TITLE

The Forensics of a PCI Breach

AUTHOR(S)
Shelhart, Mark
PUB. DATE
October 2011
SOURCE
Hospitality Upgrade;Fall2011, p140
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the author's view on the issue related to the breach of peripheral component interconnect (PCI) data protection. It notes that such issue has been common among hotels due to computer hacking. It offers tips on how to handle such issue which involves discussing such matter internally and call the processing bank for assistance. Meanwhile, it suggests the role of information technology (IT) staff in providing technological assistance in implementing security measures.
ACCESSION #
67378773

 

Related Articles

  • Personal Responsibility. LAWHORN, RICK // Information Security;Sep2009, Vol. 11 Issue 8, p6 

    The article focuses on who is to blame with regards to security issues in the hospitality industry. According to the author, there are two distinct parts that need to be examined, namely the hotel network that processes payments, stores personal information about guests and conducts routine...

  • Are the recent denial of service attacks the security industry's 15 minutes of fame? McClure, Stuart; Scambray, Joel // InfoWorld;03/06/2000, Vol. 22 Issue 10, p46 

    Comments on the distributed denial of service attacks during the week of February 7, 2000. Web sites that were affected; Impact of the attacks; Warning once attackers gain access to a system; Recommended response to the problem.

  • Multiple "Guards" Foil Hackers.  // USA Today Magazine;Jun2003, Vol. 131 Issue 2697, p7 

    Reports on the development of a web site designed to protect computer software hackers in the U.S. Addition of custom levels of security to software; Traditional software protection measures; Modifications to software security measures.

  • Attack of the zombies. Maher, William // Australian Personal Computer;Oct2003, Vol. 23 Issue 10, p30 

    The Blaster worm has shown how hacked PCs can turn nasty in the blink of an eye. Mark discovered that while the machine looked like it was sitting idly, the Net connection was on fire. His computer had been hijacked; hidden code had somehow infected the system and created a backdoor into the...

  • Hands Off My PC! Cohen, Adam // Time;4/30/2001, Vol. 157 Issue 17, p80 

    Discusses computer security for the home. The author's installation of Norton's Personal Firewall, which promised to block outsiders from getting into his computer and to keep a log of anyone that tried; The number of messages that the firewall has blocked; Observations on computer hackers. ...

  • Create a security culture of data protection, compliance. Freed, Jason Q. // Hotel & Motel Management;5/1/2010, Vol. 225 Issue 5, p1 

    The article reports on the need for hoteliers to implement a security culture and ensure data protection given the fact that the sector is one of the easiest targets of hackers who want to steal identities. It mentions that a survey conducted by Trustwave Global Security revealed that 38% of...

  • Insurance Recovery for Loss or Liability Arising from Cyberattacks. Godes, Scott N.; Trotter, Kenneth Berline // Hospitality Upgrade;Fall2011, p146 

    The article discusses the significance of purchasing insurance by hospitality companies as a measure from possible losses due to cyberattacks and data breaches. It notes that companies need to thoroughly understand what insurance policies coverage must be purchased to cover loss or liability....

  • Protecting private information. Winkler, Ira // Hotel & Motel Management;2/3/97, Vol. 212 Issue 2, p47 

    Focuses on the protection of personal information of hotel customers. Advantages of the computerization of the telephone system; Risk of credit card abuse; Recommendations for hoteliers in addressing the issue.

  • Send Internet Bad Guys Packing. Mink, Mary // Credit Union Executive Newsletter;2/7/2005, Vol. 31 Issue 3, p1 

    Reports on the arrest of a number of people allegedly involved in an international cybercrime ring. Target of the group; Agencies involved in the investigation; Implications of the prevailing cybercrime for the credit unions.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics