PCI compliance understand and implement effective PCI data security standard compliance
Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PC...
Formato: | Libro electrónico |
---|---|
Idioma: | Inglés |
Publicado: |
Amsterdam :
Syngress
c2010.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628351106719 |
Tabla de Contenidos:
- Front Cover; PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance; Copyright; Contents; Foreword; Acknowledgments; About the Authors; Chapter 1. About PCI and This Book; Who Should Read This Book?; How to Use the Book in Your Daily Job; What this Book is NOT; Organization of the Book; Summary; Chapter 2. Introduction to Fraud, ID Theft, and Regulatory Mandates; Summary; Chapter 3. Why Is PCI Here?; What Is PCI and Who Must Comply?; PCI DSS in Depth; Quick Overview of PCI Requirements; PCI DSS and Risk; Benefits of Compliance; Case Study; Summary; References
- Chapter 4. Building and Maintaining a Secure NetworkWhich PCI DSS Requirements Are in This Domain?; What Else Can You Do to Be Secure?; Tools and Best Practices; Common Mistakes and Pitfalls; Case Study; Summary; Chapter 5. Strong Access Controls; Which PCI DSS Requirements Are in This Domain?; What Else Can You Do to Be Secure?; Tools and Best Practices; Common Mistakes and Pitfalls; Case Study; Summary; Chapter 6. Protecting Cardholder Data; What Is Data Protection and Why Is It Needed?; Requirements Addressed in This Chapter; PCI Requirement 3: Protect Stored Cardholder Data
- What Else Can You Do to Be Secure?PCI Requirement 4 Walk-through; Requirement 12 Walk-through; Appendix A of PCI DSS; How to Become Compliant and Secure; Common Mistakes and Pitfalls; Case Study; Summary; References; Chapter 7. Using Wireless Networking; What Is Wireless Network Security?; Where Is Wireless Network Security in PCI DSS?; Why Do We Need Wireless Network Security?; Tools and Best Practices; Common Mistakes and Pitfalls; Case Study; Summary; Chapter 8. Vulnerability Management; PCI DSS Requirements Covered; Vulnerability Management in PCI; Requirement 5 Walk-through
- Requirement 6 Walk-throughRequirement 11 Walk-through; Internal Vulnerability Scanning; Common PCI Vulnerability Management Mistakes; Case Study; Summary; References; Chapter 9. Logging Events and Monitoring the Cardholder Data Environment; PCI Requirements Covered; Why Logging and Monitoring in PCI DSS?; Logging and Monitoring in Depth; PCI Relevance of Logs; Logging in PCI Requirement 10; Monitoring Data and Log Security Issues; Logging and Monitoring in PCI - All Other Requirements; Tools for Logging in PCI; Log Management Tools; Other Monitoring Tools; Intrusion Detection and Prevention
- Integrity MonitoringCommon Mistakes and Pitfalls; Case Study; Summary; References; Chapter 10. Managing a PCI DSS Project to Achieve Compliance; Justifying a Business Case for Compliance; Bringing the Key Players to the Table; Budgeting Time and Resources; Educating Staff; Project Quickstart Guide; PCI SSC New Prioritized Approach; Summary; Reference; Chapter 11. Don't Fear the Assessor; Remember, Assessors Are There to Help; Dealing With Assessors' Mistakes; Planning for Remediation; Planning for Reassessing; Summary; Chapter 12. The Art of Compensating Control
- What Is a Compensating Control?