Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

PCIP Study Guide 2017 updated to pass

Rating
-
Sold
-
Pages
5
Grade
A
Uploaded on
30-09-2023
Written in
2023/2024

PCIP Study Guide 2017 updated to pass PA-DSS Payment Application Data Security Standard (POS, shopping carts, etc.) PTS (POI) Pin Transaction Security Point of Interaction Standard (Attended and Unattended Devices) HSM (PIN) Hardware Security Module Pin Standard (not required but may assist in becoming compliant) P2PE Point to Point Encryption Standard (Most helpful standard to reduce scope) SRED Secure Read and Exchange Module allows terminals to be approved for secure encryption of cardholder data. POI Examples Attended : Cash Registers Unattended Encrypted PIN Pads : ATM Unattended Payment Terminals : Gas Pump PCI PIN Security Requirements Management Processing Transmission Payment Card Flow Cardholder presents card - Acquirer asks payment brand to determine issuer - Payment brand network determines issuer and requests approval- Issuer approves purchase- Payment brand network sends approval to the acquirer - Acquirer sends approval to merchant- Cardholder completes purchase and receives receipt. Aquirer (Also Called?) -Merchant Bank -Independent Sale Organization (ISO) -Payment Brand (Amex, Discover, JCB) -Never Visa or Mastercard Payment Card Flow (Clearing) Acquirer sends purchase information to the payment brand network - payment brand network sends purchase information to the issuer - issuer prepares data for cardholder statement - payment brand network provides complete reconciliation to acquirer. Payment Card Flow (Settlement) Issuer determines acquirer via the payment brand network - Issuer sends payment to acquirer - Acquirer pays merchant for cardholders purchase - Issuer bills cardholder Service Provider A business that is not a payment brand, directly involved in the processing, storage or transmission of cardholder data on behalf of another entity. Sometimes a service provider is a merchant. QIR's

Show more Read less
Institution
Course

Content preview

PCIP Study Guide 2017 updated to pass
PA-DSS
Payment Application Data Security Standard (POS, shopping carts, etc.)
PTS (POI)
Pin Transaction Security Point of Interaction Standard (Attended and Unattended
Devices)
HSM (PIN)
Hardware Security Module Pin Standard (not required but may assist in becoming
compliant)
P2PE
Point to Point Encryption Standard (Most helpful standard to reduce scope)
SRED
Secure Read and Exchange Module allows terminals to be approved for secure
encryption of cardholder data.
POI Examples
Attended : Cash Registers
Unattended Encrypted PIN Pads : ATM
Unattended Payment Terminals : Gas Pump
PCI PIN Security Requirements
Management
Processing
Transmission
Payment Card Flow
Cardholder presents card -> Acquirer asks payment brand to determine issuer ->
Payment brand network determines issuer and requests approval-> Issuer approves
purchase-> Payment brand network sends approval to the acquirer -> Acquirer sends
approval to merchant-> Cardholder completes purchase and receives receipt.
Aquirer (Also Called?)
-Merchant Bank
-Independent Sale Organization (ISO)
-Payment Brand (Amex, Discover, JCB)
-Never Visa or Mastercard
Payment Card Flow (Clearing)
Acquirer sends purchase information to the payment brand network -> payment brand
network sends purchase information to the issuer -> issuer prepares data for cardholder
statement -> payment brand network provides complete reconciliation to acquirer.
Payment Card Flow (Settlement)
Issuer determines acquirer via the payment brand network -> Issuer sends payment to
acquirer -> Acquirer pays merchant for cardholders purchase -> Issuer bills cardholder
Service Provider
A business that is not a payment brand, directly involved in the processing, storage or
transmission of cardholder data on behalf of another entity. Sometimes a service
provider is a merchant.
QIR's

, Qualified Integrators and Resellers
-Assure quality and provide feedback
What QIR's do?
-Implementing applications into a merchant environment
-Integrating applications into new software or systems.
-Configuring the payment application
-Servicing payment applications to provide troubleshooting/remote updates or support.
PA-DSS Implementation Guide
-What the QIR uses in order to implement a PCI DSS compliant payment application
into a CDE environment.
-After installation the QIR creates an implementation statement and gives it to the
customer for their signature.
CID
Card Identification Number (American Express)
CAV2/CID/CVC2/CW2
Card specific code on back of card (Discover, JCB, Mastercard, Visa)
Cardholder Data
-PAN
-Cardholder Name
-Expiration Date
-Service Code
Sensitive Authentication Data
-Full magnetic stripe data or chip data
-CAV2/CVC2/CVV2/CID
-PINs/PIN blocks
-Cannot be stored after authorization
Track 1 Data
Contains all fields of Both Track 1 and Track 2
-Length up to 79 characters.
Track 2 Data
Provides shorter processing time for older dial up transmissions.
-Length up to 40 characters
Inventorying Cardholder Environment
-System Name
-Cardholder data stored
-Reason for storage
-Retention period
-Protection mechanism.
Is storing track data permitted after authorization?
No
PCI DSS Goals
-Build and maintain a secure network and systems
-Protect Cardholder Data
-Maintain a vulnerability management program
-Implement strong access control measures

Written for

Course

Document information

Uploaded on
September 30, 2023
Number of pages
5
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
magdamwikash23 Western Governers University
Follow You need to be logged in order to follow users or courses
Sold
113
Member since
3 year
Number of followers
94
Documents
5328
Last sold
1 month ago
Magda

NURSING STUDY GUIDES/EXAMS AND NOTES ALL VERIFIED BY EXPERTS All my uploaded documents, exams and essays are verified by relevant experts.I can assure an A or at least 90% if you use any of my documents.

3.9

14 reviews

5
7
4
2
3
2
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions