XYZ Credit Union/Bank Case Study

Improved Essays
The provided scenario pertains to the XYZ Credit Union/Bank. The issues or risks that could or would be faced by the XYZ Credit Union/Bank starts with the fact it must meet the government mandated compliance with Gramm-Leach-Bliley Act (GLBA). The major aspect of GLBA is the security of customer data, which incudes the confidentiality and integrity of the customer data. The confidentiality and integrity of customer data should be controlled by the level of access provided to each employee. Other factors include how each branch is electronically connected to headquarters and each other. The connection between branches and headquarters will need to secured. The availability of the network, systems and servers will be critical to the customer …show more content…
Each policy addresses one or more potions of the requirements spelled out in the scenario. The internet use policy would address that employee internet access will be monitored and the content will be filtered. The monitoring will provide detection of customer information or other controlled data that is being egressed out of the company. The content filtering would allow the company to limit access to websites that could be create a hostile work environment and limit access to sites that host malware. The external device use policy will provide direction to the IT department to limit or eliminate the ability for external devices to be recognized and used on a system by technological methods. It would also explain how employees are not allowed to use external devices without signed authorization from the Chief Information Officer (CIO). The employee ID policy would state that each employee who needs to access the network, systems or server would need their own login credentials. The policy would as include login credentials shall not be shared with others, employees will be provided the least amount of access needed to complete their duties, passwords must be changed every 90 days and review of access will be completed monthly, access will be removed upon termination and changed when job duties are changed. The …show more content…
The encryption policy would pertain to the use of encryption for all customer data at rest or in transit. The policy would pertain to all systems, servers and networks in the company. The personal device use policy will dictate that personal devices shall not be connected to the company’s network and shall not be used to capture any customer data. The email use policy will state that company email system is to be used for business purposes only, will be monitored to prevent the egress of customer data and shall not be used to harass, intimidate or bully other employees or customers. The network segmentation policy would state that the network would be segmented to limit access to every area of the network in a least privileged method and segment the different branches to limit the potential for a hacker to pivot to another branch. The third party access policy would dictate what circumstance must be met for a consultant to access the network, systems or servers. The policy would also reference the network segmentation policy in regards to the separation of third party networks like HVAC controls must be separated and air gapped from the company’s network. The camera monitoring policy will alert employees to the fact cameras are used to monitor

Related Documents

  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    To prevent unauthorized devices, and company devices that do not meet the requirements specified in the Network Health…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Working alone, I immersed myself in this environment and worked toward removing inefficiencies, security oversights, and business continuity issues. As I hope you’ll see, the high-security, HIPAA-compliant environments that I’ve worked in have exposed me to policies, products, and procedures that I can bring to your organization to help strengthen your information security program. Additionally, my expertise in securing iOS and Android mobile devices means that I can help mitigate threats to this increasingly significant portion of your computing…

    • 320 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Western Governors University A. Security Faults Describe three of the security faults in this scenario that caused a security breach. 1. Some accounts existed before the electronic health record(EHR) was deployed. Important steps were missed during the import of old accounts. I suggest using a clean base line for the brand new EHR system.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Project Part 1 Task 1: Outline Security Policy First World Bank Savings and Loan; a financial institution that offers banking services (loans and deposits). The bank would like to provide online banking services to the customers, which includes online credit card use for loan applications. Recommendations are based on such factors as: ownership total cost, scalability, and reliability. Decisions and recommendations made need to be appropriate from the CIA triad perspective.…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The police department had a policy in place stating that the department reserved the right to monitor all email and internet use on its network and informed…

    • 418 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Footlocker Code Of Ethics

    • 970 Words
    • 4 Pages

    The company that I have decided to discuss is footlocker. Footlocker is an established company known for their wide variety of trainers. The company was introduced in 1974 and it was founded in 1988 as a separate business, known as the Woolworth Company. The company is a global business owned by Ken C.Hicks. Footlocker is a public limited company so the business information and trading is free to others.…

    • 970 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    BYOD CRI employees have the opening to use their own electronic devices for work purposes when authorized. Personal electronic devices include personally owned laptops, computers, cellphones, tablets, and smartphones. There are some limitations for the use of BYOD policy. Be aware that if you want to take advantage of this policy you will have to follow these rules thoroughly. 1) Ensure the security of CRI information, authorized employees are required bring in their devices for our IT manager to install the required security software (Anti-virus, sec VPNs, software firewall, etc.)…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Question: Question 12 Answer: Staff Policies and procedures are there to ensure staffâ€TMs health and welfare are protected and that there rights are supported. Some policies…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Farrow's Bank Case Study

    • 1002 Words
    • 5 Pages

    The bank was registered as a ‘credit Bank”. As a result, book keeping standards placed on the Bank was not as strict as in joint stock banks. Legally, it also meant that the bank directors did not have to hire for external audits. Secondly, the manager, Mr. Thomas Farrow isolated himself from the rest of the staff. This means he made most of the company decisions alone.…

    • 1002 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Core Credit Union Case

    • 1381 Words
    • 6 Pages

    Discussion Points 1. To what extent are CORE Credit Union’s networks as converged? Identify and briefly describe additional network convergence opportunities. A1. The Core Credit Union initially used traditional methods of financial transactions.…

    • 1381 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Jpmorgan Chase Case Study

    • 1518 Words
    • 7 Pages

    JPMorgan Chase is an American multinational bank and holding company. That provide the financial services to different sectors of the country. Headquarter of the bank in in New York City. This bank is the largest bank of United States that extends its operations in different cities of the state. By comparing its assets with the all the banks of the world, this ban ranks in 16th position.…

    • 1518 Words
    • 7 Pages
    Great Essays