Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

PCIP Already Graded A+

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
27-03-2023
Written in
2022/2023

PCIP Already Graded A+ PCI DSS Requirement 1 Ans- Install and maintain a firewall configuration to protect cardholder data PCI DSS Requirement 2 Ans- Do not use vendor supplied defaults for system passwords and other security parameters PCI DSS Requirement 3 Ans- Protect stored cardholder data by enacting a formal data retention policy and implement secure deletion methods PCI DSS Requirement 4 Ans- Protected Cardholder Data during transmission over the internet, wireless networks or other open access networks or systems (GSM, GPRS, etc.) PCI DSS Requirement 5 Ans- Use and regularly update anti-virus software or programs PCI DSS Requirement 6 Ans- Develop and maintain secure systems and applications PCI DSS Requirement 7 Ans- Restrict access to cardholder data by business need to know PCI DSS Requirement 8 Ans- Assign a unique ID to each person with computer access PCI DSS Requirement 9 Ans- Restrict physical access to cardholder data PCI DSS Requirement 10 Ans- Track and monitor all access to network resources and cardholder data PCI DSS Requirement 11 Ans- Regularly test secuirty systems and processes with wireless scans, vulnerability scnas, log audits, ASV (Approved Scanning Vendor) PCI DSS Requirement 12 Ans- Maintain a policy that addresses information security for all personnel ASV (Approved Scanning Vendor) Ans- Company approved by the PCI SSC to conduct external vulnerability scanning services. PCI Data Security Standards (PCI DSS) Ans- Covers the security of the environments that store, process or transmit account data. Environments receive account data from payment applications and other sources (e.g. acquirers) PCI Payment Application Data Security Standards (PCI PA-DSS) Ans- Covers secure payment applications to support PCI DSS compliance. Applies to Third Party payment applications if the application performs authorization and/or settlement (POS, shopping carts, etc.) Ensures a payment application can function in a PCI DSS compliant manner PA-DSS applications are in scope for PCI DSS Payment application receives account data from PIN Entry Devices (PED) or other devices and begins payment transaction PCI PIN Transaction Security (PCI PTS) Ans- Covers device tamper detection, cryptographic processes and other mechanisms to protect the Personal Identification Number (PIN). Encrypted PIN is passed to payment application or hardware terminal. PCI-PTS - PIN Security Ans- Covers secure management, processing and transmission of personal identification number data during online and offline payment card transaction processing PCI-PTS - HSM (Hardware Security Module or Host Security Module) Ans- A physically and logically protected hardware device that provides a secure set of cryptographic services, used for cryptographic key-management functions and/or the decryption of account data. Not required by DSS, but may help with the management of keys. PCI Point to Point Encryption (PCI P2PE) Ans- Covers encryption, decryption and key management within secure cryptographic devices (SCD). Not a requirement but may result in reduction of scope. Secure Cryptographic Device (SCD) Ans- A set of hardware, software and firmware that implements cryptographic processes (including cryptographic algorithms and key generation) and is contained within a defined cryptographic boundary. Examples of secure cryptographic devices include host/hardware security modules (HSMs) and point-of-interaction devices (POIs) that have been validated to PCI PTS. POI - Point of Interaction Ans- The initial point where data is read from a card. An electronic transactionacceptance product, a POI consists of hardware and software and is hosted in acceptance equipment to enable a cardholder to perform a card transaction. The POI may be attended or unattended. POI transactions are typically integrated circuit (chip) and/or magnetic-stripe card-based payment transactions. PCI Card Production Ans- Covers physical and logical security requirements for systems and business processes associated with card personalization, PIN generation, PIN mailers, and card carriers and distribution. CDE - Cardholder Data Environment Ans- The people, processes and technology that store, process, or transmit cardholder data or sensitive authentication data. Relationship between PTS and PCI DSS Ans- DSS prevents the storage of encrypted PIN blocks. PTS supports the PIN encryption so there's no overlap. Relationship between PCI DSS and PA-DSS Ans- Payment applications must support and not hinder PCI DSS