Payment Card Industry Data Security Standard

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(Threats)
Line 3: Line 3:
== Security System Life Cycle ==
== Security System Life Cycle ==
=== Threats ===
=== Threats ===
-
The main threat to the Payment Card Industry as a whole is more of a threat to the card holders than the industry itself.  The card holders are taking a chance whenever they use their credit cards in order to make a purchase....
+
The main threat to the Payment Card Industry as a whole is more of a threat to the card holders than the industry itself.  The card holders are taking a chance whenever they use their credit cards in order to make a purchase. Everytime a purchase is made, there is a chance that the card holders information will be stolen. If card holders don't trust that their information is secure then they will stop using their credit cards and the Payment Card Industry will suffer because of it.
 +
This is why Security Policies are extremely important to the Payment Card Industry.
=== Policy ===
=== Policy ===

Revision as of 23:34, 1 December 2007

The Payment Card Industry Data Security Standard (PCI DSS) is a security document created by the Payment Card Industry Security Standards Council (PCI SSC). To make the explanation of the PCI DSS a bit more interesting, I will be presenting it as an Industry Wide security do

Contents

Security System Life Cycle

Threats

The main threat to the Payment Card Industry as a whole is more of a threat to the card holders than the industry itself. The card holders are taking a chance whenever they use their credit cards in order to make a purchase. Everytime a purchase is made, there is a chance that the card holders information will be stolen. If card holders don't trust that their information is secure then they will stop using their credit cards and the Payment Card Industry will suffer because of it. This is why Security Policies are extremely important to the Payment Card Industry.

Policy

Security System Development

Requirements Specifications

Design/Implementation

Operation and Maintenance

Summary

References

See Also

Electronic Voting Systems
Social engineering
Piggybacking
Identity Theft
The Mitnick attack
Security and Storage Mediums
Operating Systems Security
Honeypot

Personal tools