logo

Strategic Security Policy and Potential Threats for National Australian Bank

This report gives you the opportunity to research, formulate, develop and document a basic security policy for a specific organization in Australia. Moreover, you are required to analyze, record, resolve security incidents and identify and assess the threats to, and vulnerabilities of the organisation’s networks.

12 Pages2880 Words109 Views
   

Added on  2023-06-07

About This Document

This report discusses the security threats and vulnerabilities of National Australian Bank (NAB) and provides a strategic security policy for NAB. It also covers potential threats and vulnerabilities such as mobile banking risks, social networks, malware, botnets, DDOS attacks, and more.

Strategic Security Policy and Potential Threats for National Australian Bank

This report gives you the opportunity to research, formulate, develop and document a basic security policy for a specific organization in Australia. Moreover, you are required to analyze, record, resolve security incidents and identify and assess the threats to, and vulnerabilities of the organisation’s networks.

   Added on 2023-06-07

ShareRelated Documents
Information
Security
Strategic Security Policy and Potential Threats for National Australian Bank_1
INFORMATION SECURITY
1
Executive Summary
NAB is a type of financial bank in Australia and there are main two industries of NAB
such as banking and financial services. The main purpose of this report is to understand
the security threat and vulnerabilities of NAB. This report is divided into two parts such
as a strategic security policy for NAB and potential threats and vulnerabilities. There are
various kinds of the process which can be used to reduce cyber-attacks, security risks of
NAB and their users which are explaining in this report.
Strategic Security Policy and Potential Threats for National Australian Bank_2
INFORMATION SECURITY
2
Contents
Introduction.......................................................................................................................................................... 3
National Australian bank.................................................................................................................................3
Part A........................................................................................................................................................................ 3
The strategic security policy for NAB....................................................................................................3
Password system....................................................................................................................................... 3
Encryption method................................................................................................................................... 4
Digital certificates...................................................................................................................................... 4
Authentication............................................................................................................................................. 4
Secure Messaging....................................................................................................................................... 4
Limited Login Attempts.......................................................................................................................... 5
Fraud Alerts.................................................................................................................................................. 5
Fraud Protection Software.................................................................................................................... 5
Part B........................................................................................................................................................................ 5
Potential threats and vulnerabilities of NAB.....................................................................................5
Mobile banking risks................................................................................................................................ 5
Social Networks and Web 2.0...............................................................................................................6
Malware, Botnets and DDOS Attacks.................................................................................................6
Malicious hackers...................................................................................................................................... 6
Sniffers............................................................................................................................................................ 7
Third-Party Apps....................................................................................................................................... 7
Inside Attacks.............................................................................................................................................. 7
Mitigation........................................................................................................................................................... 7
Conclusion.............................................................................................................................................................. 8
References.............................................................................................................................................................. 9
Strategic Security Policy and Potential Threats for National Australian Bank_3
INFORMATION SECURITY
3
Strategic Security Policy and Potential Threats for National Australian Bank_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Developing a Security Policy for Commonwealth Bank: Mitigating Potential Threats and Vulnerabilities
|13
|2983
|97

JP Morgan Data Breach
|5
|722
|96

Information Security Measures And Data Breach Study
|10
|2424
|20

Cyber Attacks by Foreign Governments
|5
|1649
|17

Developing Information Security Policies for Xero
|14
|4396
|167

MGMT6013 Managing Information System | Security Policy
|14
|4311
|36