compliance PCI DSS requirements mirrored in many payment application requirements in PA-DSS Relationship between PCI DSS and P2PE Ans- Incorporates requirements from Pin Transaction Security, PCI DSS, PA-DSS and PCI PIN to protect CHD from the point of capture until it reaches the payment processor. Properly implemented, validated P2PE solutions may help reduce the scope of a merchant's PCI DSS assessment. Payment Processor Ans- Entity engaged by a merchant or other entity to handle payment card transactions on their behalf. While they typically provide acquiring services, payment processors are not considered acquirers unless defined as such by a payment card brand. CHD - Card Holder Data Ans- At a minimum, cardholder data consists of the full PAN. Cardholder data may also appear in the form of the full PAN plus any of the following: cardholder name, expiration date and/or service code See Sensitive Authentication Data for additional data elements that may be transmitted or processed (but not stored) as part of a payment transaction. PA-DSS applies to third party payment applications Ans- if application performs authorization and/or settlement (POS, shopping carts, etc.) in a PCI DSS compliant manner by supporting the compliance of those that use the application. Ans- PADSS ensure a payment application functions True Ans- True or False: Use of a PA-DSS application alone does not guarantee PCI DSS compliance. Assessor must validate that payment application is installed Ans- per instructions in the PA-DSS implementation Guide provided by payment application vendor and in a PCI DSS compliant manner. PTS Ans- Acronym for "PIN Transaction Security," PTS is a set of modular evaluation requirements managed by PCI Security Standards Council, for PIN acceptance POI terminals PTS requirements apply to: Ans- Point of Interaction (POI) devices Encrypting PIN Pads (EPP) Point of Sale devices (POS) Hardware/host Security Modules (HSM) Unattended Payment Terminals (UPT) non-PIN entry modules PTS ensures terminals cannot be Ans- manipulated or attacked to allow the capture of sensitive authentication data nor allow access to clear-text PINS or keys SRED Ans- Secure Read and Exchange Module The SRED allows terminals to be Ans- approved for the secure encryption of cardholder data as part of the P2PE program. PTS has been extended to allow non-PIN entry modules Ans- to be evaluated against the SRED module to allow secure encryption at the point of interaction for non-chip and PIN cards. per PA-DSS implementation guide and in a PCI DSS compliant manner Ans- A PCI DSS assessor must validate that the payment application is installed Point of Interaction (POI) Hardware Security Modules (HSM) Ans- There are two types of devices addressed by PTS... 1. Attended POS devices such as cash registers 2. Encrypting PIN pads for use in unattended environments such as ATM's 3. Unattended payment terminals such as automated fuel dispensers and kiosks. Ans- Points of Interaction are broken into 3 device types.... PIN (Personal Identification Number) security is comprised of Ans- secure management, processing and transmission of PIN data during online and offline payment card transaction processing - such as POS terminals (attended or unattended) and ATMs P2PE Ans- Point to Point Encryption the scope of the cardholder data environment Ans- Using a P2PE hardware to hardware solution may reduce P2PE addresses merchants who Ans- ..do not store or decrypt encrypted data within their environment and who use validated solutions consisting of hardware-based encryption and third-party hardwarebased encryption P2PE solutions typically consist of Ans- a secure encryption device at the merchant premises (PTS validated POI device), all applications on the Point of Interaction device and secure decryption and key management in the service provider's environment. Service Provider Ans- Is a business that is not a payment brand and is directly involved in the processing, storage or transmission of cardholder data on behalf of another entity. Sometimes is a merchant. Can control or impact the security of the cardholder. Could be a managed security(firewall, ids, ips), managed network or hosting providers. PCI DSS scope can be reduced on the merchant side because Ans- merchants have no access to account data within POI or decryption environment merchants have no involvement in crypto key management all crypto operations managed by solution provider Cardholder Ans- the person actually owns the payment card Card present or card not present transaction Ans- Cardholder purchases goods either as a the issuer. Ans- The cardholder receives the card and bills fro

