This website uses cookies to ensure you have the best experience. Learn more

Solution For The It Security Banking And Ethics

911 words - 4 pages

Solution for the IT security banking and ethics

There are several solutions for the Islamic banking, IT security and ethics in where their practices should not contradict with the teaching of al-Quran but at the same time implement the technology to improve banking service to the society. Below are the solutions that might be suitable for the banking services to implement Islamic ethics in the business and their security perspectives.
What you should do and don’t during practices ethics and security in banking:
 Do not use Other People's Computer Resources without Authorization.
 Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing.
 Shalt Not Interfere With Other People's Computer Work.
 Protecting that Which is Yours
 Equity participation, risk and profit-and-loss sharing arrangements from the basis of Islamic financing.
 Bank on interest (riba), an Islamic bank cannot charge any fixed return in advance, but rather participates in the yield resulting from the use of funds.
 Interest-free banking is based on the Islamic legal concepts of shirkah (partnership) and mudaraba (profit-sharing)
 Always be aware of people who have physical access to your computer. The casual use of your laptop by a person you trust going to a dangerous site or opening a suspicious email, can blow your system out of the water.
 Protect your computer when you are not using it. Disconnect your computer from the Internet when you are not using it. Carefully consider your security settings. Examine all system settings, particularly the security settings, and select options that decrease your risk of data loss or intrusion.
 Back up your data. Protect your backups. When you make your data backups, make sure they are kept in a safe, secure location. It does no good to secure your PC and leave the backups where anyone might find them!
 Don’t store sensitive information in portable device without strong encryption
 Don’t leave your computer / sensitive documents unlocked
 Don’t discuss anything sensitive in public place. People around you may be listening to your conversation
 DO NOT share access to your computers with strangers.
 DO NOT give out your password to anyone.
 DO back-up your data on disks, USB Storage or CDs regularly.
 Be accountable for your IT assets and data
 Use good judgement to protect your data
 Protect your laptop during the trip
 Ensure sensitive information on the computer screen is not visible to others
 Protect your user ID and password
 Avoid using the same password at multiple Web sites.
 Never use the password you’ve picked for your email account at any online site: If you do, and an e-commerce site you are registered at gets hacked, there’s a good chance someone will be reading your email soon.

Literature...

Find Another Essay On Solution for the IT Security Banking and Ethics

The Gambles of Security in the Banking Industry

1152 words - 5 pages fiduciary duty in 2000 when it traded what are known as flexible prepaid forward contracts to the trust, a complex fee-rich product that the judge determined was unsuitable for the trust. Today with the improvement of banks security, online mobile banking is more safer.

Answers to Questions Regarding Banking and Security Issues

1807 words - 8 pages central bank. The central bank is the uppermost monetary institution, which has been specially given an official authority to perform control across the banking system of the country. Regulating bodies can mitigate those risks by taking steps to: • Create broad and perspicuous outsourcing policies; • Introduce effectual programs for risk management; • Compel emergency planning by the outsourcing firm; • Arrange apt outsourcing

Influence and affect the Internet places on IT Security

784 words - 3 pages that organizations can migrate those risks.ReferenceFilipek, R. (2006). Online Security Nightmares for CIOs. The Internal Auditor, 63(3), Retrieved November 27, 2007, from ProQuest.Levi, A. and Kaya Koc, C. (2005). Risks in Email Security. Retrieved November 25, 2007 fromhttp://security.ece.orst.edu/papers/j54risks.pdfShinder, D. (2005). Managed E-Mail Security Services: Is it the right solution for your network? September 2, 2005 Retrieved November 25, 2007 from http://www.windowsecurity.com/articles/Managed-E-Mail-Security-Services-right-solution-network.html

Was it ever possible for the British to establish a fair solution to the Palestinian problem?

