Information Security in Commonwealth Bank of Australia
Added on 2023-06-06
14 Pages2833 Words167 Views
INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author Note
Information Security
Name of the Student
Name of the University
Author Note
INFORMATION SECURITY
Table of Contents
Executive Summary.............................................................................................................................1
Introduction..........................................................................................................................................3
Stakeholders of the organization..........................................................................................................3
Nature of the business..........................................................................................................................4
Strategic Security policy......................................................................................................................4
Purpose and Objectives of the policy...................................................................................................4
Policy statement...................................................................................................................................4
Training................................................................................................................................................5
Risk Assessment and Management......................................................................................................5
Vendor Management............................................................................................................................5
Selection of appropriate vendor.......................................................................................................5
Contracts...........................................................................................................................................6
Monitoring........................................................................................................................................6
Contingency Plan.............................................................................................................................6
Role and Responsibility....................................................................................................................7
Strategic Security Policy Framework...................................................................................................7
Availability and maintenance of strategic security policy...................................................................7
Resource Management.........................................................................................................................8
Cryptographic protocols.......................................................................................................................8
Operational responsibilities..................................................................................................................8
Table of Contents
Executive Summary.............................................................................................................................1
Introduction..........................................................................................................................................3
Stakeholders of the organization..........................................................................................................3
Nature of the business..........................................................................................................................4
Strategic Security policy......................................................................................................................4
Purpose and Objectives of the policy...................................................................................................4
Policy statement...................................................................................................................................4
Training................................................................................................................................................5
Risk Assessment and Management......................................................................................................5
Vendor Management............................................................................................................................5
Selection of appropriate vendor.......................................................................................................5
Contracts...........................................................................................................................................6
Monitoring........................................................................................................................................6
Contingency Plan.............................................................................................................................6
Role and Responsibility....................................................................................................................7
Strategic Security Policy Framework...................................................................................................7
Availability and maintenance of strategic security policy...................................................................7
Resource Management.........................................................................................................................8
Cryptographic protocols.......................................................................................................................8
Operational responsibilities..................................................................................................................8
INFORMATION SECURITY
Risk Assessment...................................................................................................................................8
Security measures.................................................................................................................................9
Policy approval.....................................................................................................................................9
Reference............................................................................................................................................11
Risk Assessment...................................................................................................................................8
Security measures.................................................................................................................................9
Policy approval.....................................................................................................................................9
Reference............................................................................................................................................11
INFORMATION SECURITY
Introduction
The foremost determination of the report is to focus on the Australian multinational bank
known as Commonwealth Bank of Australia which was enlisted in the Australian Stock Exchange
in 1991 (Aulich, Jones & Head, 2018). The different departments in which they provide their
services are insurance, investment services, superannuation, funds management, retail, business and
institutional banking.
Stakeholders of the organization
This multinational bank has different types of internal and external stakeholders involved in
all of their activities such as the customers, employers, shareholders, investors, suppliers, industry
associations, educational institutions, communities, government agencies and NGOs (Dixon &
Finnane, 2018). Head quartered in Diamond Harbor, Sydney the total revenue of this global bank
was around $26 billion AUD for the year 2017.
Nature of the business
Started in 1912 in Melbourne, this public bank increased their features and services over the
years which makes them one of the most reputed banks in the world. The extensive service
provided by them makes them the largest bank in the Southern Hemisphere (Worthington, 2016).
The mature of products provided by this bank are credit cards, mortgages, global wealth
management, investment management, consumer banking, corporate banking, finance, insurance
and private equity.
Introduction
The foremost determination of the report is to focus on the Australian multinational bank
known as Commonwealth Bank of Australia which was enlisted in the Australian Stock Exchange
in 1991 (Aulich, Jones & Head, 2018). The different departments in which they provide their
services are insurance, investment services, superannuation, funds management, retail, business and
institutional banking.
Stakeholders of the organization
This multinational bank has different types of internal and external stakeholders involved in
all of their activities such as the customers, employers, shareholders, investors, suppliers, industry
associations, educational institutions, communities, government agencies and NGOs (Dixon &
Finnane, 2018). Head quartered in Diamond Harbor, Sydney the total revenue of this global bank
was around $26 billion AUD for the year 2017.
Nature of the business
Started in 1912 in Melbourne, this public bank increased their features and services over the
years which makes them one of the most reputed banks in the world. The extensive service
provided by them makes them the largest bank in the Southern Hemisphere (Worthington, 2016).
The mature of products provided by this bank are credit cards, mortgages, global wealth
management, investment management, consumer banking, corporate banking, finance, insurance
and private equity.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Information Security: Commonwealth Bank of Australialg...
|11
|3182
|408
Implementation of ERP System in Commonwealth Banklg...
|16
|4970
|308
Developing a Security Policy for Commonwealth Bank: Mitigating Potential Threats and Vulnerabilitieslg...
|13
|2983
|97
Risk Management | Financial Institute of Managementlg...
|16
|2400
|21
Strategic Information System of Commonwealth Banklg...
|15
|3517
|55
Report Strategic Information Systemslg...
|19
|3969
|36