wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Payment Card Industry - Data Security Standard PCI-DSS compliance for online banking applications

profile
67_Ashish Pandey
Oct 20, 2021
0 Likes
0 Discussions
59 Reads

Payment Card Industry - Data Security Standard (PCI-DSS) compliance for online banking applications

Payment Card Industry - Data Security Standard is an abbreviations(PCI-DSS) . Before 2004, major credit card brands such as American Express, MasterCard, Visa, Discover and JSB used to implement their own version of security programme. They collaborated together to create a universally accepted programme to encourage and improve cardholder data security.but due to this lot of data breach had happened cybercriminal activities has taken place .As a universal Standard, any merchant or service provider that stores,processes or transmits cardholder data is required to comply with this standard. Organizations that misses the mark to fulfill are ignored by the clients (after all, it’s all about their date), and those that undergo security breach and are found out to be out of compliant are possibly fined.But in 2006 the five card companies told to make some security standard council(SSC).PCI Security Standards Council (PCI SSC) It is a standarad not a law which set by security standard council in which the set rules or guidelines regarding Payment cards through banking and banking applications in between merchants and clients .where customers can easily make transaction online .In online banking appliactions adequate security testing to ensure card holder data is never compromised.Run controlled data breach attempts against the bank network on regular basis to ensure network, end-point and web application security.Perform security testing to detect well known vulnerabilities like SQL injection, OS command injection, Cross-site scripting, broken authentication etc.Test for the presence of authorized and un-authorized wireless access points on a quarterly basis.Perform penetration testing – white box and black box – on network layer and application layer at least once a year or after a signification change has been made to the application.Scope of penetration testing is the card holder environment (CDE) + systems and networks connected to it (unless the bank has a segmented network in which the CDE is isolated from other systems).Penetration testing should aim to identify all possible threats and vulnerabilities and try to exploit them to penetrate the system both at the application and network level.Issues identified should be corrected and re-tested until all chances of malicious activity are removed

 


Comments ()


Sign in

Read Next

Linux -V Server Virtual Machine

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

A buffer overflow

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Benefits of Yoga

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Network Footprinting in Cybersecurity

Blog banner

PHISHING

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

I/O Management and Disk Scheduling

Blog banner

Operating Systems Overview

Blog banner

Understanding Mobile Device Forensics

Blog banner

Risk mitigation and management

Blog banner

The Laws of Karma

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

What is OS and its overview

Blog banner

OS Assignment 3

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

The launch of UniMap by HERE

Blog banner

How Much Protein Do You Really Need Every Day?

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

semaphores

Blog banner

Indian Culture and Tradition

Blog banner

UniProcessor Scheduling

Blog banner

Email Privacy

Blog banner

Blockchain uses and use cases

Blog banner

Outlook.com

Blog banner

Operating system

Blog banner

Dekkers Algorithm

Blog banner

Multiprocessor and scheduling

Blog banner

Telegram and it's features

Blog banner

Natural Language Processing(NLP)

Blog banner

Virtual Machine

Blog banner

STARVATION

Blog banner

Different Types of Data

Blog banner

GIS in Disaster Management

Blog banner