Preview

Project part 6

Satisfactory Essays
Open Document
Open Document
406 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project part 6
The senior management has been advised by the legal department that the organization will need to become PCI DSS compliant before using online applications that accept credit cards and customer personal information. The management isn’t familiar with PCI DSS compliance; therefore, the management asked you to prepare a recommendation explaining PCI DSS compliance, how the organization can move through the compliance process, and the consequences of noncompliance.

PCI DSS stands for Payment Card Industry Data Security Standard. PCI DSS originally began as five different programs: Visa, MasterCard, American Express, Discover and JCB data security programs. Each company creates an additional level of protection for card issuers by ensuring that merchants meet minimum levels of security when they store, process and transmit cardholder data. PCI DSS specifies 12 requirements for compliance, organized into six logically related groups called control objectives. Each version of PCI DSS has divided these 12 requirements into a number of sub-requirements differently, but the 12 high level requirements have not changed since the inception standard. The control objectives are Build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks and maintain an information security policy. The requirements for compliance are, install and maintain a firewall configuration to protect card holder data, do not use vendor-supplied defaults for system passwords and other security parameters, protect stored cardholder data, encrypt transmission of cardholder data across open public networks, use and regularly update anti-virus software on all systems commonly affected by malware, develop and maintain secure systems and applications, restrict access to cardholder data by business need-to-know, assign a unique ID to each person with computer access, restrict

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Assignment 6

    • 479 Words
    • 2 Pages

    Course criteria covered: Unit 2 1.1 Explain the historical development of the person-centred approach to counselling, including the people influential in its development. 1.2 Explain the philosophical basis of the person-centred approach. 1.3 Explain the key concepts and principles of the person-centred approach. 1.4 Explain how the person-centred approach informs the practice of a qualified trained counsellor. 1.5 Explain how the person-centred approach influences the understanding of the development of the concept of self. 1.6 Explain why it is important to have an understanding of a therapy model before using its methods and techniques. Unit 2 2.1 Explain the key features of the psychodynamic and cognitive–behavioural models of counselling. 2.2 Compare and contrast these models with the main model chosen…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    For example areas of concern need to be addressed such as customer information and the security features. Another area of importance is the new system needs to follow compliance such as PCI-DSS (Payment Card Industry Data Security Standard). In addition, the security standards for information technology must be put in place. Lastly, the document will address ethical responsibility to Kudler’s when implementing the new system.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    -Policy will be implemented to document all security policies and operation policy to secure cardholder data that will be stored in company database. (System/Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Project Part 1

    • 747 Words
    • 5 Pages

    GSDC is a software development firm with sales, marketing, and project offices in major cities of North America. We provide a global project management services, on-site personnel as needed for design, and testing and liaison with teams of developers in India and Eastern Europe. GSDC is known to have extensive experience in website development and have completed several successful websites implementation for institutions of higher education.…

    • 747 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    project 2

    • 394 Words
    • 2 Pages

    TAX 4001 Project 2 Due Date Handed in to class on November 5, 2014 Your assignment is to individually prepare a memorandum to the tax file (see Chapter 2, Figure 2-6, page 2-27 in the 2015 Edition of the text for an example). The relevant facts are Carol is a successful physician who owns 100 of her incorporated medical practice. She and her husband Dick are considering the purchase of a commercial office building located near the local community hospital. If they purchase the building, Carol would move her medical practice to the new location and rent space at an arms length price. The rent income that Carol and Dick receive will be available to absorb passive losses generated by other passive activities they own. The net effect of this arrangement is a reduction in their income tax liability. Will Carol and Dicks plan work Explain. Your memorandum should include the Facts, Tax Issue(s), Conclusion, and Analysis. Use the UCF library website to search a database (CCH Internet Tax Research Network, RIA Checkpoint, or LexisNexis Academic database can be used). Hint - you will find guidance from the following sources of tax law. These sources should provide you with adequate information to come to a definitive conclusion regarding whether or not Carol and Dick will achieve the results they are hoping for. You will find guidance from the regulations under Reg. 1.469-2. Locate the specific section of Reg. 1.469-2 that applies to this fact pattern, and be sure to cite this specific section in the memorandum. After you have located the section of the regulation that applies to this fact pattern, review the following court cases that are relevant to this issue to help you in your analysis and conclusion (be sure to cite all three in the memorandum) Fransen v. U.S., 98-2 USTC 50,776…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    PCI DSS Interviews

