100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 4 out of 6 pages.
SCOPE AND PROPOSAL1Assessment 1: Scope and ProposalDean M. SlocumCapella University
SCOPE AND PROPOSAL2Scope and OverviewCapital One is a massive financial firm that reaches all across North America and Europewith locations in Canada, the United States, and the United Kingdom. The firm primarily handlesbanking accounts for personal and business, credit cards, various types of loans, and otherbanking-related services. Capital One has 755 branch locations and over 2,000 ATM locations.Founded in 1994, their headquarters are located at the Capital One Tower in McLean, Virginia.The company is comprised of nearly 49,000 employees (Corporate Information, n.d.). AlthoughCapital One has a reputation for being technology-focused, they are not impervious to securitythreats. In early 2019, the company reported a systems breach that compromised numerouspieces of sensitive data; including names, addresses, social security information, accountinformation, and other forms of sensitive information. The attack was made possible due tovulnerabilities within the systems server access (Information, 2019).Problems and GoalsBanking and related systems that handle sensitive data are at constant risk from numerouscyber-based threats. This results in an ever-evolving security battle between firms and those thatwish to do harm. Many banking firms rely on POS (point of sales terminal) protocols. Theseterminals are often a common place of attack. There have been many fraudulent cases andbreaches associated with these systems (What is a Point, n.d.).The shear size of Capital One’s reach means that POS terminals are scattered across theglobe and thus easily accessible to many entities. This results in a higher need for securityprotocols that directly deals with POS terminal activities. If problems occur, then Capital One islikely to suffer financially via a loss of customers and legal entanglements. In the 2019 beach,Capital One was less invested in security related to their information servers. These servers can