Fischer, Jennifer
April 2010
Hospitality Upgrade;Spring2010, p126
Trade Publication
The article focuses on the functionality of data field encryption to protect card data from the swipe to the acquirer processor. An effective security layer can be represented by data field encryption by eradicating clear text cardholder data either in storage or in transit. Information on best practices for data field encryption developed by Visa Inc. that offer guidance on key elements that are important to evaluate is presented.


Related Articles

  • Where to Begin for End-to-End Encryption Systems. Litan, Avivah // American Banker;9/15/2009, Vol. 174 Issue 172, p15 

    The article expresses the author's opinions regarding the need of easier and stronger financial security measures that use end-to-end encryption. Topics discussed in the article include the opinions that Visa Inc. has regarding end-to-end encryption, the reasons why banks are using encryption...

  • Visa Takes Data Encryption Into Its Own Hands. McKinley, Ed // ISO & Agent Weekly;8/23/2012, Vol. 8 Issue 31, p1 

    The article reports on the move of Visa Inc. to offer a new data encryption service that could compete with third-party security vendors' offerings in the U.S. The move indicates the growing desire of the company to push beyond the requirements of the Payment Card Industry data security...

  • Visa Offers Guidance On Data Encryption As Companies Add Encryption Products. Wolfe, Daniel // ISO & Agent Weekly;10/15/2009, Vol. 5 Issue 37, p1 

    The article reports that Visa Inc. is providing merchants with data encryption guidelines. It notes that the said guidelines aim to convince merchants that encryption offers more than buying a particular product. It adds that more companies, such as Heartland Payment Systems Inc., are already...

  • Accessing a Network using a Secure Android Application. Ragunathan, Padmalatha; Sambath, Kishore; Karthik, L. Vishnu // International Journal of Advanced Networking & Applications;Jul/Aug2012, Vol. 4 Issue 1, p1503 

    Security plays a vital role in today's mobile world. There are security issues like sniffing of data while accessing information through open channel. Proper security measures can help to deal with the common security threats faced by mobile phone users such as data protection, privacy,...

  • Shadow Size Reduction and Multiple Image Secret Sharing Based on Discrete Fractional Random Transform. Zhenfei Zhao; Hao Luo; Zhe-Ming Lu // Information Technology Journal;2010, Vol. 9 Issue 2, p298 

    This study proposes an improved image secret sharing scheme based on the discrete fractional random transform. In this (r, n)-threshold prototype, the shadow size is reduced to l/r of the secret image. In contrast, all shadows are (if the same size as that of the secret image in the original...

  • Safeguarding HR Information. Caterinicchia, Dan // HR Magazine;Nov2005, Vol. 50 Issue 11, p54 

    This article discusses ways to protect employees' confidential data. Safeguarding and properly disposing of employee information has become a business necessity for organizations, with human resource (HR) departments leading the process. Departments can help screen out potential identity thieves...

  • Remote working.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2007, p30 

    The article presents the highlights of the seminars at the launch of the "SC Magazine's" Breakfast Briefings in November 2006. Each seminar focused on issues currently faced by security professionals and offered practical advise and useful contracts for the future to those present. Matt Lawless,...

  • Decoding the cloud. Kamaraju, Ashvin // SC Magazine: For IT Security Professionals (15476693);Apr2013, Vol. 24 Issue 4, p18 

    The author comments on the approaches developed in response to the challenge of controlling access to sensitive information. These include enterprise encryption services, cloud service provider encryption services and encryption gateways. He explains that enterprise encryption services for cloud...

  • Critical Data Exchange in the Cloud - Keeping Your Sanity when It Feels You Are Losing Control. Hakhinian, Mushegh // Software World;Mar2011, Vol. 42 Issue 2, p19 

    The article offers information on how to ensure the security of critical information exchange in cloud computing which is a critical business requirement. It states that information technology (IT) organizations can manage and regain control of the systems by understanding the cloud security...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics