IntroductionBank SolutionsInc. needs an IT security plan tailored for strategic advantage, regulatory compliance and risk mitigation. As an organization that relies on IT for innovation and technical advantage, it is essential to invest in the necessary security controls. This will ensure that the infrastructure supports a layered security approach to detect, deter, eliminate or reduce as many vulnerabilities and exposures as possible. It is the responsibility of executive management to determine how much exposure and risk their organization is willing to accept. Objectives The primary objectives of this security plan are to describe a security strategy and identify recommended technologies to ensure that Bank Solutions has the ability to achieve its objective and ensure that the organization's mission and objectives have a positive impact. Security Strategy Our security strategy is a methodology for defining security policies and necessary controls. This includes assessing all possible risk types, namely: Malicious hacker; also the prediction of different types of attacks, for example logic bombs and viruses. This plan includes a proactive and reactive strategy to protect the confidentiality, integrity and availability of our organization's information and data. The proactive strategy is to predict possible damage, determine all vulnerabilities then implement plans, develop security policies and controls to best minimize them. vulnerability. The reactive strategy is to assess the damage and determine possible causes, then implement and develop security policies and controls to repair the damage. Finally, implement a contingency plan to prevent further occurrences. The annual review of these plans and po...... middle of document ......itepapers/threats/vulnerabilities-vulnerability-scanning-1195Kinn, D., & Timm, K. (2002, July 18). IDS Spend Justification, Part One: An Overview of ROI for IDS | Symantec Connect Community. Retrieved from http://www.symantec.com/connect/articles/justifying-expense-ids-part-one-overview-rois-idsReferences (continued) Mortazavi, S. H., & Avadhani, P. S. (2013). RSA Encryption Algorithm: A great tool for reducing vulnerabilities in network security intrusion detection systems. International Journal of Innovative Technology and Exploring Engineering, (4), 306. Retrieved from: http://www.ijitee.org/attachments/File/v2i4/D0527032413.pdfSANS Institute, (2001). Know intrusion detection systems. SANS Institute InfoSec Reading Room. Retrieved from: https://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337
tags