The following assignment is going to enlighten the basic security policy of the Commonwealth Bank, Australia. The potential stakeholders who the organization needs to take account while developing their network security system are the government of Australia, target customers, employees, shareholders, and investors.
The modern technology has been upgraded with the changing era of globalization (Wang et al. 2016). The rapid development of technology has some boons and bans at the same time. On one hand, modernization and digitalization accelerate the pace of life these days through collaborating assumption with realism. However on the other hand, different types of cyber crimes have also been intensified taking the support of technicality (Wang et al. 2016). Having integrity in terms of network security is way too essential in this dynamic industry and therefore proper cybercrime management as well is considered as an integral part of industrialization. Integrity here refers to the maintenance of data security cum consistency of information (Islam, 2014). The prime motto of network security is to ensure that the information is reliable and authentic from all the way round and cannot be accessed through any unauthorized user or hacker.
Network security is one of the most talked about terms of these days, especially when it comes to evaluating the pros and cons of technicality and digitalization. The topic of network security comes as an inseparable part of the analysis (Wang et al. 2016). Nevertheless, when it comes to defining network security it can be said that, the approval of access to information in a system that is controlled by the system overseer (Islam, 2014). Clients have doled out an ID and a secret phrase that permits them access to data and projects lies under their authority. Ensuring authentication, cyber security and data security are the three integral parts and parcels of network security. Apart from that, a strong network security chain guarantees the security of the entire computer network system inside an organization from unauthorized users (Abomhara and Køien, 2015).
Same security goal is applicable for the chosen Australia based banking organisation, the Commonwealth Bank, which is one of the three market leaders of the banking sector in Australia. The bank faces issues for subjecting network security as an afterthought or “idea in retrospect”, abandoning them powerless against assault and making room for programmers to increase simple access to data once they have invaded the external lines of safeguarding which is a pre-planned strategy to have control over the hackers cum the cybercrime culprits throughout the globe (Knapp and Langill, 2014).
In this context, the mentionable point is that the logic provided by the Commonwealth Bank behind developing this kind of cyber security approach was even if their network got broken through by the cybercriminals they would not be able to move freely and the network security experts could easily track the hackers and could put them behind the bar. However, the bank has incorporated some basic security system which includes the network security scanners, firewall, UTM, SIEM, IPS, and IDS in order to strengthen their network security system. The core strategies which the organization should prioritize on while cracking down their network security are assurance of access, abuse, and hacking of documents and indexes in a PC arranged framework. Probably one of the most well-known dangers to a computer system incorporates worms, virus, hacking, and adware and so on.
Digital wrongdoing is on the ascent, and given the developing utilization of innovation and the developing volumes of information associations and individual clients confront, it is nothing unexpected. This particular assignment is going to focus upon network security in the chosen leading baking organization of Australia. Multiple layers of protection are needed to be provided in order to ensure unbreakable security (Sharma and Rawat, 2015). Apart from that, the organization should seek the assistance of the cyber control department which comprises cops and the programs inhibited for preventing and monitoring any kind of misuse, unauthorized data access, modifications and denial of the computer system or the network convenient resources. A network security planning which the bank can inhibit while enforcing their network security is going to be provided in the following discussion:
The Commonwealth Bank, Australia is recommended to introduce an administrative program with the motto of identifying the network security issue the data leakage, unauthorized access, disruption of authentication along with risk management and concerns associated with the software supply chain. Additionally, the network security team of the organization must go for an additional workshop focusing upon this mass trade-off. They emphasized the consequence of programming updates on test frameworks, preceding a more extensive rollout crosswise over creation frameworks. Apart from that, the refreshed all-encompassing system of the US National Foundation of Standards and Technology should be taken into account for strengthening the network security system of Commonwealth Bank in order to follow the government protocols. They are recommended to endeavour for working with all around resourced providers that have shown a capacity to react to digital security events (Wang et al. 2014).
The next part of security enforcement is monitoring the revelation of network vulnerabilities in their customized software applications so that the technical team can fix or refresh the flaws conventionally (Islam, 2014). On the other hand, any type of malpractices associated with the web applications cum the customized software of the banking organization can very efficiently be found out through the proper implementation of this network security approach (Knapp and Langill, 2014). The organization should go for a survey regarding the how efficiently and rapidly the web application can respond to any kind of exposure so that to fix the bug in the source file (Papp et al. 2015).
Online transaction security policy: the organization should incorporate certain security protocols such as multifaceted validation, versatile verification, strong passwords, and biometrics.
Wallet transaction security: Security awareness must be spread out regarding Email security, firewalls, malware, phishing, mobile banking access, and so on.
ATM protection: The users should go for biometrics including eye-retina scanning, finger-print scanning and voice scanning for accessing the ATM (Jouin, Rabai, and Aissa. 2014).
Unified payment interface: The Commonwealth Bank should consider their security techniques, administration models and prescient controls to assemble a safe UPI condition that guarantees a consistent client encounter and in the meantime adjusts security dangers.
Information leakage prevention: Commonwealth Bank must train their employee in a way so that they would be careful about sharing any kind of sensitive data with a third party. However, the DPL or data loss prevention technology would keep them aloof from forwarding, uploading and printing the authentic information in an insecure way (Perlman, Kaufman, C., and Speciner 2016).
The potential threats of the network system for the Commonwealth Bank are according to the research are:
Addressing all these malpractices cum threats and vulnerabilities the above network security framework has been developed which can mitigate these security flaws way too efficiently.
Conclusion:
From the above research work, it can be concluded that potential network security is an integral part in this banking organization. The reason is that being an inseparable part of an economy, a bank has to enforce its network security system as one of its prime responsibilities. However, the chosen Australia based banking organization, the Commonwealth Bank, is no different from others. Though they already have a way too tight network security policy the proposed cyber security development approach would add up an extra layer of security in their network security policy.
References:
Abomhara, M. and Køien, G.M., 2015. Cybersecurity and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4(1), pp.65-88.
Islam, S., 2014. Systematic literature review: Security challenges of mobile banking and payments system. International Journal of u-and e-Service, Science and Technology, 7(6), pp.107-116.
Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in information systems. Procedia Computer Science, 32, pp.489-496.
Knapp, E.D., and Langill, J.T., 2014. Industrial Network Security: Securing critical infrastructure networks for the smart grid, SCADA, and other Industrial Control Systems. Massachusetts: Syngress.
Papp, D., Ma, Z. and Buttyan, L., 2015, July. Embedded systems security: Threats, vulnerabilities, and attack taxonomy. In Privacy, Security and Trust (PST), 2015 13th Annual Conference on, 1(2), pp. 145-152.
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. Florida: CRC press.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Boca Raton: Auerbach Publications.
Perlman, R., Kaufman, C., and Speciner, M., 2016. Network security: private communication in a public world. London: Pearson Education.
Sharma, R.K. and Rawat, D.B., 2015. Advances in security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17(2), pp.1023-1043.
Stallings, W., 2017. Cryptography and network security: principles and practice. Upper Saddle River, NJ: Pearson.
Wang, L., Jajodia, S., Singhal, A., Cheng, P. and Noel, S., 2014. k-zero-day safety: A network security metric for measuring the risk of unknown vulnerabilities. IEEE Transactions on Dependable and Secure Computing, 11(1), pp.30-44.
Wang, Y., Hahn, C. and Sutrave, K., 2016, February. Mobile payment security, threats, and challenges. In Mobile and Secure Services (MobiSecServ), 2016 Second International Conference on, 2(2), pp. 1-5.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download