Sign In
Not register? Register Now!
You are here: HomeResearch PaperIT & Computer Science
Pages:
5 pages/≈1375 words
Sources:
3 Sources
Level:
MLA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 32.4
Topic:

Security Infrastructure for a Medium Size Bank (Research Paper Sample)

Instructions:

Research Paper Guidelines and Rubric
Overview
In today’s business world, information security have become more and more critical to an organization. The correct architecture, design, and implementation from an IT professional is imperative to fully understand the implications of the security within the business. As an IT professional, an understanding of the foundational concepts in security development and maintenance is key, and as a professional specializing in computers and telecommunications, a comprehensive knowledge of security and telecommunications concepts, advancements, and appropriate implementation are essentials for success. This research paper will give you the opportunity to tackle a real-world business security issue in preparation for a professional IT position. You will use your knowledge as you apply it to the design of a security architecture that aligns to the needs of a particular organization. Your design will not only meet organizational needs, but attend to the potential for growth and technological advancement. Additionally, you will need to develop a plan for the organization to keep its data safe and to follow the proper laws and guidelines.
You will begin this project by imagining yourself as a security consultant to a medium-sized bank. You have been tasked with preparing a proposal to maintain and upgrade the security environment, in order to meet the growing technology needs of the organization. Your assignment will be to draft a security proposal using the NIST Security Framework as your guide. This will include at a minimum, security analysis, identifying key issues, designing an effective security plan, and proposing a management and maintenance plan that will align to the organizational needs.
NIST Security Framework and helpful links.
• https://www.nist.gov/cyberframework
• NIST: Principles of Information Security – Chapters 4+5
• https://www.nytimes.com/2018/05/20/business/banks-cyber-security-military.html
Scenario
You are a Security consultant working with Superior Bank, a medium-sized bank that is facing challenges related to its current security infrastructure. As a consultant to the company, you are responsible for analyzing the current infrastructure, identifying key issues, designing an effective security proposal, and proposing a lifecycle management and maintenance plan that will align to the organizational needs. Management has come to realize that their security infrastructure is outdated and is hindering efficient computing operations. You have been tasked with preparing a proposal to show them the steps needed to keep the information and data safe.
Superior Bank is a medium-bank with three current facilities that cover the northern western upstate area. Each bank has an administrative staff of 10 employees who handle daily bank duties. The company has recently been seeing strong business growth and has expanded by opening and moving into an old bank that has been closed since 1999 and the building infrastructure is outdated.
Using the NIST Security Framework you will create a proposal advising the company of the steps needed to be safe in today's computing and network environment. What do banks need to be safe? What are the steps the bank should use from the Cybersecurity framework core to keep their employees aware of the best practices?
• What is the NIST Cybersecurity Framework? The NIST CSF is a set of optional standards, best practices, and recommendations for improving cybersecurity at the organizational level..
• Why does the NIST Cybersecurity Framework matter? As cyberattacks become more complex, repelling them becomes more difficult, especially without a single cohesive strategy. The CSF aims to standardize practices to ensure uniform protection of all US cyber assets.
• Who does the NIST Cybersecurity Framework affect? The CSF affects anyone who makes decisions about cybersecurity in their organization, and those responsible for implementing new IT policies.
• How can I implement the NIST Cybersecurity Framework? NIST has thorough documentation of the CSF on its website, along with links to FAQs, industry resources, and other information necessary to ease enterprise transition into a CSF world.
Research Paper Rubric
Your assignment is to write a 4-5 page research paper. You are required to include a properly formatted bibliography with at least three sources.
Paper Writing Suggestions & Guidelines: MLA Format
Introducing the topic – Thesis Statement
Always include a brief synopsis with the objectives, what it is about and what the reader is expected to learn. (If the paper contains many subtopics, include a table of contents.)
Explaining the topic
a) a general rule: never take for granted the reader knows the subject area as well as you do. Make an effort to provide the reader with some fundamental or relevant background information.
b) Be prepared to define terminologies and acronyms, as well.
c) Properly plan, structure and express your content. Breaking the topic into subtopics will help.
Providing references- Works Cited page
Include references to sites or books that you may have referenced, or you find relevant to your topic. These references offer the interested reader a pathway to seek further information. Meeting the recommended length & format
Lengths of all papers are 4 pages plus. It must be produced in an easily legible Microsoft Word format.
Plagiarism is not tolerated and will be grounds for automatic rejection of your paper. (You can quote as long as you give recognition to the source of the quote.)

source..
Content:

Last Name First Name
Course Number
Instructor’s Name
Date
Security Framework for a Medium-Sized Bank
In today's computing and network environment, the information security framework of an organization remains utterly critical for its growth. This includes having the ideal security infrastructure and clear guidelines for the implementation of the security framework in place. Without these guidelines, organizations risk crippling the efficiency of their computing operations. The security framework has to be in line with the NIST Cybersecurity Framework, which lays down the procedures, standards, and recommendations for improving the cybersecurity of an organization. This paper is based on a medium-sized bank, Superior Bank, which is currently facing formidable hurdles in its current outdated security infrastructure, something which has hitherto hindered the efficiency of its operations. The purpose of the paper is to design an effective security proposal for the organization to help in realizing its bottom line.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Identifying the Certifications at IT Security
    Description: In this research paper about IT Security certifications, the top-tier certifications are discussed in depth. These certifications include GIAC, CISSP, CISM, and CompTIA Security+. With the increased advancements in technology, cybercrimes have also increased drastically....
    7 pages/≈1925 words| 4 Sources | MLA | IT & Computer Science | Research Paper |
  • Social Media Impact in the Technological World IT Research Paper
    Description: The concept of social interaction in the world of technology has changed whereby news, materials and information travel from one part of the world to the other at a supersonic speed. The concept is propagated with the introduction of different platforms through social media and advancement...
    10 pages/≈2750 words| 10 Sources | MLA | IT & Computer Science | Research Paper |
  • Technology: Computer Science As A Required Subject In School
    Description: Robotics is one of the topics that are common when it comes to understanding computer science. As a discipline of computer science, Robotics extensively looks at artificial intelligence as it involves the replication and modeling of intelligent behavior that is infused in robots...
    4 pages/≈1100 words| 5 Sources | MLA | IT & Computer Science | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!