Background Of Public Bank And Security Threats Problem

663 words - 3 pages

Public Bank Malaysia was established in 6 August 1966 by Tan Sri Dato’ Sri Dr. Teh Hong Piow, and was listed on the Kuala Lumpur Stock Exchange (KLSE) on 6 April1967 (Public bank corporate profile, n.d.). The headquarters of the bank is situated in Kuala Lumpur, the capital city of Malaysia. According to Public Bank Corporate Profile (n.d.), the Public Bank Group is the third largest banking group in Malaysia with total assets of RM274.62 billion at the end of 2012, and ranked number six by asset size in Southeast Asia. Public Bank also known as the largest non-government-linked corporation in Malaysia (Public Bank Corporate Profile, n.d.).


Data retrieved from http://1-million-dollar-blog.com/2011-ranking-of-malaysian-banks-based-on-assets-size-market-capitalization/.

The mission of Public Bank is to “sustain the position of being the most efficient, profitable and respected premier financial institution in Malaysia” (Public bank corporate profile, n.d.). To achieve their goal, Public Bank cares for its customer, employees, shareholders and community to let everyone can satisfied with their services. To be ranked among the top 100 banks in the world is the vision of the bank.

Problem

Until now, security threat is always a challenge for Public Bank Malaysia Berhad. A security threat can be known as a possible cause that may harm to a system or an organization and even its assets (Information Management, n.d.). It happens when data transaction and transmission attacks or a false authentication is used to enter into the account through unauthorized access (Lallmahamood, 2007). There have some reasons that security threat occurs which include human error, promotion, and lack of knowledge. Sometimes, some users will make a mistake such as send their personal information to the wrong website. This provides the opportunity for identity theft to use their information. Besides that, when greedy users receive an email about promotion, bonus and lucky draw, they think that there have the chance to win a big reward or bonus by fill up and send their information to the specific website. However, it gives another chance for the identity theft to get their information and steal the money from their bank accounts....

Find Another Essay On Background of Public Bank and security threats Problem

A Comparative Technical Analysis of Banking Sector with Special to Public and Private Sector Bank

1323 words - 6 pages year value, Sales, Operating profit margin, Net profit, Equity, Earning per share, Book value, Factor value, Dividend and Price Earnings for the public sector bank of SBI, and for the private sector banks of HDFC. 1 Weekly movement of Current market price The performances of Current market price of the public sector and private sector banks are analyzed in this section. The Weekly movement of Current market price of the public sector and private

There are many threats to global food supplies. Explain the problem, identify possible solutions and assess the implications of implementing these

786 words - 4 pages these solutions. In the next 40 years the world’s population is predicted to rise to 9 billion, that amount of people living on this planet would put a lot of strain on the agricultural sector, there would be more demand for food and water. According to (Ryan, 2010) Agricultural land loss is a growing problem in most countries and across the globe as our world population increases. One of the major problem affecting the global food supply is

Steps To Effectively Respond To A Security Incident And Threats On A Wireless Network

1172 words - 5 pages mitigate the likelihood of the incident reoccurring. For example, let's say the security incident involved not applying patches in a timely manner. You need to modify your change management process and patch testing procedures to be able to respond more quickly to threats in the future. Sometimes the overall problem is a lack of training on the part of the people responsible for the affected systems. This could include users who open attachments

Historical Background of Labor Unions and Leaders

2426 words - 10 pages , arbitration, and negotiation by union representatives (Fossum, 2012). However, economic instability resulted in government-ordered use of law enforcement, federal troops, violence, and threats of federal criminal charges to halt union activities (Fossum, 2012). The Sherman Antitrust Act of 1890 further limited collective action by forcing unions to pay punitive damages for their activities which were determined to restrain trade (Fossum, 2012

History and Background of Doha Round

634 words - 3 pages and political gridlock, along with the absence of political strives between WTO members, provides to be a constraint for the Doha Round. The different political ideologies serve as the main culprit for why negotiations have not move forward. In this essay, we will explain the history and background of Doha Round, analyze the Doha Round policies, composition, and how they have failed for developing nations, and policy considerations and

