You are on page 1of 6

Police staff college Bangladesh

Master of Applied criminology and Police Management


Session: 2019-2020
Semester -2, Batch-5th

Mid-Term Assignment

Course Title: Cyber crime and cyber security


Course code: 820515

Submitted To
Md. Shah Alam Sir
DIG, Railway Police
Bangladesh

Submitted By
Md. Abdul Karim
Mobile: 01790054479
Email: pabdulkarim17@gmail.com

Date of Submission: 18-02-2022


I work in a bank. A bank is a financial institution licensed to received
deposits and make loans. Bank may also Provide financial services such as
wealth management, currency, exchanged safe deposit boxes. They are
several deferent kinds of banks including retail banks, commercial or
corporate banks and investment.

Our company cyber security policy outlines our guidelines and provisions
for preserving the security of our date and technology infrastructure.

Cyber security automation gives organizations the ability to perform


threat detection and incident response at safe. Al powered intelligent
automation requires large amounts of date in order to be most effective,
so machines that have been development over time are becoming
powerful enough to analyze vulnerabilities and respond to incidents in
real time. By automating tedious and repetitive security task, response
time is expedited while reducing alert figure and human error.

It development perspective:

For digital development a draft automations plan for my organization is


given below-

1. To establish basic security practices to protect sensitive business


information and communicate them to all employees on a regular
basis. To establish rules of behavior describing how to handle and
protect customer information and other vital date. Clearly spell out
the penalties for violating business polices.
2. All operating system vendors regularly provide patches and updates
to their products to correct security problems and improve
functionality. Configure all software to install such up dates
automatically.
3. We should regularly backup the date on every computer used in
business. Critical date in clues work processing documents,
electronic spread sheets, date bases, financial files, human,
resource files and accounts receivable/pay able files. Have to
backup date automatically if possible, or at least weekly.
4. To prevent access or use of business computers by unauthorized
individuals, Laptops can be particularly easy targets for theft, as
make sure they are sorted and locked up when unattended.
5. To hide wi-fi networks, setup wireless access point a router so if
does not broadcast the network name also known as the service
set identifiers (SSID).

To secure origination:

We can secure our organization by follow these steps-


1. Confidential date:

 Unpublished financial information


 Date of customers/ partners/ vendors
 Pattern’s, formulas or new technologies
 Customer lists.

All employs are obliged to protect this date. In this policy, we will give our
employees instructions on how to avoid security breaches.

2. Protect personal and company device:

When employees use this digital devices to access company emails or


account.

 Keep all devices password protected.


 Choose and upgrade a complete antivirus software.
 Ensure they do not leave this device exposed or unattended.
 Install security updates of browsers and systems monthly or as
soon as updates are available.
 Log into company accounts and systems through secure and
private networks

We also advise our employees to avoid accessing internal systems and


accounts from other people’s devices or lending their own devices to
others.
3. Keep emails safe:

Emails often host scams and malicious software-

 Avoid opening attachments and clicking on links when the content


is not adequately explained.
 Be suspicious of click bail tiles
 Check email and names of peoples they received a message from to
ensure they are legitimate.
 Look for inconsistencies or give away.

4. Transfer data securely:

Transferring data introduces security risk. Employees must-

 Avoid transferring sensitive date. to other devices or accounts


unless absolutely necessary. When mass transfer of such date is
needed, we request employees to ask our for help.
 Share confidential data over the company network/ system and
not over public wi-fi or private connection.
 Ensure that the recipients of the data are properly authorized
people or organizations and have adequate security policies.
 Report scams, privacy breaches and hacking attempts.
5. Remote employees:

Remote employees must follow this policies instructions too. Since they
will be accessing our company’s accounts and systems from a distance,
they are obliged to follow all date encryption, and ensure their private
network is secure.

You might also like