TITLE

CREDIT CARD SECURITY: The Best Way to Secure Data Is Not to Store Data

AUTHOR(S)
Oder, J. D.
PUB. DATE
July 2008
SOURCE
Hospitality Upgrade;Summer2008, p31
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reflects on the implication and significance of tokenization to hotel and hospitality industry in the U.S. Eventhough tokenization technology offers its advantage and yet majority of companies are still resistant to its implementation. It reveals that the deployment of tokenization replaces credit card numbers with surrogate numbers, to reduce the scope of audit and minimize the risk by reducing the number of places where card data are retained. Most companies resist to the idea because they have already implemented data encryption and key management systems costing hundreds of thousands of dollars. Discussed are the details of its implication to the industry.
ACCESSION #
32869290

 

Related Articles

  • CREDIT CARD SECURITY: Why Not Implement Tokenization to Replace Card Data? Taylor, David // Hospitality Upgrade;Summer2008, p30 

    The article offers information on the results of the mass interviews conducted by PCI Knowledge Base on the view of various hotel companies regarding the implementation of tokenization in replacement of card data in the U.S. Eventhough the technology has its benefits to offer, yet majority of...

  • Retailers must take stock of PCI. Sturdevant, Cameron // eWeek;10/22/2007, Vol. 24 Issue 33, p54 

    The article reports on the impact of Payment Card Industry Data Security Standard (PCI DSS) to businesses in the U.S. PCI is a set of reference technologies such as firewalls, wireless protocols and encryption methods dedicated at providing guidance to companies that handle credit card data. It...

  • HOW TO... Respond to Attacks. Causey, Brad // Certification Magazine;Jun2005, Vol. 7 Issue 6, p22 

    This article provides information on how to track computer intruders after they successfully compromise a computer system. For starters, time is essential because it affects the evidence and the proper identification and prosecution of the perpetrator. Second, it is a must to establish which is...

  • SURVIVABILITY - THE NEW CONCEPT OF SECURITY. MIHAI, Ioan-Cosmin; IANCU, Laura // Journal of Criminal Investigation;2012, Vol. 5 Issue 1, p43 

    Survivability is the capability of a system to fulfill its mission in a timely manner despite intrusions, failures or accidents. It blends computer security with risk management for the purpose of protecting highly distributed information services and assets. Survivability approach expands the...

  • Computer Hacking Forensics Investigators: Reducing Security Breaches. Bavisi, Jay // Certification Magazine;Mar2006, Vol. 8 Issue 3, p36 

    Discusses the role of computer hacking forensics investigators in reducing computer security breaches. Challenges facing businesses relating to computer security; Reasons behind the need for forensics investigators; Information on the Computer-Hacking Forensics Investigators training program...

  • Data Protection. Guha, Subo // Database Trends & Applications;Apr/May2014, Vol. 28 Issue 2, p30 

    The article provides helpful information for business enterprises when it comes to data protection. It presents several ways that could lead to data loss which include ignoring hardware failure, trusting co-employees to follow policies, and disregarding software corruption. Other issues such as...

  • A Caribbean Computer Security Dilemma. Anderson, Wayne L. // Franklin Business & Law Journal;2010, Issue 4, p21 

    The article offers information on the status of computer security in Caribbean islands. The author mentions that many countries in the region have not prioritized computer security because of the limited resources they have, thus their technological advancement is less advanced compared to other...

  • Stay on top of information security by learning the lessons of the Sumo. Dilley, Ron // Computer Weekly;5/13/2008, p14 

    The article elaborates the significance of the lessons learned from Sumo wrestling to information technology (IT) industry in Great Britain. The author believes the sumo is similar to such kind of sport wherein it provides little or no improvement to the security of an organization. To attain...

  • Beating the USB burglars. Rostern, John; Landin, Jared // Computer Weekly;11/1/2005, p30 

    This article reflects on the need to frame policies to counter removable media risks. One can see them everywhere: digital cameras, USB flash drives, mobile phones, MP3 players and iPods. The number of devices and the ease with which they interface with PCs has created serious risks to the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics