CMGT441: Introduction to Information Systems Security
Fundamentals of securing information systems and mitigating cyber threats.
Mason Carter
Contributor
4.1
46
5 months ago
Preview (3 of 8 Pages)
100%
Purchase to unlock
Loading document content...
Preview Mode
Sign in to access the full document!
Loan Policy 1 McBride Financial Services : Loan Department Policy Jon Bartholf CMGT441 : Introduction to Information Systems Security January 24 , 2011 Bashar Elkhatib Considering the current loan process and security concerns at McBride Financial Services, propose a comprehensive security enhancement plan that addresses both in - person and online application methods. Your proposal should include specific recommendations for physical and network security improvements, as well as strategies to improve customer trust. The answer should be approximately 800 - 1,000 words, discussing the risks, suggested solutions, and the anticipated benefits of implementing these improvements. Loan Policy 2 TABLE OF CONTENTS INTRODUCTION ....................................................................................... .............................. 3 C URRENT LOAN PROCESS ....... ..... .......... .. ...... . .................................................................. 3 CURRENT SECURITY ISSUES . . ........................ ......................... ..................................... . .... 3 In - Person .... . . ..................................................... ..................................................................... 4 Online ... ....... .............................. ............................................................................................. 4 RE COMMENDATIONS ...... ............. ..................................................................................... . .. 5 In - Person ........ .......................................................... .............................................................. 5 Online .......... ......................................... .................................................................................. 5 CONCLUSION................................................................................................................... .... . . . 6 APPENDIXES................................................................................................................... ........ 7 Appendix A: Typical Loan Application Process (Figure 1).................................................. 7 REFERENCES ....................................................................................................................... . .. 8
Study Now!
XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat
Document Details
University
Curtin University
Subject
Information Technology