Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

ANSWER in your own words Case Scenario: CreditSolutions v FTC Read the case scenario at https://www.ftc.govews-events/press-releases/2006/02/cardsystems-solutions-settles-ftc-charges the article is ALSO attached to the assignment. Based

ANSWER in your own words

Case Scenario: CreditSolutions v FTC Read the case scenario at https://www.ftc.govews-events/press-releases/2006/02/cardsystems-solutions-settles-ftc-charges the article is ALSO attached to the assignment.

image text in transcribedBased upon PCI DSS Security Standards, summarized above, answer the following questions

Who do you think is negligent in this case and why?

Explain which requirements werent met and how those violate the Federal Trade Commission Act.

Recommend two or three mitigation remedies to prevent the same thing from happening at another organization.

What are the possible consequences associated with the data loss?

Who do you think is ultimately responsible for the CardSystems Solutions lack of PCI DSS compliance? Why?

Utilize an Internet search and explain bitcoin?

The PCI Data Security Standard PCI DSS is the global data security standard adopted by the payment card brands for all entities that process, store or transmit cardholder data. It consists of common sense steps that mirror security best practices. Goals PCI DSS Requirements Build and Maintain a Secure 1. Install and maintain a firewall configuration to protect cardholder Network data 2. Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability 5. Use and regularly update anti-virus software or programs Management Program 6. Develop and maintain secure systems and applications Implement Strong Access 7. Restrict access to cardholder data by business need to know Control Measures 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data Regularly Monitor and Test 10. Track and monitor all access to network resources and cardholder dat Networks 11. Regularly test security systems and processes Maintain an Information 12. Maintain a policy that addresses information security for all personnel Security Policy

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Databases And Information Systems Uropean Conference Adbis 2020 Lyon France August 25 27 2020 Proceedings Lncs 12245

Authors: Jerome Darmont ,Boris Novikov ,Robert Wrembel

1st Edition

3030548317, 978-3030548315

More Books

Students also viewed these Databases questions