Book description
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition.
Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information.
- Completely updated to follow the most current PCI DSS standard, version 3.0
- Packed with help to develop and implement an effective strategy to keep infrastructure compliant and secure
- Includes coverage of new and emerging technologies such as NFC, P2PE, CNP/Mobile, and EMV
- Both authors have broad information security backgrounds, including extensive PCI DSS experience
Table of contents
- Cover
- Title page
- Table of Contents
- Copyright
- Foreword
- Acknowledgments
- Chapter 1: About PCI DSS and this book
- Chapter 2: Introduction to fraud, data theft, and related regulatory mandates
- Chapter 3: Why is PCI here?
- Chapter 4: Determining and reducing the PCI scope
- Chapter 5: Building and maintaining a secure network
- Chapter 6: Strong access controls
-
Chapter 7: Protecting cardholder data
- Abstract
- What is data protection and why is it needed?
- Requirements addressed in this chapter
- PCI requirement 3: Protect stored cardholder data
- Requirement 3 walk-through
- What else can you do to be secure?
- PCI requirement 4 walk-through
- Requirement 12 walk-through
- Appendix A of PCI DSS
- How to become compliant and secure
- Common mistakes and pitfalls
- Case study
- Summary
- Chapter 8: Using wireless networking
- Chapter 9: Vulnerability management
-
Chapter 10: Logging events and monitoring the cardholder data environment
- Abstract
- PCI requirements covered
- Why logging and monitoring in PCI DSS?
- Logging and monitoring in depth
- PCI relevance of logs
- Logging in PCI requirement 10
- Monitoring data and log for security issues
- Logging and monitoring in PCI—all other requirements
- PCI DSS logging policies and procedures
- Tools for logging in PCI
- Other monitoring tools
- Intrusion detection and prevention
- Integrity monitoring
- Common mistakes and pitfalls
- Case study
- Summary
- Chapter 11: PCI DSS and cloud computing
- Chapter 12: Mobile
- Chapter 13: PCI for the small business
- Chapter 14: Managing a PCI DSS project to achieve compliance
- Chapter 15: Don’t fear the assessor
- Chapter 16: The art of compensating control
- Chapter 17: You’re compliant, now what?
- Chapter 18: Emerging technology and alternative payment schemes
-
Chapter 19: Myths and misconceptions of PCI DSS
- Abstract
- Myth #1 PCI doesn’t apply to me
- MYTH #2 PCI is confusing and ambiguous
- Myth #3 PCI DSS is too onerous
- Myth #4 breaches prove PCI DSS irrelevant
- Myth #5 PCI is all we need for security
- Myth #6 PCI DSS is really easy
- Myth #7 my tool is PCI compliant thus I am compliant
- Myth #8 PCI is toothless
- Case study
- Summary
- Index
Product information
- Title: PCI Compliance, 4th Edition
- Author(s):
- Release date: November 2014
- Publisher(s): Syngress
- ISBN: 9780128016510
You might also like
book
PCI Compliance
This book explains the payment card industry (PCI) security standards required for organizations storing, processing, or …
book
PCI DSS: A Practical Guide to implementing and maintaining compliance, Third Edition
A concise, easy to follow reference to PCI DSS compliance This practical guide gives you a …
book
PCI DSS: A pocket guide, sixth edition
This pocket guide is perfect as a quick reference for PCI professionals, or as a handy …
book
Cyberethics: Morality and Law in Cyberspace, 5th Edition
The Internet and widespread use of blogging, email, social media and e-commerce have foregrounded new, complex …