





Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
How is skimming used to target PCI data? - ✔✔Copying payment card numbers by tampering with POS devices, ATMs, Kiosks or copying the magnetic stripe using handheld skimmers.
Typology: Exams
1 / 9
This page cannot be seen from the preview
Don't miss anything!
PCI Security Standards Counsil FAQs
How is skimming used to target PCI data? - ✔✔Copying payment card numbers by tampering with POS devices, ATMs, Kiosks or copying the magnetic stripe using handheld skimmers. How is phishing used to target PCI data? - ✔✔By doing reconnaissance work through social engineering and or breaking in using software vulnerabilities or e-mails. How can Payment Data be Monetized? - ✔✔By skimming the card to get the full track of data, and then making another like card. Using the card information in a "Card-not-present transactions such as e- commerce or mail order, Telephone order. Card data is also sold in bulk to other criminals who perform their own fraud using the stolen data. Who all are targeted? - ✔✔Retail, Food and Beaverage, Hospitality, Financial Services, non-profit. EVERYONE! What is the PCI SSC? - ✔✔Payment Card Industry Security Service Counsel is an independent industry standards body providing oversight of the development and management of Payment Card Industry Data Security Standards on a global basis. What are some of the PCI SSC founding payment brands. - ✔✔American Express, Discover Financial, JCB International, Master Card, Visa inc. What are the Resources provided by the PCI SSC? - ✔✔PCI DSS, PA-DSS, P 2 PE, PTS (POI, HSM and PIN) Card Production, and supporting documents. Roster of QSAs, PA-QSAs, PCIPs, ASVs, validated payment applications, PTS Devices, and P 2 PE solutions
Education and Outreach programs Participating Organization Membership, Community Meetings, feedback. What is the overview of PCI DSS? - ✔✔Covers security of the environments that store, process or transmit account data. Environments receive account data from payment applications and other sources (e.g.., acquirers). what is the overview of PCI PA-DSS - ✔✔Covers secure payment applications to support PCI DSS compliance Payment application recieves account data from PIN-entry devices (PEDs) or other devices and begins payment transaction. What is the overview of PCI P 2 PE - ✔✔Covers encryption, decryption, and Key management requirements for point to point encryption solutions. What is the overview of PCI PTS-POI? - ✔✔Covers the protection of sensitive data at the point of interaction devices and their secure components, including cardholder PINs and account data, and the cryptographic keys used in connection with the protection of that cardholder data. What is the overview of PCI PTS-PIN Security? - ✔✔Covers secure management, processing and transmission of personal identification number (PIN) data during online and offline payment card transaction processing. What is the overview of PCI PTS-HSM - ✔✔Covers physical, logical and device security requirements for securing hardware security modules. What is the overview of PCI Card Production - ✔✔Covers physical and logical security requirements for systems and business processes.
What is PA-DSS? - ✔✔Payment Application Data Security Standard. What does PA-DSS applies to? - ✔✔Third party payment applications such as POS, shopping carts, etc..... What does a PA-DSS do? - ✔✔Ensures a payment application can function in a PCI DSS compliant manner. If a merchant uses a PA-DSS does it mean they are PCI-DSS compliant? - ✔✔No Are PA-DSS in scope for PCI DSS? - ✔✔Yes What is a PCI P 2 PE? - ✔✔Point to Point Encryption. What all must be included in a P 2 PE solution. - ✔✔Secure encryption of payment card at the point of interaction. P 2 PE-vallidated applications at the point of interaction. Secure management of encryption and decryption devices. Management of the decryption environment and all decrypted account data. Use of secure encryption methodologies and cryptographic key operations, including key generation, distribution, loading/injection, administration and usage. What is the relationship between PA-DSS and PCI DSS? - ✔✔PA-DSS must facilitate and not prevent DSS compliance.
What is the relationship between P 2 PE and PCI-DSS? - ✔✔Incorprates requirements from PTS, PCI=DSS, PA-DSS and PCI PIN to protect account data from the point of capture until it reaches the payment processor. What does PTS stand for? - ✔✔PIN Transaction Security what is PTS? - ✔✔PTS is a set of modular evaluation requirements managed by PCI SSC, for PIN acceptance POI terminals. What is the PTS program about? - ✔✔The program ensures terminals cannot be manipluated or attached to allow the capture of Sensitive Authentication data, nor allow access to clear-text PINs or Keys. What does SRED stand for? - ✔✔Secure Read and Exchange Module What does SRED allow? - ✔✔It allows terminals to b approved for the security encrption of cardholder data as part of the Point to Point Encryption prgram. What does PIN mean? - ✔✔Personal Identification Number. What are required in the PCI PIN security Requirements - ✔✔Management, processing and transmission. What is a Cardholder? - ✔✔Customer, individual making a purchase of goods or services. The process could involve a card present or not present transaction. Who is the Issuer? - ✔✔Bank or organization issuing a payment card on behalf of a Payment Brand (e.g. Visa, Master Card) Which Payment Brands issue credit cards directly? - ✔✔American Express, Discover, JCB Who is the Merchant? - ✔✔Organization accepting the payment card for payment during a purchase.
What is the role of a QIR? - ✔✔Integrators and Resellers are those entities that sell, install, and /or service payment applications on behalf of software vendors or others. What are some of the responsibilities of a QIR? - ✔✔ 1. Implementing the application into the merchant environment.
What is PCI DSS requirement 2? - ✔✔Do not user vendor-supplied defaults for system passwords and other security parameters. What is PCI DSS requirement 3? - ✔✔Protect stored cardholder data. What is PCI DSS requirement 4? - ✔✔Encrypt transmission of cardholder data across open, public networks. What is PCI DSS requirement 5? - ✔✔Protect all systems against malware and regularly update anti-virus software or programs. What is PCI DSS requirement 6? - ✔✔Develop and maintain secure systems and applications. What is PCI DSS requirement 7? - ✔✔Restrict access to cardholder data by business need to know. What is PCI DSS requirement 8? - ✔✔Identify and authenticate access to system components. What is PCI DSS requirement 9? - ✔✔Restrict physical access to cardholder data. What is PCI DSS requirement 10? - ✔✔Track and monitor all access to network resources and cardholder data. What is PCI DSS requirement 11? - ✔✔Regularly test security systems and processes. What is PCI DSS requirement 12? - ✔✔Maintain a policy that addresses information security for all personnel. How many transactions qualify a merchant as Level 1? - ✔✔ 6 , 000 , 000 Which merchant levels require quarterly network scans by an ASV? - ✔✔ 1 , 2 , 3 , and 4