Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Your responses to other students must be more than a simple "Good job" or "I agree with your post"

Your responses to other students must be more than a simple "Good job" or "I agree with your post"

Computer Science

Your responses to other students must be more than a simple "Good job" or "I agree with your post". They must also not just be "Let me add to your post..." Instead, your responses to each other should do three things:

 

1. Acknowledge the other student's post with some form of recognition about what they posted
2. Relate their posting to something you have learned or are familiar with
3. Add to the conversation by asking additional questions about their post, or discussing their topic further

 

Remember, this is a discussion forum. Your engagement with each other should be similar to how you would speak with each other if you were seated at the same table talking. Plagiarism in the discussion will not be tolerated.

Discussion 1:

 

For preventing unauthorized access of debit cards and credit cards banks will need to make sure that they develop new ideas and strategies which will help them in providing cardless transactions at ATMs for their customers. It is also important for the organization to deploy the concept of using one-time password which will help in preventing such kind of millions of cards to be canceled just because the data relating to the card has been stolen. If every organization and payment gateway develop solutions for working on the process of implementing one time password such kind of canceling the cards and costs needed for reissue of these cards can be eliminated. Brinks (2020) states that “Some of the top banks have found a way to make accessing your cash even easier. With secure apps installed on your mobile phone, you can access your digital wallet to withdraw the money from an ATM. Your phone is already at your fingertips – now your cash will be too.”

.

          Organizations facing the problem of managing their payrolls and the credit of these payroll checks to the Account of their employees they need to work in coordination with the bank and banks will also need to understand the deployment of automated payroll generations and application management from the use of cloud computing. Any kind of malfunction to the computers can cause delay in the operations of mutual fund organizations and to prevent this kind of situation organization must be having incident handlers who will be able to resolve the issues relating to the malfunction of the computers at a better speed and by making use of software as a service deployed on the cloud such kind of malfunctions relating to the hardware and software is installed on the computers can be easily illuminated. Today with the advancements that are available in the field of cloud computing banks and financial organizations can reduce the cost of operations and ensure that security precautions are taken for eliminating any kind of cyber attack and lots of important data.

.

Reference: 

Brinks. R. (April 2020). Access your savings with your smartphone using cardless ATMs

 

 

 

 

Discussion 2:

 

Digital assaults have gotten basic in numerous associations today. In the current case, hackers dispatch a digital assault that seriously impacts on the country's money related foundation. The programmers access touchy Mastercard handling offices, discharging data to the web. The ATM machines fail the nation over, and huge benefits and shared reserve associations experience PC interferences. Plus, Financial foundations should execute broad assurance arrangements (Bottazzi, Italiano, and Spera, 2018). Regardless, there is an all-around characterized security strategy. It will fill in as an essential guide for the banks' IT group to keep up the security design.

Antitrust merger law hopes to block trades whose presumable anticompetitive outcomes surpass their potential focal points. The critical time for the study, generally, is where the merger is first proposed. This requires approval associations and courts to guess feature examples and future effects. Most monetary organizations keep on relying upon obsolete advancements to forestall digital assaults when lawbreakers are utilizing the most recent advances, making it hard for foundations to protect themselves. Establishments should be increasingly expectant by exploiting new innovations too. They should utilize artificial intelligence (AI) to fortify validation techniques (Shields, 2015). The association should section its data framework and separate its data innovation resources utilizing the degree of security that singular resources need as the partition standards. It should then utilize a firewall as the limit for separating traffic between the fragments that are at various security levels. Additionally, it ought to differentiate its foundation to make it unimaginable for a malware made for one framework from spreading to its entire system from only one PC

Reference

Amoroso, E. G. (2012). Cyber-attacks: protecting national infrastructure. Elsevier.

Bottazzi, G., Italiano, G., & Spera, D. (2018). Preventing Ransomware Attacks through File System Filter Drivers.

Shields, K. (2015). Cybersecurity: Recognizing the risk and protecting against attacks. NC Banking Inst., 19, 345.

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE