Preview

Project Part 1- Executive Summary & Tasks 1,2,3

Better Essays
Open Document
Open Document
1335 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Part 1- Executive Summary & Tasks 1,2,3
Dear Sir or Madam,
After evaluating the business needs of First World Bank Savings and Loan (FWBSL) and the use of secure open source software to enhance security and reduce business costs, I have concluded that the best option would be to introduce Centos to the network. The reason I chose this is because they offer free software and it also mirrors Red Hat Enterprise Linux (RHEL). Centos offer many online support options and can be updated regularly. Listed below are the server options that I suggest are the best option for FWBSL:
Database Server: MySQL
Web Server: Apache
File Server: Samba
Mail Server: Simple Mail Transfer Protocol (SMTP)
LDAP Server: Open LDAP

First World Bank Savings and Loan will need to implement a three tier platform architecture that will offer more security for their clients and business needs. Implementing this type of platform will ensure that FWBSL will not be in trouble with GLBA and will keep them compliant with PCI DSS.
Tier One Client Side
Tier Two Applications
Tier Three Servers

I hope this give First World Bank Savings and Loan a brief description of what needs to be implemented within the company in order to offer better services and still stay compliant with the State and Federal Regulations.
Thank you,

Project Part 1
Task 1
First World Bank Savings and Loan (FWBSL) needs to consider the increased revenue and cost that will be present if they decide to offer secure services to their clients. With them expecting to have over $100,000,000 a year for online credit cards and loan applications together with other banking services, they are also expected to provide this service while paying close attention to the three security priorities which are: confidentiality, integrity, and availability. Customers expect FWBSL to be diligent when it comes to protecting their accounts and Nonpublic Personal Information. If something were to go wrong they could lose credibility with their current and potential



Cited: "How to choose the best Linux server for your business." How to choose the best Linux server for your business. http://www.itworld.com/operating-systems/372236/how-choose-best-linux-server-your-business (accessed January 12, 2014). Jang, Michael H.. Security strategies in Linux platforms and applications. Sudbury, MA: Jones & Bartlett Learning, 2011. "Top Five Benefits of Using Linux Web Hosting." Shared Web Hosting & Website Hosting Services Provider – AN Hosting. http://www.anhosting.com/blog/2012/10/top-five-benefits-of-using-linux-web-hosting/ (accessed December 18, 2013). "Chapter 23. Samba." Samba. http://www.centos.org/docs/4/html/rhel-sag-en-4/ch-samba.html (accessed January 13, 2014). "Open Source Software Technical Articles." PostgreSQL vs. MySQL: Which Is the Best Open Source Database?. http://www.openlogic.com/wazi/bid/188125/PostgreSQL-vs-MySQL-Which-Is-the-Best-Open-Source-Database (accessed January 13, 2014). "Bank regulatory compliance services." PwC. http://www.pwc.com/us/en/financial-services/regulatory-services/bank-regulatory-compliance.jhtml (accessed January 12, 2014). "File Permissions on CS Linux machines." File Permissions. http://www.cs.rutgers.edu/resources/systems/file_permissions.whtml#unix_cheat (accessed January 14, 2014). Wikimedia Foundation. "Chmod." Wikipedia. http://en.wikipedia.org/wiki/Chmod (accessed January 14, 2014). "Admin Tools - User 's Guide :: Fixing the permissions of files and directories." Admin Tools - User 's Guide :: Fixing the permissions of files and directories. https://www.akeebabackup.com/documentation/admin-tools/fixing-permissions.html (accessed January 14, 2014). Chicago formatting by BibMe.org.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Mcbride Finacial Security

    • 601 Words
    • 2 Pages

    This document is to describe the Information Security requirements of Online Application Services and Application Service Providers that engage in business with McBride Financial Services. This policy applies to any use of Online Loan Applications (OLA) and any outsourcing to Application Service Providers (ASP) by McBride Financial Services, independent of where hosted.…

    • 601 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Netw 240 course project

