PCI compliance understand and implement effective PCI data security standard compliance

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PC...

Descripción completa

Detalles Bibliográficos
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam : Syngress c2010.
Edición:2nd ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628351106719
Tabla de Contenidos:
  • Front Cover; PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance; Copyright; Contents; Foreword; Acknowledgments; About the Authors; Chapter 1. About PCI and This Book; Who Should Read This Book?; How to Use the Book in Your Daily Job; What this Book is NOT; Organization of the Book; Summary; Chapter 2. Introduction to Fraud, ID Theft, and Regulatory Mandates; Summary; Chapter 3. Why Is PCI Here?; What Is PCI and Who Must Comply?; PCI DSS in Depth; Quick Overview of PCI Requirements; PCI DSS and Risk; Benefits of Compliance; Case Study; Summary; References
  • Chapter 4. Building and Maintaining a Secure NetworkWhich PCI DSS Requirements Are in This Domain?; What Else Can You Do to Be Secure?; Tools and Best Practices; Common Mistakes and Pitfalls; Case Study; Summary; Chapter 5. Strong Access Controls; Which PCI DSS Requirements Are in This Domain?; What Else Can You Do to Be Secure?; Tools and Best Practices; Common Mistakes and Pitfalls; Case Study; Summary; Chapter 6. Protecting Cardholder Data; What Is Data Protection and Why Is It Needed?; Requirements Addressed in This Chapter; PCI Requirement 3: Protect Stored Cardholder Data
  • What Else Can You Do to Be Secure?PCI Requirement 4 Walk-through; Requirement 12 Walk-through; Appendix A of PCI DSS; How to Become Compliant and Secure; Common Mistakes and Pitfalls; Case Study; Summary; References; Chapter 7. Using Wireless Networking; What Is Wireless Network Security?; Where Is Wireless Network Security in PCI DSS?; Why Do We Need Wireless Network Security?; Tools and Best Practices; Common Mistakes and Pitfalls; Case Study; Summary; Chapter 8. Vulnerability Management; PCI DSS Requirements Covered; Vulnerability Management in PCI; Requirement 5 Walk-through
  • Requirement 6 Walk-throughRequirement 11 Walk-through; Internal Vulnerability Scanning; Common PCI Vulnerability Management Mistakes; Case Study; Summary; References; Chapter 9. Logging Events and Monitoring the Cardholder Data Environment; PCI Requirements Covered; Why Logging and Monitoring in PCI DSS?; Logging and Monitoring in Depth; PCI Relevance of Logs; Logging in PCI Requirement 10; Monitoring Data and Log Security Issues; Logging and Monitoring in PCI - All Other Requirements; Tools for Logging in PCI; Log Management Tools; Other Monitoring Tools; Intrusion Detection and Prevention
  • Integrity MonitoringCommon Mistakes and Pitfalls; Case Study; Summary; References; Chapter 10. Managing a PCI DSS Project to Achieve Compliance; Justifying a Business Case for Compliance; Bringing the Key Players to the Table; Budgeting Time and Resources; Educating Staff; Project Quickstart Guide; PCI SSC New Prioritized Approach; Summary; Reference; Chapter 11. Don't Fear the Assessor; Remember, Assessors Are There to Help; Dealing With Assessors' Mistakes; Planning for Remediation; Planning for Reassessing; Summary; Chapter 12. The Art of Compensating Control
  • What Is a Compensating Control?