Wednesday, May 20, 2020

Risk Assessment For Ba Continuum India Private Ltd

Risk Assessment for BA Continuum India Private Ltd. By Sravani Nandyala To Fulfill the Partial Requirements of ITC 6315, CRN 20283 Submitted to Prof. Jason Black Northeastern University – Collage of Professional Studies Abstract An extensive risk assessment for the company which I worked in India. This organization is a subsidiary of Bank of America. Majorly deals with the financial data of the customers. In this paper I would like to introduce a new approach to risk assessment for the bank. This would be more for the banking systems rather than the individual bank. Introduction Risk Assessment is the perseverance of qualitative and quantitative value of risk related with a recognized threat. Measuring credit risk†¦show more content†¦Major Financial institutes protect their data by establishing a security process that recognizes the risks, implements strategy, test implementations and monitor the controls of risks. Information Security Risk Assessment Bank and financial institutes handle the sensitive data of the clients, includes personal data like SSN, Account information, Data of Birth etc. So, financial institutions need to maintain an ongoing risk assessment program to protect the information. Information security risk assessment must be effectively †¢ Collects data regarding the technology and information assets of the company, weaknesses to the assets, vulnerabilities, established security processes and controls, and the existing security requirements and standards. †¢ Analyze the company’s probability and impact with the known vulnerabilities and threats to the assets †¢ Compile and prioritize the current risks associated to vulnerabilities and threats to determine the suitable controls, trainings, and assurance for mitigation. Information Security Strategy An Information security strategy is a plan which helps the organization to mitigate the risks while adhering to contractual, statutory, legal, statutory and internal requirements. Security steps to construct a strategy include the description

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.