Skip to:Content
|
Bottom
Cover image for PCI compliance : understand and implement effective PCI data security standard compliance
Title:
PCI compliance : understand and implement effective PCI data security standard compliance
Publication Information:
Burlington, Mass. : Syngress, 2007
Physical Description:
xxii, 329 p. : ill. ; 24 cm
ISBN:
9781597491655
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000003493594 QA76.9.A25 P414 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.

* PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data
* Information to develop and implement an effective security strategy to keep infrastructures compliant
* Well known authors have extensive information security backgrounds


Author Notes

Branden R. Williams (CISSP, CISM, CPISA, CPISM) leads an information security practice in a Global Security Consulting group at a major security firm in Flower Mound, TX and teaches in the NSA Certified Information Assurance program at the University of Dallas's Graduate School of Management. Branden has been involved in information technology since 1994, and focused on information security since 1996. He started consulting on payment security in 2004, assessing companies against the Visa CISP and Mastercard SDP programs. He has a Bachelors of Business Administration in Marketing from the University of Texas, Arlington, and a Masters of Business Administration in Supply Chain Management and Market Logistics from the University of Dallas. Branden publishes a monthly column in the ISSA Journal entitled "Herding Cats," and authors a blog at http://www.brandenwilliams.com/.

Dr. Anton Chuvakin (http://www.chuvakin.org) is a recognized security expert in the field of log management and PCI DSS compliance. He is an author of books "Security Warrior" and "PCI Compliance" and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and others. Anton has published dozens of papers on log management, correlation, data analysis, PCI DSS, security management (see list www.info-secure.org) . His blog http://www.securitywarrior.org is one of the most popular in the industry. In addition, Anton teaches classes and presents at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He works on emerging security standards and serves on the advisory boards of several security start-ups. Currently, Anton is developing his security consulting practice, focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.

Tony Bradley (CISSP-ISSAP) is the Guide for the Internet/Network Security site on About.com, a part of The New York Times Company. He has written for a variety of other Web sites and publications, including BizTech Magazine, PC World, SearchSecurity.com, WindowsNetworking.com, Smart Computing magazine, and Information Security magazine. Tony is a CISSP (Certified Information Systems Security Professional) and ISSAP (Information Systems Security Architecture Professional). He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT. Tony is recognized by Microsoft as an MVP (Most Valuable Professional) in Windows security. On his About.com site, Tony has on average over 600,000 page views per month and over 30,000 subscribers to his weekly newsletter. Tony was also author of Essential Computer Security: Everyone's Guide to E-mail, Internet, and Wireless Security (ISBN: 1597491144).


Table of Contents

1 Foreword
2 Introduction
3 Why PCI Is Important
4 Build & Maintain a Secure Network
5 Protect Cardholder Data
6 Vulnerability Management
7 Strong Access Control
8 Logging Access & Events
9 Monitor & Test
10 Monitoring Information Security Policy
11 How to Plan a Project to Meet Compliance
12 Leveraging PCI Compliance efforts with other Compliance Requirements
13 Responsibilities
14 Preparing to Fail Your First Test
15 You're Compliant, Now What
Go to:Top of Page