to know if there are any data that needs to be loaded or…

    • 727 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    1. The importance of financial management. Finance is the essential and regarded as the life-blood requirement of every organization (public or private, profit oriented or even non-profitable organization). The efficient management is closely linked with the efficient management of its finances. Resources are always limited, particularly in developing countries, compared to its demands or needs.…

    • 992 Words
    • 4 Pages
    Improved Essays
  • Brilliant Essays

    Most banks currently deploy the online banking system, as it enables them to provide quality services to a large number of customers. Nevertheless, the attractiveness of the online banking has appealed to cyber criminals in exploiting the online banking system for customers. Internet banking provides customers with twenty four hours services from anywhere and at any time, internet banking provides high level of availability for users. Security is one of the main issue when adopting the internet banking. Internet banking vulnerabilities includes as the rejection of services, loss of integrity, data breach, losing customers ' personal information, virus attacks, and credit card…

    • 3150 Words
    • 13 Pages
    Brilliant Essays
  • Improved Essays

    Managing Money

    • 1037 Words
    • 5 Pages

    “Managing My Money” In order to live a safe, happy, and healthy life, you need to manage your money. It seems simple like instead using your savings to buy a new, cool gadget, you’ll use your savings to buy a book that you need for class or bus tickets for transportation to get about places, but managing money is much more complex than that. It not just planning how you’re going to spend money on the things you want and the things you need. It’s about how you’re going to spend on expenses and save for expenses in the present and for the future. Another term for this would be budget (or budgeting).…

    • 1037 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Our banks are capable of storing the information we hold about the customers securely and available in as many ways as possible, by reason of having the resources to do so, the primary task we undertake is countering the unauthorized entry, alternation or destruction of the data you commend to us. Our banks invest a lot of revenue into security as we aim to preserve a strong trust with our clients, earning a bad reputation is the last thing we need to develop so we establish a resolute effort to protect the assets you grant us access to, as well as managing the safety of your information by guaranteeing it’s concealment and integrity. You entrust us to keep your information secure and continuously available even in the event of a catastrophe…

    • 1356 Words
    • 6 Pages
    Superior Essays