TITLE

Moving 'Beyond PCI'

AUTHOR(S)
Taylor, David
PUB. DATE
May 2009
SOURCE
Cards & Payments;May2009, Vol. 22 Issue 5, p40
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the author's view on the impact of the Payment Card Industry (PCI) Data Security Standard on the threats, cybersecurity and science and technology before the U.S. House Committee on Homeland Security's subcommittee. The author said that the standard is far more effective at securing confidential data than government-driven efforts. According to the author, organizations seeking to develop data-security services that go beyond PCI controls have a lot of options.
ACCESSION #
41439091

 

Related Articles

  • Even abundant security features don't spur smart card buy-in. Kutler, Jeffrey // American Banker;11/18/1998, Vol. 163 Issue 221, p1 

    Part II. Focuses on security issues related to the use of smart cards. Durability of smart cards; Existence of several technical claims and security system variations; Microsoft Corp.'s Smart Card for Windows program; Smart card applications in the financial services industry; Consumer-market...

  • ARTISTIC SCREENING - CONSTRUCTION AND APPLICATION FOR DOCUMENT SECURITY. Nathe Parag Dnayandeo // International Journal of Engineering & Management Sciences;Jan2013, Vol. 4 Issue 1, p8 

    This document gives information about Document security, security feature classification according to application criteria, security features involved at printing technique, Difference between the conventional screening gradation and artistic screening gradation, halftone dot generation in...

  • Server Virtualization: Powerful Tool, Extra Exposure. Trombly, Maria; Cacho, Lemuel V. // Securities Industry News;3/24/2008, Vol. 20 Issue 12, p12 

    The article discusses the security threats of server virtualization. Though server virtualization brings down cost and improves efficiency of existing hardware, it exposes information systems to data breach, as multiple virtual machines share common communication lines. Strategies to remedy...

  • Smart Cards: A PC for Your Eyes Only? Jantz, Richard; Littman, Dan; Strauch, Joel; Thornton, Carla; Baguley, Richard; Cekan, Lisa; Lockey, Mick; Murugesan, Kalai; Narayanamurthi, Kalpana; Silver, Karen; Stafford, Alan // PCWorld;Dec2000, Vol. 18 Issue 12, p226 

    Recommends Smart Card readers for stronger security on computers. Details of the system which requires users to insert a plastic card and use a pin number to gain access to their computer; How to obtain Smart Card readers; Opinion that security options will continue to grow.

  • Bio smartcards.  // Management Services;Jan2004, Vol. 48 Issue 1, p31 

    The article presents information on the biometric smartcards from NEC. This technology is a combined biometric-cum-smartcard solution blending the latest smartcard and fingerprint recognition technology for authorizing and authenticating who can enter premises and who can access networks. The...

  • New iCLASS Multi-Technology Reader from HID.  // Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p93 

    The article features HID Corp.'s multiClass RP40 single-card reader solution for facilities upgrading card access systems that simultaneously supports Prox, iClass, MIFARE and multi-technology HID credentials. The migration path can be selected when upgrading to contactless smart cards.

  • A Multi Layered Approach to Prevent Data Leakage. Mattsson, Ulf // Database & Network Journal;Feb2008, Vol. 38 Issue 1, p9 

    The article describes a multi layered approach to prevent data leakage. It suggests that the approach can be very powerful in preventing data leakage, starting with strong protection at the source, locking down sensitive information in critical databases. Barring a perfect screening process, no...

  • Cryptanalysis of Sood et al.'s Dynamic Identity Based Authentication Protocol for Multi-Server Architecture. Bae-Ling Chen; Wen-Chung Kuo; Lih-Chyau Wuu // International Journal of Digital Content Technology & its Applic;Mar2012, Vol. 6 Issue 4, p180 

    Sood, Sarje, and Singh recently proposed a secure dynamic identity-based (ID-based) authentication protocol for multi-server architectures utilizing smart cards, wherein they reveal security weaknesses of Hsiang and Shih's dynamic identity-based remote user authentication scheme. Sood et al....

  • Thieves Set To Attack U.S. EMV Laggards. Heun, David // ISO & Agent Weekly;11/8/2012, Vol. 8 Issue 41, p1 

    The article reports that criminals are likely to attack the U.S. payment card industry since it has not adopted the EuroPay, MasterCard, Visa (EMV) smart card, making it a weak link to the global data security chain.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics