NU MSIT 458 - Securing External Data Transmission

Unformatted text preview:

Slide 1XYZ, a Debt Collections CompanyPII Data Flow for Debt CollectionsSecurity ConcernOutline for External Data TransmissionExternal Communication PoliciesSlide 7Fine Tuned MachinesBuilding a Strong Brand Image by Securing External Data TransmissionA Review of Information Security in the Debt Collections WorldFine Tuned MachinesXYZ, a Debt Collections Company•A leading Debt Collections firm with over $700 million in Capital•Full range of Debt Collections, including auto recovery, municipal accounts, bankruptcy and credit debt•Provides collections services for major clients such as Bank of America, Chase, HSBC, Toyota and GMAC•Strives to build relationships with the “debt sellers”•To achieve the goal of collecting on debts, XYZ is “in the business of purchasing information”3/13/2010 2MSIT 458 - FTM GroupFine Tuned MachinesPII Data Flow for Debt Collections3/13/2010 MSIT 458 - FTM Group 3Fine Tuned MachinesSecurity Concern3/13/2010 MSIT 458 - FTM Group 4XYZ must protect the data transmission to external parties to avoid data breaches and defend against malicious attacksImplications of data transmission breaches•Legal Consequences•Financial Impacts•Stakeholder Confidence •Company Reputation•Other Partnerships (Third Party Data Providers, External Legal Counsel)Fine Tuned MachinesOutline for External Data Transmission3/13/2010 MSIT 458 - FTM Group 5•Discuss different types of transmission and their protection methods•Email•Snail Mail / CD•FTP•Upload to secured Seller sites•Potential Attacks on External Data Transfer•Legal implications•Costs to protect & secureFine Tuned MachinesExternal Communication Policies•Adopt policies that mandate secure external communication between trusted networks and untrusted networks through out organization.•When secure external communication is not possible; adopt best practices to minimize risk.•Evaluate current external communication practices.•Create transition plan to move towards approved security policy.•Maintain revue process to assess effectiveness of policies.Fine Tuned Machines3/13/2010 MSIT 458 - FTM Group


View Full Document

NU MSIT 458 - Securing External Data Transmission

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Hacked

Hacked

6 pages

Firewalls

Firewalls

52 pages

Load more
Download Securing External Data Transmission
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Securing External Data Transmission and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Securing External Data Transmission 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?