preview

Implementing An Exclusive Audit On Bank Solutions ' Operations And Process Protocols Essay

Better Essays

Project 5: Implementation of the Project
Arlecia Johnson
November 30, 2016

INTRODUCTION.
Purpose of plan.
Having done an exclusive audit on Bank Solutions’ operations and process protocols, several security loopholes were realized and inevitably are great threat-posing factors to the institution. Responsively, new technology and security measure have to be implemented in order to fill the gaps and heighten security standards in order to enhance customer privacy, information protection, the institution’s credibility and generally adherence to the standard security policies and controls.
The technologies to be implemented in the Information Technology department are namely the implementation of privilege access control, role-based access control and logical access control which all leverage on tackling insider threats, closely monitoring and managing all administrative activities performed on information systems. Their functionality is based on provision and denying of access to commands and items on the basis of authentication, identification and appropriateness.
Encryption of stored data is another technique intended to be applied. This technology is set to counter threats associated with third party storage providers, where by the data and information stored is rendered unusable without an encryption key. This will enhance the security of data even when in the hands of other storage providers hence protecting critical information from external attack.

Get Access