Visa's Data Center Security Free Case Study

Total Length: 382 words ( 1 double-spaced pages)

Total Sources: 5

Question 14-14



No, Visa certainly is not being overly cautious in its fortification of its data center. Security breaches are certainly on the uprise and becoming more commonplace each and every day. Moreover, when one considers the sheer number of transactional events which Visa is processing every day (let alone the statistics denoting the number of transactions it is accounting for each second) (YOUR BOOK PAGE NUMBER), it becomes clear that the likelihood of it encountering some fraudulent attempt or breach is greater than that of other financial institutions. In this case, it would be foolish to opine that the company is being overly cautious. Rather, it is simply preparing itself for the realities of today's financial industry.



Question 14-15



This level of management controls is necessary because of all the various threats financial entities are prone to in contemporary times. These include ransom ware (Harper), malware, any other number of fraudulent activities. Additionally, it is necessary to implement these controls physically--such as fortifying its compound and conducting its share of due diligence on visitors--so that there are no internal security breaches, which does occur (Identity Theft Resource Center).



Question 14-16



The most important controls Visa needs to have in place are those pertaining to feedback.
These controls provide insight into events that have happened, transactions that have taken place, and other forms of activity which have transpired. It is pivotal for this organization to know the ramifications of these things, which is possible via feedback controls.



Question 14-17



Other managerial controls of benefit to Visa include exceedingly stringent methods for checking the background of employees--both those whom are actually hired and those who are not. A salient financial organization such as Visa could very well encounter corporate spies and other personages who would attempt to discern the workings of its data center for illicit use.





























Works Cited

Daitch, Heidi. "2017 Data Breaches -- The Worst So Far". www.identityforce.com 2017. Web. https://www.identityforce.com/blog/2017-data-breaches

Harper, Jelani. "Betting the Enterprise on Data with Cloud-Based Disaster Recovery and

Backups". www.analyticsweek.com 2016. Web. https://analyticsweek.com/content/test/

Identity Theft Resource Center. "Cyberscout". www.idtheftcenter.org 2017.….....

     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Works Cited

Daitch, Heidi. "2017 Data Breaches -- The Worst So Far". www.identityforce.com 2017. Web. https://www.identityforce.com/blog/2017-data-breaches

Harper, Jelani. "Betting the Enterprise on Data with Cloud-Based Disaster Recovery and
Backups". www.analyticsweek.com 2016. Web. https://analyticsweek.com/content/test/

Identity Theft Resource Center. "Cyberscout". www.idtheftcenter.org 2017. Web.
http://www.idtheftcenter.org/images/breach/2017Breaches/ITRCBreachReport_2017.pdf
YOU NEED TO INCLUDE YOUR BOOK AS A SOURCE.
 

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Visa's Data Center Security" (2017, August 12) Retrieved April 26, 2024, from
https://www.aceyourpaper.com/essays/visas-data-center-security-case-study

Latest MLA Format (8th edition)

Copy Reference
"Visa's Data Center Security" 12 August 2017. Web.26 April. 2024. <
https://www.aceyourpaper.com/essays/visas-data-center-security-case-study>

Latest Chicago Format (16th edition)

Copy Reference
"Visa's Data Center Security", 12 August 2017, Accessed.26 April. 2024,
https://www.aceyourpaper.com/essays/visas-data-center-security-case-study