Preview

PCI DSS Compliance

Good Essays
Open Document
Open Document
333 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
PCI DSS Compliance
IS3110
Week 2 Home Work

To be in compliance with the PCI DSS Compliance Yield more must do the following Build and maintain a secure network, Protect cardholder data, Maintain a vulnerability management program, Implement strong access control measures, Regularly monitor and test networks, Maintain an information security policy. To remained in compliance of the PCI DSS Compliance I am recommends the following for the control objective of Build and maintain a secure network- I am recommends that we Install and maintain a firewall configuration to protect cardholder data and Do not use vendor-supplied defaults for system passwords and other security parameters.
The second control objective is Protect cardholder data I am recommends that we Protect stored cardholder data by Encrypt transmission of cardholder data across open, public networks. The Third control objective is Maintain a vulnerability management program by Using and regularly update anti-virus software to an current virus definition and Develop and maintain secure systems and applications. The Fourth control objective is Implement strong access control measures this can be done by Restrict access to cardholder data by business need-to-know, Assign a unique ID to each person with computer access. Restrict physical access to cardholder data. The Fifth Control Objective is regularly monitored and test networks, this can be done by Tracking and monitor all access to network resources and cardholder data and regularly test security systems. The sixth control Objective is Maintain an information security policy, I am recommends that we maintain a policy that addresses information security for all personnel.
I am justify my reasoning for doing these practices because if you do not do what I recommend the following can happen it could be disastrous Compromised data negatively affects consumers, merchants, and financial institutions, one incident can severely damage your reputation and your

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -Policy will be implemented to document all security policies and operation policy to secure cardholder data that will be stored in company database. (System/Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    With business always changing and data always needing to be protected, it has become an issue to determine the level of security for confidentiality and integrity purposes while allowing it all to be properly available for use. To put Global in front of the competition with its customers it implements its Global Connect-Link for collaboration. Through the use of its security division, CIS, Global prioritizes its data according to the risk of activity of usage against the potential business reward. It conducts constant supervision and monitoring to maintain confidentiality, integrity and availability. Global also has its own Continuity Manager software to manage large amounts of external users while maintaining the necessary centralized security from unauthorized access. Another level of security Global offers is its DLP or data loss prevention product. This keeps all data whether structured or unstructured when in motion or at rest from being compromised and deleted. Lastly in regards to Global’s controls and the documentation of the effectiveness of these controls, CompScan, an audit program is in place to collect and analyze all the data.…

    • 560 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 2 PCI DSS

    • 537 Words
    • 2 Pages

    The best practices for PCI DSS compliance start with engaging all internal resources. All employees of YieldMore Company must meet the PCI Compliance DSS standards, you need to raise the awareness of PCI at all levels of the organization. Tools must be provided to assist in making sure everyone is PCI DSS compliance. Visa is partnering with the National Federation of Independent Business (NFIB), to offer a new Web site, with free information, including webinars, educational materials and tools to assist educate small-business owners (Young 2007).…

    • 537 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 286 Words
    • 1 Page

    In today’s era, everyone pays with credit cards or debit cards. This healthcare organization will need to be PCI DSS compliant. PCI Security Standards are technical and operational requirements set by the PCI Security Standards Council (PCI SSC) to protect cardholder data. The Council is responsible for managing the security standards, while compliance with the PCI Security Standards is enforced by the payment card brands.…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It was created by the PCI Security Standard Council in which several major credit card companies gave input. The PCI DDS was established to ensure that the Name, Credit card number, expiration date and security code was not compromised in any way. There are several requirements and many more principles that are part of these requirements. Building and maintaining a secure network: install and maintain a firewall, and do not use defaults, such as in passwords. Protecting the cardholder data: protecting the stored data and using encrypted transmissions. Maintain a Vulnerability Management program: use and update antivirus software and develop and maintain secure systems. Implement strong access control measures: restrict access to data, use unique logons for each user, and restrict physical access. Regularly monitor and test networks: track and monitor all access to systems and data and regularly test security. Maintain an Information security policy: maintain a security policy. Merchants using credit cards must comply with the standards and regulations of PCI DSS and is monitored by the acquirer. This is a three part process. First the merchant assess by identifying an existing cardholder and then analyzing the data and checks for vulnerabilities. Second the merchant Remediates by correcting any vulnerabilities and storing data…

    • 671 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Proper Pci /Pcc

    • 1812 Words
    • 8 Pages

    Writing this essay about why conducting proper PCI’S and PCC’S are in important before every mission whether or not it’s an actual mission or training mission.…

    • 1812 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    What Is The CIA Triad

    • 80 Words
    • 1 Page

    This is a triangular concept of information security policies of all organization. CIA means confidentiality, integrity and availability also it covers all types of security in IT. In modern world people is completely relying on electronic equipment’s, Such as computers, smart phones, hard disk and cloud services for storing and processing valuable data. So security is an important issue to safeguard these resources. Therefore this security model will help to think and develop security policies for an organization.…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    References: Control Data Systems Inc. (1999). Why security policies fail. [Electronic version] Retrieved Nov. 25, 2005, from http://downloads.securityfocus.com/library/Why_Security_Policies_Fail.pdf…

    • 1675 Words
    • 7 Pages
    Powerful Essays