Using encryption technology to achieve PCI DSS compliance objectives

Using encryption technology to achieve PCI DSS compliance objectives

Using encryption technology to achieve PCI DSS compliance objectives

Date: Sep 24, 2013

Today, most consumers prefer credit and debit card transactions over cash, and payment processing statistics back that up: During peak holiday shopping periods, Visa alone processes up to 10,000 global transactions per second.

Ensuring that those transactions are secure is not so simple. Service providers that oversee the processing of credit card transaction must rely on encryption technology to comply with the Payment Card Industry Data Security Standard (PCI DSS). By doing so, it ensures that data involved during these transactions is secure and protected.

In this special video presentation, SearchSecurity compliance expert Mike Chapple provides an overview of encryption technology and explains how it applies to protecting credit card transactions, as well as the infrastructure used to process these transactions. Additionally, he discusses how using encryption technology provides security and protection for e-commerce websites, wireless networks, system administration and more. Finally, Chapple explains how to implement and manage encryption keys, VPNs and digital certificates for the purpose of meeting specific PCI DSS requirements.

More on PCI Data Security Standard

  • canderson

    Why infosec will increasingly rely on computer hardware security

    VIDEO - Video: Cryptography luminary Paul Kocher discusses why computer hardware security will play a larger role in the information security product ecosystem.
  • canderson

    PCI 3.0 changes: A PCI compliance requirements checklist for 2015

    VIDEO - In this presentation, compliance expert Nancy Rodriguez offers a line-by-line review of the key PCI DSS changes that become mandatory as of Jan. 1, 2015.
  • canderson

    Gartner on PCI DSS 3.0 changes: Bigger, harder and more expensive

    VIDEO - Gartner analyst Avivah Litan discusses how Gartner clients are reacting to the changes in PCI DSS 3.0, and whether the increased rigor in the standard will prove beneficial to enterprises.
  • National Vulnerability Database (NVD)

    Definition - NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.S. Government for security management and compliance as well as automatic vulnerability management.
  • virtual payment terminal

    Definition - Virtual terminals allow sellers to take credit card payments online for orders made online or over the phone without requiring a card reader device.
  • ingress filtering

    Definition - Ingress filtering is a method of verifying that inbound packets arriving at a network are from the source computer they claim to be before entry (or ingress) is granted.
  • Beyond PCI: Out-of-band security tips for credit card data protection

    Tip - Securing credit card data -- both online and at brick-and-mortar stores -- requires security measures beyond those mandated by PCI DSS. Expert Philip Alexander outlines six out-of-band security controls to consider.
  • compensating control

    Definition - Compensating controls were introduced in PCI DSS 1.0, to give organizations an alternative to the requirements for encryption. The alternative is sometimes considered a loophole that creates a security risk.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: