Preview

IS3230 Unit 1 Assignment 2 Chris Wigint

Satisfactory Essays
Open Document
Open Document
407 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3230 Unit 1 Assignment 2 Chris Wigint
The U.S. Federal and State compliance laws in regards to data protection affect all financial institutions in that non-compliance will result in fines and penalties. ABS Financial Solutions handles sensitive data for many credit unions and without regulations governing data security there would be no repercussions when private information is mishandled, lost or stolen. ABS understands their responsibility for protecting their client’s data and the threat of the retribution both federal and civil for non-compliance ensures they take appropriate security precautions.
ABSs choice of a solution to the data protection and encryption problem is most likely directly related to the penalties that can be enforced against them for non-compliance of the laws. The Federal Trade Commission, state insurance authorities and other federal regulatory agencies have the power to enforce the Gramm-Leach-Bliley (GLB) Act which requires all financial, investment and insurance agencies to inform their customers of their information sharing procedures. The GLB Act also requires these agencies to safeguard their customer’s sensitive data and information. ABSs solution to safeguard their customer’s data and information is directly related to compliance of the GLB Act.
ABS would have done a Cost-Benefit Analysis (CBA) to determine the risk of potential loss if they had not implemented better security practices. The CBA would have shown them that the potential cost of fines, revenue loss form their customers, and credibility far outweighed the cost associated with taking the enhanced security steps they took. As with any risk, a company has to determine if they can afford the cost to mitigate it or accept the risk and suffer the consequences if something should go wrong.
ABSs customers will in the end pick up some of the cost of the solution, if not all of the cost of the solution. The cost most likely will be spread out to all of the credit unions in the form of increased fees for

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Penetration testing should be done to test the network for vulnerabilities. There are several types of penetration testing. “An automated port based scan is generally one of the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    cout << "You are in factorial program of C++. Please enter a +ve integer:- ";…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Security implementation responsibilities focus on implementing the access controls and account management processes outlined in this Plan. The following positions are responsible for security implementation:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Is3350 Unit 1 Assignment 1

    • 2290 Words
    • 10 Pages

    By agreement with the mother by joint registration at birth or by court order under section 4(1) (a) and 4(1A).…

    • 2290 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Is3350 Unit 1 Assignment

    • 1325 Words
    • 6 Pages

    In all, Figure 4 shows a calculation of 64% accuracy rate for correct answers given in his small reading group. I could tell that Michael felt like he was on a roll, and he made a surprising request that none of his peers groaned about. “Can we finish by ourselves?” The teacher gave consent for the class to finish independently, and they did. As an added bonus, the reading specialist shared an entire sheet of heart stickers made by her husband to celebrate Valentine’s Day early. Michael happily received his reward while trying to estimate the total stickers on the sheet (see Figure 5). When he saw the red heart, he stated, “I don’t want the heart to camouflage on my red sweater.” Therefore, Michael placed the heart on his white collar (see Figure 6).…

    • 1325 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Is3350 Unit 1 Assignment

    • 653 Words
    • 3 Pages

    1. Once I have completed my current courses I will apply for TPP mathematics level C or enrol in an Accounting degree.…

    • 653 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT104 Assignment Unit 5

    • 307 Words
    • 2 Pages

    1) What does a professional programmer usually do first to gain an understanding of a problem?…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pm321 Unit 3 Assignment 1

    • 632 Words
    • 3 Pages

    Problem tree analysis is a key to many kinds of project planning. Problem tree analysis helps to find solutions by mapping out the anatomy of cause and effect around an issue but with more structure. The problem can be broken down into manageable pieces which allow clearer views on priorities and stronger focuses on objectives in planning. It is often the first step in win-win solutions.…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 3 Assignment

    • 603 Words
    • 3 Pages

    Based off my MWA three assignment, I realize that I do have some areas in my research skills, writing, group work, and from making decisions I need to improve on. First, I can improve in my archival research by becoming familiar with the CSU Archives and the information I can receive from them. For example, I never experienced researching on someone or something using newsletters and newspapers. When I had to use these resources to research, it was very difficult for me to transition into gathering information from that source. The more I became familiar with the resources, I was able to adapt and gather the information. Now that I experienced this, I can begin to use the archival research techniques to research on someone or something else in the future.…

    • 603 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    As part of the network security team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detection and network protection systems will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also contained within this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Gueldenzoph, L. E., & Snyder, M. J. (2006). In Kaliski B. S. (Ed.), Encyclopedia of business and finance; privacy and security (2nd ed.). Detroit: Macmillan Reference USA. Retrieved from http://go.galegroup.com.library.capella.edu/ps/i.do?id=GALE%7CCX1552100254&v=2.1&u=minn04804&it=r&p=GVRL&sw=w…

    • 962 Words
    • 4 Pages
    Better Essays