wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Payment Card Industry - Data Security Standard PCI-DSS compliance for online banking applications

profile
67_Ashish Pandey
Oct 20, 2021
0 Likes
0 Discussions
59 Reads

Payment Card Industry - Data Security Standard (PCI-DSS) compliance for online banking applications

Payment Card Industry - Data Security Standard is an abbreviations(PCI-DSS) . Before 2004, major credit card brands such as American Express, MasterCard, Visa, Discover and JSB used to implement their own version of security programme. They collaborated together to create a universally accepted programme to encourage and improve cardholder data security.but due to this lot of data breach had happened cybercriminal activities has taken place .As a universal Standard, any merchant or service provider that stores,processes or transmits cardholder data is required to comply with this standard. Organizations that misses the mark to fulfill are ignored by the clients (after all, it’s all about their date), and those that undergo security breach and are found out to be out of compliant are possibly fined.But in 2006 the five card companies told to make some security standard council(SSC).PCI Security Standards Council (PCI SSC) It is a standarad not a law which set by security standard council in which the set rules or guidelines regarding Payment cards through banking and banking applications in between merchants and clients .where customers can easily make transaction online .In online banking appliactions adequate security testing to ensure card holder data is never compromised.Run controlled data breach attempts against the bank network on regular basis to ensure network, end-point and web application security.Perform security testing to detect well known vulnerabilities like SQL injection, OS command injection, Cross-site scripting, broken authentication etc.Test for the presence of authorized and un-authorized wireless access points on a quarterly basis.Perform penetration testing – white box and black box – on network layer and application layer at least once a year or after a signification change has been made to the application.Scope of penetration testing is the card holder environment (CDE) + systems and networks connected to it (unless the bank has a segmented network in which the CDE is isolated from other systems).Penetration testing should aim to identify all possible threats and vulnerabilities and try to exploit them to penetrate the system both at the application and network level.Issues identified should be corrected and re-tested until all chances of malicious activity are removed

 


Comments ()


Sign in

Read Next

Virtual memory

Blog banner

Modern operating system

Blog banner

RAID

Blog banner

SQL Injection Techniques

Blog banner

Fossil Hunting 101 at the Peace River, Arcadia, Florida, USA

Blog banner

Deming’s Process

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

City of Mumbai (Bombay):

Blog banner

10 Interesting Facts about Death Note

Blog banner

Concept and definition of m-commerce

Blog banner

Photorec - media recovery tool

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Types of Hackers.

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Population

Blog banner

How Cyber Forensics use in AI

Blog banner

Service Design Model

Blog banner

Having passion in life

Blog banner

This is my first blog.

Blog banner

Boxing

Blog banner

Lucidchart

Blog banner

Mumbaicha Dabbawalla

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

FILE SHARING

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Self-love: Being the reason of your own smile

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

A buffer overflow

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

Data Lake

Blog banner

Processes: Process Description and Control.

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

What is HTML?

Blog banner

Social Engineering

Blog banner

MENDELEY

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Junk food vs healthy food

Blog banner

Data Analytics in Data Science

Blog banner

Environmental Management using GIS

Blog banner