Preview

Failing To Follow Pci Compliance Case Study

Good Essays
Open Document
Open Document
986 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Failing To Follow Pci Compliance Case Study
The Consequences of Failing to Follow PCI Compliance

Summary

Sometimes, not knowing certain things could be more comfortable than knowing it. But, not in all cases. For instance, a lot of people, still, never really consider or are unaware what a credit/debit fraud could do to them. Despite high-end data breaches, consumers still display ignorance over card frauds until they receive a call from the card issuer.

For example, put yourself in a scenario where you learn that your credit/debit card information has been compromised via a purchase you made few week back. But instead of buy expensive items, the hacker bought several small items. The logic here is that the criminal wants to check if you caught on the robbery before buying big money
…show more content…
But sometimes companies do fail to adhere to the standards leading to serious issues than just petty irritations. If cyber criminals can steal thousands from an individual, they can steal millions from a firm.

Reasons Why Companies Fail in PCI
Network Configuration
Companies need a strong architecture to protect user data. It is essential to have access control lists (ACL) on all network devices to avoid data breaches by cyber criminals.
A secondary level of control ensuring the connections to internal sources are valid and access is authorized should be present.
Encrypting Data
Card transactions move constantly from one source to another for processing making them an enticing target for hackers.
For this very reason PCI focuses on strong encryption for credit/debit data in transit. The council expects strong levels of encryption from companies to know the level of commitment the firm has toward securing user data.
Protocols and
…show more content…
That is cost to investigation , to know what had actually happened, enhancing the security structure, fire and recruit employees, and fixing the internal information security environ.
Financial Loss
Bad news is never good for any business. The moment your customers know that you have been hacked, they will try to leave you as soon as possible.
They will also leave trails of dust to get away from you as seen in the case of the Target data breach.
The retailers profits slumped down by $440 million in the fiscal fourth quarter following the massive hack.
Since then, many customers have refrained from shopping on Target's website.

Reputation Goes Tatters
If loss of revenue causes financial headache, damaged reputation ruins a business for all eternity.
Take any data breaches of recent times, Home Depot, Target, Neiman Marcus, or Kmart, Google it. You will get more than half million results none of which will improve the retailer's standing and reputation with their target market.
Damaged reputation cannot be fixed completely. At the maximum, it can be made better with hours and hours of marketing, public relation, and reputation

You May Also Find These Documents Helpful

  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Good Essays

    An information system security breach could result in serious financial losses, the disclosure of protected private information, loss of research and development data or fines by regulatory agencies. Losses due to intrusions into an information system could negatively affect the general public (i.e. power failures). This might result in costly class action lawsuits that could exceed an organization's ability to pay and result in its dissolution. Even an individual might be sued for negligence and be financially ruined.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Organizations must ensure the security and control of systems and transactions with clients and vendors. What security breaches may cause harm to an organization or its clients? Why is it important to ensure a proper level of security? What tools are available to prevent breaches?…

    • 369 Words
    • 2 Pages
    Good Essays
  • Good Essays

    From a management perspective, do you think Target made any mistakes? Justify your answer. Being in management is an exceptionally stressful job as one has to be able to manage, organize, oversee and make decision that are most beneficial to the company. From a Chief Executive Officer I presume these levels of stress are even more amplified as they are making over a billion decisions a year on a higher level that could virtually cost them their companies (Larson, 2017). As an avid Target shopper, I for one was very taken aback by the breach of public information.…

    • 1343 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Proper management of user accounts will ensure the information and access to devices on the network confidential.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Operation Get Rich or Die Tryin' is just one example in a sea of inadequate security measures that is far too common in today corporations. The fact that TJX failed not only to notice the breach, but also to implement basic security measures is concerning enough. However, this inevitably leads us to ask if such a large corporation had this level of neglect, how pervasive is the lack of security in the industry? To answer the question, all we need to do is take a look at last couple of years in the news. We can see from a quick Google search that we've had hacks on Experian, Yahoo (in which I was personally affected), Sony and Uber, just to name a few. These are companies with which we are all familiar. and with vast amounts of capitol at their disposal. Yet somehow they still failed in their responsibility to safeguard some of our most…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Report in Love

    • 552 Words
    • 3 Pages

    Another scenario is when criminal hacker viruses attack the servers that house business systems, including e-mail servers, while others attach to the computer networking infrastructure.…

    • 552 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through e-commerce transactions. In doing so, customers would be able to feel a sense of trust, confidence and assurance that their information is safe. Many technological developments are being tested and today even implemented through that very system, of e-payments. Already being used today are smart-cards and e-wallets, which in fact work well at creating a safeguard for customers information. Customers now have the convenience of quick and more efficient ways of making transactions and saving data effortlessly with the click of a button. Authentication programs such as VeriSign Secure Site Program, allows one to learn more about web sites users visited before they submit any confidential information, in addition to permitting one to submit sensitive information like one's own credit card number. Such programs are being used on sites such as Ryerson's website, where students can make payments through the system where credit card information is used. Public key infrastructure and digital certificates help companies battle the wave of illegal activity and enhance the business models. Today many businesses are using firewalls as a way to add security to a network. Virtual Private Network allows users to gain secure access to its organizations network. Companies that have used these technologies are paving the way for future security methods. Encryption and decryption are always used whenever secure sites are accessed so that users that enter information can not be accessed by unauthorized people. 56 bit used before and the 128-bit encryption is becoming the…

    • 2213 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into…

    • 521 Words
    • 3 Pages
    Good Essays