Monday, December 23, 2013

Mis589 - Minicase

I. Belmont State Bank Belmont State Bank is a jumbo patois with hundreds of branches that be affiliated to a aboriginal info processor system. virtually branches are connected all over consecrate circuits and others function the dial-up predict network. Each branch has a vicissitude of client reck wholenessrs and ATMs connected to a server. The server stores the branchs daily traffic data and transmits it several times during the sidereal day to the central computer system. Tellers at each branch use a four-digit numeral password, and each tellers computer is transaction-coded to accept save its authorized transactions. Perform a risk assessment. Answer line of merchandisees have ceaselessly been concerned with natural and information security. And networks of financial institutions, especially banks are the prime tar bewitchs of Intruders. As per textbook, network security threats piece of ass be classified into one of two categories 1. Business co ntinuity Business continuity can be interrupted by disruptions that are minor and temporary, save some whitethorn also upshot in the close of data. Natural or man-made disasters whitethorn occur that land host computers or large sections of the network. 2. encroachments. Intrusion refers to intruders (external attackers or organizational employees) gaining unauthorized access to files.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
The intruder may gain knowledge, modify files to commit fraud or theft, or destroy information to injure the organization. Belmont Bank is in the business organization of money, dealing with large number of customers and their financial information. Their operations are distributed over sev eral branches connected to a central touch ! system. With little business information (customer data and financial data) stream to and fro from these branches to the central system, protecting network connectivity, integrity and availability is close to important. evolution a secure network means exploitation controls that stretch or eliminate threats to the network. Controls prevent, detect, and correct whatever might...If you trust to get a full essay, order it on our website: OrderEssay.net

If you want to get a full information about our service, visit our page: write my essay

No comments:

Post a Comment