+1-415-670-9189
info@expertsmind.com
Do you have any experience with pci
Course:- Computer Network Security
Reference No.:- EM13963515




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

Security v. Compliance

One of our first modules pertains to why and how we need to build a proactive information security program. Some of our requirements flow down from client contracts, others are regulatory obligations, and the rest are "best practices" that an organization should meet in order to fulfill a fiduciary obligation (reasonable and ethical). This of these as a grid or framework of what and how your information security program must do. The objective is to build a program that accomplishes these requirements. One contract may say "review sources of information security relevant data for indication of intrusion or attack on a weekly basis", another may ask for a "daily review". You always choose the most stringent requirement so you can maintain a level of "comfortable compliance". If you or your people are reviewing your intrusion prevention systems, log aggregation tools, anti-malware dashboards, etc. on a "continuous basis", you're comfortable compliant with the most stringent requirement and far exceeding the others.

The Payment Card Industry's (PCI) Data Security Standard is one of the most common contractual security drivers; it applies to almost all organization that process, store, or transmit credit card data. Please review the first document linked below, and skim the second (no need to read them in their entirety):

https://www.pcisecuritystandards.org/pdfs/pcissc_overview.pdf (Links to an external site.)

https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf (Links to an external site.)

To start off, I'd like to get your response to the following four questions:

1. What are your initial thoughts about the seemingly straight forward six goals in the first link compared to 75 pages in the second?

2. Do you have any experience with PCI? Have you worked for an organization that dealt with PCI? HIPAA? SOX?

3. What's your perspective on "compliance" versus "security" or risk reduction?

4. If any organization meets the PCI compliance / security standard, should they be considered "secure"?




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logic
Your task is to develop a Security Plan for a threat detection system employing relevant technologies. The Plan could be divided into the following sections: An overarching
What information security problem does the company address? What information security products does the company have to solve the problem? is the information security problem
Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on t
Write a program that automatically decrypts ciphertexts that have been created using the kind of monoalphabetic substitution illustrated by the first problem set. This is an
1. In the Diffie-Hellman algorithm for key exchange, suppose Alice sends Bob (19, 3, 5) corresponding to (p, g, ga). Bob responds with (12). Determine the session key.2. Consi
You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the pub
The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ("sniffs")