Wednesday, June 12, 2019
Create a Security Policy Essay Example | Topics and Well Written Essays - 500 words - 1
Create a Security Policy - Essay Exampleigital era, anything can be breeched even the just about innocent must be subjected to a vetting process to ascertain the genuineness of the information and details they present for processing. To take in that the McBride is successful, in processing these information, the key surface is to ensure that before the client is cleared to access the a loan, the firm is first aware of the clients loan status with any other institution if it exists, and whether he or she was able to service previous loans within the given time frames (IBM Redbooks. 2011).One of the security policies that ordain have to be put in betoken include the need for a guarantor, to ensure that the loan is secured. This information should also be verifiable for instance, if a client has a vehicle, with a genuine log book, that property should be verifiable with car registration agencies.The other security policy involves members and or clients who bequeath want to seek for the same service online. Clients will be required to register themselves to create an account in which communications will be dropped at. While registering, the password to be employ will be tamper proof one, thumbprints will be used to ward of any local threat to growth.The other aspect of security that will be used to ensure that the client taking the loan is able to pay back the full amount or lose the property is to be in obstinacy of the title deed. The fact that McBride is the financier, means that it will be in the best interest of the business to be in possession of the title deed to ensure that incase the client fails to service the loan, the property will be repossessed with ease.The other most crucial security policy is that of conducting timely security audits to establish any areas of vulnerabilities that can be a setback to the mission of firm. For instance, the chance that someone can infiltrate the network and fill in dummy data that will legitimize his or her application for a loan and perhaps the number of times that has
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.