Background and Global Influence of Japanese animation

1707 words - 7 pages We cannot doubt that Japan has the biggest animation industry in the world. As an animation superpower, Japan has surpassed the United States in animation export and become the world’s largest exporter of animation (Guo, 2013). The globalization of Japanese animation has huge development in recent two decades. Animation brings huge economic benefits to Japan. This essay will research various aspects of Japanese animation, including background

Background and Influence: Merchant of Venice

1959 words - 8 pages In England, during the lifetime of William Shakespeare, oppression was occurring against people of different races, ethnicities, and even genders. The religious conflicts stemmed from the differing translations of G-d's word. This created conflicts and segregation by religion, turning some people into aliens in their own country. The battles existed between Catholics, Jews, and Protestants although, for the majority of the time, the

Threats of Terror: Objectives, Options and Obstructions in Moral Education

5508 words - 22 pages , instead, the path of the war. Several New Historians identify and analyze thistendency of the Israeli political and military establishments. Following in their footsteps,Israeli society as a whole base themselves on this culture of power and on the understandingthat every problem Israel faces can be solved through the use of military power. Theypresent their thesis to the general public of Israel's consistent choice of the military optionand believe

Weaknesses, Threats and Issues of Pakistan Textile Industry

3348 words - 13 pages ;High cost of production. The cost of doing business is the highest in the south Asian region which comprises of:Excise duty imposed on bank servicesExcise duty increased on insurance premiumsIncreased electricity and gas tariff ratesMinimum wages of workers have increased by 33%Rising of interest ratesPakistan fails to impress in the cost comparisons with the regional competitors. In Bangladesh a 42000 spindle mill has a total gas bill per month

2. Assess the main threats of IS/IT outsourcing and put these possible threats in order based on its importance.

1011 words - 5 pages access to third party that is customer the complete information from the bank. If the banks involved in a lot of industries that deal with sensitive information from customers, such as finance, banks can put information and their credibility at risk. There are some cases, the firm lowered to security attacks than employees who do not have a sense of trust and responsibility of the company or any of the shares of the bank information. Such violation

Bank Financing of Small and Medium Enterprises

1108 words - 5 pages developing countries, information on SMEs may belimited or unreliable so the first step is to develop anunderstanding of the SME market. SME banking experts focus on making a culturalshift away from traditional banking practices when serving theSME sector. Banks serving SMEs usually have a strategicfocus at the highest levels of bank decisionmaking. Developing Products and Services A bank’s product and service offering involves more than

Similar Essays

Threats To Internet Privacy And Security

950 words - 4 pages The Internet presents various challenges in the realms of privacy and security. Such threats originate from obvious sources such as hackers and malware, but threats come from less obvious sources as well; employees, government agencies, and even one’s self through lack of knowledge or vigilance. Privacy, as explained by Lawrence Lessig (2006), “from the perspective of law, is the set of legal restrictions on the power of others to invade a

A Survey On Nemo Security: Threats And Solutions

1235 words - 5 pages forged binding update sent to a correspondent node. These kinds of attacks generate the threats against the confidentiality, integrity and availability of the mobile nodes. An attacker may go through the contents of a packet destined to another node by redirecting the traffic to it. This leads to man in middle attack between mobile node and the correspondent node. An attacker may also send forged binding update with help of current care of

Public Policy Of Social Security And Retirement Savings

1536 words - 6 pages spouse is not working. If that is the case then pay the same amount BUT put half into your own and half into your spouses. If the other spouse is working however, they should pay into their own account and you into your own. The Social Security Act was passed by President FDR as one of his programs to fight the Great Depression. The Social Security Act was enacted August 14, 1935 (Social Security Act). The current problem is the fear of what will

Problem Patrons: The Needs Of Homeless And Public Libraries

1727 words - 7 pages Department at the North Carolina State University Libraries (Ford, 2002, p. 83). One of the possible reasons that the NCSU Libraries have so many mentally ill patrons is because the academic library is not only open to the general public but it is also located near a number of homeless shelters. Another problem is that the libraries are now open 24/7 and anyone can enter the library except for between 12 a.m. and 7 a.m. when you need a card to enter