2440 words - 10 pages -begetting horrors which put her in a position where she was indisposed to exert influence nor able to foresee the consequences of her impotence. The rest of the world, too, looked on blithely. When they came to act, it was too late. Could Britain be held account for her incompetence, her vacillations in policy and her desire for self-survival and above all her naivety? Britain fluttered along like a leaf in the wind throughout the mandatory

Homelessness in America; Dispute/support the claim: "For every human problem, there is a neat, simple solution; and it is always wrong" by H.L. Mencken

515 words - 2 pages deserve their lot in life. Others had a more socialistic outlook, asserting that if the government built more homeless facilities, the problem would go away. However, as H.L. Mencken said, “For every human problem, there is a neat, simple solution; and it is always wrong,” in this contemporary dilemma, we have the inclination to oversimplify the complex problem of homelessness by offering two solutions that are sadly inadequate.Those who

What do you understand by the term least-cost solution and in what sense is it a "solution"?

1180 words - 5 pages . However it cannot buy or build another aeroplane in a short period. The long run is a time period that is long enough to allow for all inputs to be varied. For example in the long run a firm may be able to build more machines and buy more land for storage.The term "least-cost solution" is used by firms who wish solely to profit maximize. The solution devises a technique of production which designates a point that keeps costs at its least to keep

Nuclear Solution For the Future

2302 words - 9 pages Nuclear Solution for the Future For forty years the United States has encountered increased prices and demand for energy. So what has been done to end the country’s energy crisis? Numerous organizations such as, The Environmental Protection Agency (EPA) and the Department of Energy (DOE) have done research and made recommendations, but no systems have been put in place to resolve this volatile situation. The U.S. has resources and

Stress Management for Everyday Living. Define a solution for stress management as it relates to the online student

717 words - 3 pages AbstractDealing with stress and finding solutions to manage it are vital to the success we face in our daily lives, at work, school, and our home lives. Without proper management, stress can cause minor problems to be elevated into major difficulties and in some cases, lead to depression. With a little research and the development and execution of a plan for managing those levels, stress can be controlled to allow us to become successful in all

Home Security Systems: Effective Home Security Solution to the Increased Home Burglary Incidents

1339 words - 6 pages property, home burglary often results to physical assaults, increased rape incidents and immense psychological trauma. The increased incidents highlight that the impact of burglary effects is high, hence the need for people to protect their homes from burglary. This makes burglary the most pertinent home security issue. In response to the increased burglary, most people have been focusing on installing alarm systems, with the expectation that they will

Organization IT and Security Systems: Disaster Recovery

1148 words - 5 pages Within the systems support and security phase, IT personnel maintains, enhances, and protects the system1. Security controls safeguard the information system from external and internal threats. A well-constructed system has to be secure, scalable, reliable, and maintainable. Systems support and security implements vital protection as well as maintaining services for software, hardware, along with enterprise computing systems, corporate IT

IT Security: The Men Behind the Scenes

1345 words - 6 pages is about 8.6 billion people)(Brenner 23). What are the various jobs within the realm of IT security? There are many different jobs! For example, one can create code to protect private information against viruses, which is a programmer. This is a very interesting job because someone interested in this can use dozens of computer languages, and programming code is very customizable with the operating system Linux, with the added benefit of

Similar Essays

Fingerprint Recognition Software Use For Banking Security

2276 words - 9 pages This research paper looks at the issues today surrounding identity theft and consumer fraud in the banking industry. It looks at how biometrics, or fingerprint recognition specifically, can help strengthen the security that banks provide for the safeguarding of the personal information of their customers. Because of banks being targets both online and offline for identity theft and consumer fraud, this paper discusses how business is done

Ethics And Information Security Essay

1074 words - 4 pages Ethics and Online Source Information What is Ethics? In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The

Banking And The Economy Essay

1928 words - 8 pages entire economy, in many ways.In comparison to the larger banks of the world, Canada?s most major banks are not even close to the size and caliber of international banks like ING Direct, for example. This would not typically be a problem for Canadian banks, however when these international banks move into Canada, which has happened already, and is bound to happen even more as time passes and Canada becomes a more prosperous country, it quickly becomes

Ethics And The Values Behind It Fsw Ethics

1629 words - 7 pages Anthony Mayor Ethics Journal Man 3063 CRN 11184 Journal 1 The most courageous thing I have every done would have to be stepping into an altercation at school in 8th grade. At lunch time, once you are done with lunch you go out to an area and relax for the rest of lunch. There were these kids that always played Pokémon and were bullied by the “popular” kids. One day this kid Jeremy (who thought he was the coolest kid) went up to these two kids