Friday, May 22, 2020

Background of Public Bank and Security Threats Problem

Public Bank Malaysia was established in 6 August 1966 by Tan Sri Dato’ Sri Dr. Teh Hong Piow, and was listed on the Kuala Lumpur Stock Exchange (KLSE) on 6 April1967 (Public bank corporate profile, n.d.). The headquarters of the bank is situated in Kuala Lumpur, the capital city of Malaysia. According to Public Bank Corporate Profile (n.d.), the Public Bank Group is the third largest banking group in Malaysia with total assets of RM274.62 billion at the end of 2012, and ranked number six by asset size in Southeast Asia. Public Bank also known as the largest non-government-linked corporation in Malaysia (Public Bank Corporate Profile, n.d.). Data retrieved from http://1-million-dollar-blog.com/2011-ranking-of-malaysian-banks-based-on-assets-size-market-capitalization/. The mission of Public Bank is to â€Å"sustain the position of being the most efficient, profitable and respected premier financial institution in Malaysia† (Public bank corporate profile, n.d.). To achieve their goal, Public Bank cares for its customer, employees, shareholders and community to let everyone can satisfied with their services. To be ranked among the top 100 banks in the world is the vision of the bank. Problem Until now, security threat is always a challenge for Public Bank Malaysia Berhad. A security threat can be known as a possible cause that may harm to a system or an organization and even its assets (Information Management, n.d.). It happens when data transaction and transmissionShow MoreRelatedAssesment 2729 Words   |  3 Pages7 Lab #1 - Assessment Worksheet Identifying Threats and Vulnerabilities in an IT Infrastructure CSS 250 Security Risk Management Course Name and Number: _____________________________________________________ Kristopher Brown Student Name: ________________________________________________________________ Cheryl Frederick Instructor Name: ______________________________________________________________ 10/13/2014 Lab Due Date: ________________________________________________________________ Read MoreHow Technology Can Protect Privacy?1289 Words   |  6 Pagesand stored by the government, where it stays for an unknown amount of time. Isn’t this an invasion of your privacy? Important information such as; bank accounts and medical information should be protected from the government. You should be allowed to have your privacy unless the government has hard evidence against you to think that you are a threat. And even then there should be specific circumstances that should be followed. The government shouldn’t have the right to look at or save informationRead MoreTechnology Threatens Your Privacy Essay example964 Words   |  4 PagesPrivacy threats are currently the biggest threat to National Security today. The threats are not only concerning to the government, however. An alarming 92% of Americans are concerned that the power grid may be vulnerable to a cyber-attack (Denholm). Although this is a more recent development to the cyber threats we have expe rienced, this is not the first time that privacy threats have stepped into the limelight as people are forced to watch their every online move. There are twelve major ways technologyRead MoreEmergency Management Training in College Campuses840 Words   |  3 Pagesa large student population is always a cause for concern. It is difficult to govern or even deter the questionable activities of a predominately young student population. This problem is exacerbated due to the rebellious nature of young students in regards to politics, social interactions, student programing and more. Public news often comes from universities with questionable activities such as fraternity hazing, supporting controversial leaders, and more. This behavior is what makes a universityRead MoreBusiness Model For Information Security Essay1681 Words   |  7 PagesModel for Information Security (BMIS). The model manages information security by addressing the complexity of security. It consists of four construct; Organization Design and Strategy, People, Process and Technology which interact with each other (ISACA 2009). According to (Horvà ¡th, 2010) the model emphasizes the importance of an organization culture as applied to information security. In the creation of this culture the following are instituted: alignment of information security with business objectivesRead MoreThe Emergency Legislation And Its Effect On The Banking System Essay1085 Words   |  5 Pageseffective use of the assets of banks, to regulate interbank control, to prevent the undue diversion of funds into speculative operations, and for other purposes.† The measure was sponsored by Sen. Carter Glass (D-VA) and Rep. Henry Steagall (D-AL). Glass, a former Treasury secretary, was the primary force behind the act. Steagall, then chairman of the House Banking and Currency Committee, agreed to support the act with Glass after an amendment was added to permit bank deposit insurance.1 On June 16Read More Identity Theft Essay examples1315 Words   |  6 Pagesaccounts, income, social security numbers or just someone name, address, and phone numbers are now collected and could be used illegally by these individuals without anyone’s knowledge. nbsp;nbsp;nbsp;nbsp;nbsp;The purpose of this study is to investigate what is being done to help control this growing crime in North Carolina. This includes the evaluation of the identity theft policies that the banks in North Carolina have in place. The study attempted to determine which bank had better and tougherRead MoreMedia Ethical Challenges in the Age of the Internet1037 Words   |  5 Pagesinternet has literally revolutionized the mass media industry and, in the process one of the most affected areas by the internet is in the area of compliance with media ethical standards. These ethical problems are invasion of privacy, inaccuracy, and copy right infringement. One of the biggest ethical problems is privacy rights over the internet. Internet privacy is defined as the desire of personal privacy with respect to transactions or transmission of data via the internet. It involves the exerciseRead MoreThe Cyber Warfare Struggle Of The Technological Era1744 Words   |  7 Pagesa ge advanced, this distrust decreased as more and more people became reliant upon computers and cell phones whether at work or at home. Along with this increase in reliance on technology came the increase in security and monitoring by the federal government. Mostly by the National Security Agency, this monitoring was very modest and seemed to be preventing harm. That is until our â€Å"computer wizards† (Hosenball) wised up to what they were actually doing. In monitoring the average person’s usage, theyRead MoreThe Dangers Of The Global Financial Institutions1341 Words   |  6 PagesI. Background of the Problem Much of the today’s research expressly shows that not only the prosperity, but also the entire existence of the global financial institutions is seriously jeopardized nowadays. Thus, in spite of the fact that a great deal of technological advancements has been discovered by the global community, together with the improvements of communication and business operations, this technological revolution brought many challenges simultaneously (Kim 2014). To be more specific

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.