Need help with a question. Due: 9/23/2024 You have been hired as a security consultant to develop policies that document the minimum security

Need help with a question.

Due: 9/23/2024

You have been hired as a security consultant to develop policies that document the minimum security requirements for Regional Bank covering its financial system and customer-facing online web service. 

Part 1:
Regional Bank Financial Software System (RBFSS)

Regional Bank has an accounting system that tracks its revenue, accounts receivable, accounts payable, and employee payroll.

Write a 2- to 3-page security policy for RBFSS in which you describe:

· Access control-based user roles for each component (accounts receivable, accounts payable, employee payroll)

· Password requirements and protection

· Password protected screen savers

· Data encryption at rest

Annotate each security control with at least one Critical Security Control (CSC) from the Center for Internet Security (CIS).

Part 2: Regional Bank Financial Software System (RBFSS)

Regional Bank has an online web-based service for its customers that allows for online banking. 

Write a 1- to 2-page security policy for the RBFSS web-based online banking system that includes a brief description of the following security controls:

· Authentication method for customers to log in

· Encryption of data in transit

· Web browser security

· Deployment of anti-malware software

Annotate each security control with at least one Critical Security Control (CSC) from the Center for Internet Security (CIS).

Annotate at least one OWASP Top 10 security risk that could be associated with each of the security controls above.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and Report  Scenario  Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors

Can someone complete this for me

Can someone complete this for me ? ID mSysRowId 1 ua06Ftxxo5DT29FEtU6s2GsIH4WBra7Vmm9mzoDmd4hFWmgWHD2q19Uh6gZgjcdYJD5KAfiSoqJNYPVYozboMdrWC5/boC+GqAv6ldlKwK76KrWnq6AoA9zoHkqnmH8kRWOuUZ6tXLQ=-~LyErwg/RbqxliP9sRDATWA==

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can

 INSTRUCTIONS!! Identify best practice approaches to monitoring and controlling risk. Define appropriate communication mechanisms for various

 INSTRUCTIONS!! Identify best practice approaches to monitoring and controlling risk. Define appropriate communication mechanisms for various stakeholder groups and discuss any interaction components. Provide a recommendation for documenting lessons learned and evaluate the fit within your organization.(I AM A KROGER FULFILLMENT DELIVERY DRIVER AT ONE JOB AND A TECH SUPERVISOR

— I selected “Steve Jobs” as the computer person project — Must follow the attached Rubric(Checklist) instruction.  —   Submission Upload Requirements 1.

— I selected “Steve Jobs” as the computer person project — Must follow the attached Rubric(Checklist) instruction.  —   Submission Upload Requirements 1. Infographic (.pdf or jpg or other format only) 2. Assignement  Document (.pdf format only) —   CTH –Computer Person Project Who are the Computer People? In the 20th century,