    • 363 Words
    • 2 Pages

    PCI DSS Assessment Personnel Interviews will be conducted the week of October 31 through November 4, 2016. Most, if not all of you were selected by the External PCI Audit Team last year so I anticipate similar, if not the same this audit cycle. As soon as the Lead Auditor (QSA) confirms, I will communicate dates, times, and locations. In the meantime, please take a moment to review the Interview Preparation guidance below. For your convenience, intent this year is to conduct most interviews at the Century Center Data Center. More to follow……

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project 5

    • 608 Words
    • 5 Pages

    Project 5 – Project Plan This document provides an overview for all the case studies presented in this project, and outline deliverables that are required, with an initial schedule. Project Title Triple Cases Team Name Group 13 Team Members…

    • 608 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    level 5 Assignment 6

    • 2027 Words
    • 7 Pages

    1.1 Identify the regulatory requirements, codes of practice and relevant guidance for managing concerns and complaints in own area of work…

    • 2027 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    SourceFire Security Report

    • 1112 Words
    • 6 Pages

    In the past, individual examiners had to make their own decisions as to how PCI requirements were…

    • 1112 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Sony PSN Data Leakage

    • 1598 Words
    • 5 Pages

    PlayStation Network, known as PSN, is a free online platform for users to play and buy online games, interact with friends and family and surf the net provided by Sony Computer Entertainment, Inc. On 19th April 2011, PSN was struck by hacker and this resulted in an outage of PSN. It was believed that approximately 77 million users’ personal information was stolen by hacker. This case is highlighted because it vividly depicts the issue of data leakage and its effect to the users. I will firstly discuss how PSN works and how it was hacked under technical analysis. Next, I will touch on some legal issues which Sony violated in certain countries and some analysis on different countries’ lawsuit against Sony. Lastly, I will analyze the ethical issues pertaining to this case.…

    • 1598 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Pci Quick Guide

    • 7658 Words
    • 31 Pages

    This Quick Reference Guide to the PCI Data Security Standard is provided by the PCI Security…

    • 7658 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    project 3

    • 1551 Words
    • 7 Pages

    American-born Sakamoto (b. 1931) lived with her Japanese husband in Osaka and taught English to Japanese students. She is currently a professor at Shitennoji Gakuen University in Hawaii. “Conversational Ballgames” is a chapter from her textbook on conversational English, Polite Fictions, published in 1982. Her contrasts of English and Japanese styles of conversation and her strategy for developing that contrast make us aware of the effect of cultural conditioning on the ways we learn to use language.…

    • 1551 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Mini Project 1

    • 1517 Words
    • 5 Pages

    1. Choose one of the following companies. What colors does it use predominantly in its logo or packaging? How do these colors affect the perception of its products?…

    • 1517 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Project12

    • 3549 Words
    • 15 Pages

    department, for the help provided in completing the Major project assigned to us. We owe…

    • 3549 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Bitter Melon(momordica charantia ) is a member of the family Cucurbitaceae ,is known as one of the important vegetable crops that are popular in nutritional or use to prevent some of diseases. Therefore, many of people will eat bitter melon. However, those bitter melon seeds are being discarded as waste. According to some reference, bitter melon seeds contain 8.6% water, 21.8% ash, 19.5%fiber, 16.4% carbohydrate and 31.0% fat oil.…

    • 3881 Words
    • 25 Pages
    Powerful Essays