    • 1091 Words
    • 5 Pages

    The first thing I will discuss is cost. Cost is always an important issue that must be addressed for a business. A product that does not have an equal or gain return when compared to its cost would be considered a poor financial decision. Prices for each vendor vary with each vendor offering a variety of options for customers. I have found that one of the three companies would offer a particular service that the other three would not offer. I have found that the vendor Red Hat had two options for purchase. According to (Purchasing red hat,), the price given for one year is $3,249 per socket pair and for a three year contract it is $9,260 per socket pair. Both options have unlimited guest. Now looking at Novell on their prices, (Open enterprise server,) states that Novell Cluster Services 1.7/1.8 for Netware 6.5 and Open Enterprise Server Cluster Server License is $12,000. Ubuntu is the last of the vendors that I have price checked and according to (Server management,), Ubuntu charges $1,200 per server per year. Each company provides us with costs that might seem a little excessive for our company. The services they provided will be worth the money we spend or invest in this purchase.…

    • 1091 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Project Proposal

    • 437 Words
    • 2 Pages

    Managers will require three day training in Washington D.C. to learn and share the new knowledge with their branch office employees.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    Cited: Jang, M. (2011). Security Strategies in Linux Platforms and Applications. Jones & Bartlett Learning.…

    • 295 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Pastore, M. (2010, October 22). Is OpenTable Worth it? Retrieved October 28, 2014, from http://incanto.biz/2010/10/22/is-opentable-worth-it/…

    • 3780 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth.…

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The task team at First World Bank Savings and Loan wants you to research appropriate…

    • 849 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Project Part 1 Task 1

    • 1367 Words
    • 6 Pages

    Federal Information Security Management Act (FISMA) compliance is required for federal agencies to protect their important information. Department of Homeland Security (DHS) compliance is to be required for protection to the United States against terrorists. There are other organizations in which standards are given for risk management projects, including: National Institute of Standards and Technology (NIST), Department of Defense (DOD) Information Assurance Certification and Accreditation Process (DAICAP), and Control Objects for Information and related Technology (COBIT).…

    • 1367 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Ken Milberg (April 2008). When to use Unix or Linux?, TechTarget, Inc. Retrieved July 16, 2008 from: http://searchenterpriselinux.techtarget.com/tip/0,289483,sid39_gci1307879,00.html…

    • 852 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Stout, G. (2012). Live chat presentation 8: Phases 4 & 5. Colorado Springs, CO: CTU Online. Retrieved from CTU Online, Virtual Campus, ICS, 652-1203B-01 https://campus.ctuonline.edu/MainFrame.aspx?ContentFrame=/Default.aspx…

    • 8519 Words
    • 35 Pages
    Powerful Essays
  • Good Essays

    Three Best Practices

    • 330 Words
    • 2 Pages

    This paper will talk about three best practices a bank can use to protect and secure customer identity, information and assets. One practice is to train employees on protecting customer’s information. Second practice is to have layer security on bank’s website. Third practice is to shred documents.…

    • 330 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Windows versus Linux for Web Page Hosting by Jennifer Kyrnin. Retrieved January 30, 2012 from http://webdesign.about.com/od/webhosting/a/windows_v_linux.htm…

    • 1169 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Bank and Fidelity

    • 1307 Words
    • 6 Pages

    In the ever changing banking industry, First Fidelity Bancorp had grown to be one of the largest holding companies of eight financial institutions and over 500 branches. Their growth has been through the acquisitions of other smaller institutions and internal growth generated by strong relationships with customers. This growth has come at a cost and First Fidelity has been left with a complicated mix of systems, operations, and organizational culture. First Fidelity allowed the eight financial institutions to operate totally independent of each other and the corporate office solely managed the integration of the financial reporting responsibilities. The non-integration of systems and operations has also left First Fidelity with higher costs and the need to make changes which will allow them to be competitive in the future. By the early 1990’s First Fidelity had begun to integrate some of the operational functions, but had yet to connect them further.…

    • 1307 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Syllabus of 8th Sem

    • 728 Words
    • 3 Pages

    Security – PGP – S/MIME - IP Security – Web Security. UNIT V SYSTEM LEVEL SECURITY 9+3 Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems. TEXT BOOKS 1. Behrouz A Forouzan , “Cryptography and Network Security”, Tata McGraw Hill Education Pvt. Ltd., New Delhi, 2007.…

    • 728 Words
    • 3 Pages
    Satisfactory Essays