Visa\'s Data Center Security Case Study

PAGES
1
WORDS
382
Cite

Question 14-14

No, Visa certainly is not being overly cautious in its fortification of its data center. Security breaches are certainly on the uprise and becoming more commonplace each and every day. Moreover, when one considers the sheer number of transactional events which Visa is processing every day (let alone the statistics denoting the number of transactions it is accounting for each second) (YOUR BOOK PAGE NUMBER), it becomes clear that the likelihood of it encountering some fraudulent attempt or breach is greater than that of other financial institutions. In this case, it would be foolish to opine that the company is being overly cautious. Rather, it is simply preparing itself for the realities of today's financial industry.

Question 14-15

This level of management controls is necessary because of all the various threats financial entities are prone to in contemporary times. These include ransom ware (Harper), malware, any other number of fraudulent activities. Additionally, it is necessary to implement these controls physically--such as fortifying its compound and conducting its share of due diligence on visitors--so that there are no internal security breaches, which does occur (Identity Theft Resource Center).

Question 14-16

The most important controls Visa needs to have in place are those pertaining to feedback. These controls provide insight into events that have happened, transactions that have taken place, and other forms of activity which have transpired. It is pivotal for this organization to know the ramifications of these things, which is possible via feedback controls.

Question 14-17

Other managerial controls of benefit to Visa include exceedingly stringent methods for checking the background of employees--both those whom are actually hired and those who are not. A salient financial organization such as Visa could very well encounter corporate spies and other personages who would attempt to discern the workings of its data center for illicit use.

Works Cited

Daitch, Heidi. "2017 Data Breaches -- The Worst So Far". www.identityforce.com 2017. Web. https://www.identityforce.com/blog/2017-data-breaches

Harper, Jelani. "Betting the Enterprise on Data with Cloud-Based Disaster Recovery and

Backups". www.analyticsweek.com 2016. Web. https://analyticsweek.com/content/test/

Identity Theft Resource Center. "Cyberscout". www.idtheftcenter.org 2017. Web.

http://www.idtheftcenter.org/images/breach/2017Breaches/ITRCBreachReport_2017.pdf

YOU NEED TO INCLUDE YOUR BOOK AS A SOURCE.

 

Cite this Document:

"Visa's Data Center Security" (2017, August 12) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/visa-data-center-security-case-study-2168680

"Visa's Data Center Security" 12 August 2017. Web.25 April. 2024. <
https://www.paperdue.com/essay/visa-data-center-security-case-study-2168680>

"Visa's Data Center Security", 12 August 2017, Accessed.25 April. 2024,
https://www.paperdue.com/essay/visa-data-center-security-case-study-2168680

Related Documents

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

Home Security Reforming Immigration Reform Homeland Security Reforming Immigration Reform In current years illegal immigration has turned out to be a topic that has brought up some significant political issues in the United States. A lot of the debate on illegal immigration emphases on a feasible route to United States citizenship. It would need to be pointed out that there are so many more persistent subjects which should be spoken about in

Legislation on Foreign Nurses Practicing in the United States Acute shortage of registered nurses is a grave problem faced by most hospitals in the United States. This problem is aggravated by the increasing demand for healthcare caused by a nation with an aging population. Around 1/3rd of the registered nurses in the country are over fifty. Estimates show that most hospitals are struggling with an average 15% vacancy for RN being

Physical Security Controls To document the importance of physical security controls as it relates to the massive pervasiveness of online theft and cyber crime Background information on the identification and authentication of people. With the advent of the internet it is often very difficult to properly identify the individual in which business is conducted with. With the extreme ease of the internet comes the secrecy of potential criminal lurking through the shadows. Identification

Simply put, the September 11th attacks would never have occurred without the prior development of the group's worldwide infrastructure, which consists of truly billions of dollars to establish and maintain (Ehrenfeld, 2003). Enormous amounts of money have been spent on recruitment, training camps, purchasing weapons, training on weapons, creating unconventional weapons, gathering intelligence, promoting Islamist propaganda and other activities (Ehrenfeld, 2003). The Last Five Years One of the things that the

Sikhs are also mistakenly included since police are unable to detect the difference. (District of Columbia, Maryland, and Virginia Advisory Committees to the U.S. Commission on Civil Rights, 2003) a lot of people are being arrested on very technical immigration infringements of visa, and immigration judges will never let go an individual till the FBI articulates a curiosity in that particular person. For instance, on one occasion a student