Verified Document

Visa\'s Data Center Security Case Study

Related Topics:

Question 14-14

No, Visa certainly is not being overly cautious in its fortification of its data center. Security breaches are certainly on the uprise and becoming more commonplace each and every day. Moreover, when one considers the sheer number of transactional events which Visa is processing every day (let alone the statistics denoting the number of transactions it is accounting for each second) (YOUR BOOK PAGE NUMBER), it becomes clear that the likelihood of it encountering some fraudulent attempt or breach is greater than that of other financial institutions. In this case, it would be foolish to opine that the company is being overly cautious. Rather, it is simply preparing itself for the realities of today's financial industry.

Question 14-15

This level of management controls is necessary because of all the various threats financial entities are prone to in contemporary times. These include ransom ware (Harper), malware, any other number of fraudulent activities. Additionally, it is necessary to implement these controls physically--such as fortifying its compound and conducting its share of due diligence on visitors--so that there are no internal security breaches, which does occur (Identity Theft Resource Center).

Question 14-16

The most important controls Visa needs to have in place are those pertaining to feedback. These controls provide insight into events that have happened, transactions that have taken place, and other forms of activity which have transpired. It is pivotal for this organization to know the ramifications of these things, which is possible via feedback controls.

Question 14-17

Other managerial controls of benefit to Visa include exceedingly stringent methods for checking the background of employees--both those whom are actually hired and those who are not. A salient financial organization such as Visa could very well encounter corporate spies and other personages who would attempt to discern the workings of its data center for illicit use.

Works Cited

Daitch, Heidi. "2017 Data Breaches -- The Worst So Far". www.identityforce.com 2017. Web. https://www.identityforce.com/blog/2017-data-breaches

Harper, Jelani. "Betting the Enterprise on Data with Cloud-Based Disaster Recovery and

Backups". www.analyticsweek.com 2016. Web. https://analyticsweek.com/content/test/

Identity Theft Resource Center. "Cyberscout". www.idtheftcenter.org 2017. Web.

http://www.idtheftcenter.org/images/breach/2017Breaches/ITRCBreachReport_2017.pdf

YOU NEED TO INCLUDE YOUR BOOK AS A SOURCE.

 

Cite this Document:
Copy Bibliography Citation

Related Documents

Home Security Reforming Immigration Reform Homeland Security
Words: 4103 Length: 10 Document Type: Capstone Project

Home Security Reforming Immigration Reform Homeland Security Reforming Immigration Reform In current years illegal immigration has turned out to be a topic that has brought up some significant political issues in the United States. A lot of the debate on illegal immigration emphases on a feasible route to United States citizenship. It would need to be pointed out that there are so many more persistent subjects which should be spoken about in

Chief Security Officer: As the Chief Security
Words: 2148 Length: 7 Document Type: Essay

Chief Security Officer: As the Chief Security Officer for a local University, my main role is establishing and maintaining an enterprise wide information security program that helps to ensure all data and information assets are not compromised. This process involves developing a plan to conduct a security program that prevent computer crimes, establishes a procedure for investigation, and outlines laws that are applicable for potential offenders. To develop an effective plan,

Financing Terrorism: America's Unique Position
Words: 3643 Length: 11 Document Type: Research Paper

Simply put, the September 11th attacks would never have occurred without the prior development of the group's worldwide infrastructure, which consists of truly billions of dollars to establish and maintain (Ehrenfeld, 2003). Enormous amounts of money have been spent on recruitment, training camps, purchasing weapons, training on weapons, creating unconventional weapons, gathering intelligence, promoting Islamist propaganda and other activities (Ehrenfeld, 2003). The Last Five Years One of the things that the

Private Security and Patriot Act.
Words: 2849 Length: 7 Document Type: Term Paper

Sikhs are also mistakenly included since police are unable to detect the difference. (District of Columbia, Maryland, and Virginia Advisory Committees to the U.S. Commission on Civil Rights, 2003) a lot of people are being arrested on very technical immigration infringements of visa, and immigration judges will never let go an individual till the FBI articulates a curiosity in that particular person. For instance, on one occasion a student

National Security Counsel
Words: 1487 Length: 5 Document Type: Research Paper

National Security Council or NSC was created and established by the National Security Act of 1947 (The White House 2006). Later, it incorporated the National Security Act Amendments of 1949 and placed in the Executive Office of the President as part of the Reorganization Plan in the same year. Its chairman is the President and its regular attendees are the Vice President, the Secretary of State, the Secretary of the

H-1B Shortage in Today's Society,
Words: 10207 Length: 35 Document Type: Research Proposal

To protect themselves, many Americans chose to avoid working with or becoming friends with those who immigrated. A lack of trust permeated everything that the Americans did in regards to the immigrants, at least with the men. This was not always true of the women, as they often got along together and shared the trials and difficulties of raising families. However, many men who owned shops and stores would not

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now