preview

Data Paper

Better Essays

Scenario: You are the chief information security officer (CISO) for the VL Bank based in Atlanta, Georgia. Recently, a highly sophisticated and cleverly orchestrated crime was brought to your attention by the information security analysts in your department and by a growing number of business customers.

Your company’s commercial customers utilize a digital certificate multifactor authentication process to access wire transfers, cash management, deposit operations, and account management applications common to all business customers. The problem is that several customers have reported that new user accounts have been set up under their names without their authorization and these accounts are initiating.

The main term used in risk …show more content…

As a result, in order to protect the confidentiality of this content, it must be encrypted as it travels through numerous computer systems. By encrypting the content, only those with proper authorization can view a given piece of content.

* Persistent Security: Content needs to be secured independent of time and location. Long-lived authentication ensures this by protecting information that is in-transit, stored in a database, or being processed by an application. Persistent security also involves guarding information in a mixed workflow environment – including e-mail, file transfers, EDI, mobile applications, and Web Services

* Non-repudiation: Preserving the integrity of content is also critical to securing content exchange. This is done, via non-repudiation, by ensuring that a transferred message has been sent and received by the parties claiming to have sent and received the message.

* Archiving: By properly archiving transactions, it is possible to analyse security breaches, maximize operational performance, and maintain regulatory compliance.

-VL Bank has undertaken to disclose all

Get Access