Show more Read less
Institution
Course

Content preview

PCIP Already Graded A+
PCI DSS Requirement 1 Ans- Install and maintain a firewall configuration to protect cardholder data



PCI DSS Requirement 2 Ans- Do not use vendor supplied defaults for system passwords and other
security parameters



PCI DSS Requirement 3 Ans- Protect stored cardholder data by enacting a formal data retention policy
and implement secure deletion methods



PCI DSS Requirement 4 Ans- Protected Cardholder Data during transmission over the internet, wireless
networks or other open access networks or systems (GSM, GPRS, etc.)



PCI DSS Requirement 5 Ans- Use and regularly update anti-virus software or programs



PCI DSS Requirement 6 Ans- Develop and maintain secure systems and applications



PCI DSS Requirement 7 Ans- Restrict access to cardholder data by business need to know



PCI DSS Requirement 8 Ans- Assign a unique ID to each person with computer access



PCI DSS Requirement 9 Ans- Restrict physical access to cardholder data



PCI DSS Requirement 10 Ans- Track and monitor all access to network resources and cardholder data



PCI DSS Requirement 11 Ans- Regularly test secuirty systems and processes with wireless scans,
vulnerability scnas, log audits, ASV (Approved Scanning Vendor)



PCI DSS Requirement 12 Ans- Maintain a policy that addresses information security for all personnel

,ASV (Approved Scanning Vendor) Ans- Company approved by the PCI SSC to conduct external
vulnerability scanning services.



PCI Data Security Standards (PCI DSS) Ans- Covers the security of the environments that store, process
or transmit account data.



Environments receive account data from payment applications and other sources (e.g. acquirers)



PCI Payment Application Data Security Standards

(PCI PA-DSS) Ans- Covers secure payment applications to support PCI DSS compliance.

Applies to Third Party payment applications if the application performs authorization and/or settlement
(POS, shopping carts, etc.)

Ensures a payment application can function in a PCI DSS compliant manner

PA-DSS applications are in scope for PCI DSS



Payment application receives account data from PIN Entry Devices (PED) or other devices and begins
payment transaction



PCI PIN Transaction Security (PCI PTS) Ans- Covers device tamper detection, cryptographic processes and
other mechanisms to protect the Personal Identification Number (PIN).



Encrypted PIN is passed to payment application or hardware terminal.



PCI-PTS - PIN Security Ans- Covers secure management, processing and transmission of personal
identification number data during online and offline payment card transaction processing



PCI-PTS - HSM (Hardware Security Module or Host Security Module) Ans- A physically and logically
protected hardware device that provides a secure set of cryptographic services, used for cryptographic
key-management functions and/or the decryption of account data. Not required by DSS, but may help
with the management of keys.

, PCI Point to Point Encryption (PCI P2PE) Ans- Covers encryption, decryption and key management within
secure cryptographic devices (SCD). Not a requirement but may result in reduction of scope.



Secure Cryptographic Device (SCD) Ans- A set of hardware, software and firmware that implements
cryptographic processes (including cryptographic algorithms and key generation) and is contained within
a defined cryptographic boundary. Examples of secure cryptographic devices include host/hardware
security modules (HSMs) and point-of-interaction devices (POIs) that have been validated to PCI PTS.



POI - Point of Interaction Ans- The initial point where data is read from a card. An electronic transaction-
acceptance product, a POI consists of hardware and software and is hosted in acceptance equipment to
enable a cardholder to perform a card transaction. The POI may be attended or unattended. POI
transactions are typically integrated circuit (chip) and/or magnetic-stripe card-based payment
transactions.



PCI Card Production Ans- Covers physical and logical security requirements for systems and business
processes associated with card personalization, PIN generation, PIN mailers, and card carriers and
distribution.



CDE - Cardholder Data Environment Ans- The people, processes and technology that store, process, or
transmit cardholder data or sensitive authentication data.



Relationship between PTS and PCI DSS Ans- DSS prevents the storage of encrypted PIN blocks. PTS
supports the PIN encryption so there's no overlap.



Relationship between PCI DSS and PA-DSS Ans- Payment applications must support and not hinder PCI
DSS compliance



PCI DSS requirements mirrored in many payment application requirements in PA-DSS



Relationship between PCI DSS and P2PE Ans- Incorporates requirements from Pin Transaction Security,
PCI DSS, PA-DSS and PCI PIN to protect CHD from the point of capture until it reaches the payment
processor.

Written for

Course

Document information

Uploaded on
March 27, 2023
Number of pages
22
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
CertifiedGrades Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
145
Member since
3 year
Number of followers
61
Documents
8740
Last sold
3 weeks ago
High Scores

Hi there! Welcome to my online tutoring store, your ultimate destination for A+ rated educational resources! My meticulously curated collection of documents is designed to support your learning journey. Each resource has been carefully revised and verified to ensure top-notch quality, empowering you to excel academically. Feel free to reach out to consult with me on any subject matter—I'm here to help you thrive!

3.9

38 reviews

5
21
4
6
3
2
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions