What other american laws or regulations might relate

Assignment Help Management Information Sys
Reference no: EM132153327

Residency Project - PCI DSS

The Project

This team-based Residency Project is comprised of two components: a research paper, which accounts for 20% of the overall course grade, and a presentation which accounts for 10% of the overall course grade. The challenge of this Project includes demonstrating that the team acquired a sophisticated level of knowledge about one of the mains components of the system of PCI DSS. Each team's efforts should be able to be successfully applied to the knowledge gained by its fellow student teams toward an overall, comprehensive understanding of these crucial governing principles collectively known as the Payment Card Industry Data Security Standard.

Unless logically inapplicable, such as when writing about historical facts, use the current version of the guidelines: PCI DSS 3.2.

Each team is charged with researching, discussing, and presenting results about one of the following eight components of the PCI DSS system:

Group One: Historical background of PCI DSS, such as the history of payments in the U.S., the introduction of the Payment Card Industry Security Standards Council, and other general points of knowledge that help to set the tone for the Project. We need the context from this Group.

Group Two: Just as our textbook chapters typically begin, Group One's history lesson is expanded here by describing some of the challenges that the three main stakeholders of payment card systems-i.e., payment card companies (Visa, MasterCard, et al), merchants and vendors (small, large, online, brick-and-mortar), and consumers-face vis-à-vis technologies, business challenges, and legal challenges within the PCI domain.

Group Three: With some background and context coupled to the challenges that are evident, it is time to explore the PCI DSS requirements. When you carefully and fully learn these (coupled to Group Four's work) you will be able to understand compliance. This Group will research and discuss the first three "control objectives," each of which includes numerous requirements:

1. Build and Maintain a Secure Network and Systems

a. Install and maintain a firewall configuration to protect cardholder data

b. Do not use vendor-supplied defaults for system passwords and other security parameters

2. Protect Cardholder Data

a. Protect stored cardholder data

b. Encrypt transmission of cardholder data across open, public networks

3. Maintain a Vulnerability Management Program

a. Protect all systems against malware and regularly update anti-virus software or programs

b. Develop and maintain secure systems and applications

Group Four: Continuing with the PCI DSS requirements, this Group will research and discuss the second set of PCI DSS "control objectives," most of which include numerous requirements: 

• Your team must submit both the research paper and the PPT in iLearn no later than Sunday, October 28, at 1:30 p.m.

• Residency Project scores will be recorded no later than Monday, November 5.

4. Implement Strong Access Control Measures

a. Restrict access to cardholder data by business need-to-know

b. Identify and authenticate access to system components

c. Restrict physical access to cardholder data

5. Regularly Monitor and Test Networks

a. Track and monitor all access to network resources and cardholder data

b. Regularly test security systems and processes

6. Maintain an Information Security Policy

a. Maintain a policy that addresses information security for all personnel

Group Five: There are fewer better ways to help understand these complex guidelines, from a practical perspective, than to learn about how "real world" stakeholders have dealt with them. Thus, the audience needs to learn about some case studies. Research and discuss at least three actual scenarios in which a PCI stakeholder has dealt with, or failed to comply with, PCI DSS.

Tell us some stories. Make sure to include at least three subjects:

(1) an online retailer;

(2) a small, local business (such as a barber shop, bookstore, or restaurant); and

(3) a law firm, large or small.

You may choose more than three subjects, but do not expand so much so that you are unable to tell a full story about your chosen subjects.

Group Six: Next comes some analysis. This Group should examine and discuss PCI DSS with an analytical eye, albeit limited. Look specifically at Kentucky's laws, regulations, and business practices in order to examine PCI DSS in this state-level perspective. Are there other Kentucky laws that govern payment cards? What Kentucky laws implicate PCI DSS? What are some things that Kentucky business leaders need to be aware of when they accept payment cards at their establishments?

Group Seven: In further analyzing PCI DSS, what other American laws or regulations might relate to, implicate, or otherwise find a nexus with PCI DSS? Here, the audience needs to understand, as you will, that PCI DSS does not operate in a vacuum. Rather, like most of what we'll learn in ISOL 633, there are numerous laws, regulations, and other governing principles that interact with PCI DSS to form an overall governance model.

Group Eight: This enviable Group gets the opportunity to examine and explain two PCI DSS concepts. First, tell us what's wrong with PCI DSS. For example, although there are other questions to ask and answer, has PCI DSS become outdated or irrelevant in some way, or is it lagging behind modern technologies? Secondly, what is on the horizon for PCI DSS stakeholders, especially for the merchants and vendors?

The Research

Please utilize the University's wealth of library resources, as well as alternative scholarly or legal resources as appropriate.

While it is not prohibited to use other, non-scholarly resources, the key to compiling a cogent, informed Residency Project in our course is to focus on peer-reviewed, scholarly articles and the laws, regulations, and legal cases that surround PCI DSS. The balance should weigh heavily toward those resources, although some other magazine, newspaper, or website sources may help you.

Reference no: EM132153327

Questions Cloud

Deleterious effect on us highway : It is still the conventional wisdom in the U.S. that compliance with NAFTA requirements is having a deleterious effect on U.S. highway safety standards
Discuss the feature of a project quality management plan : To create a resource plan, you will first need to list the types and number of resources required to complete the project.
What is the average per capita income : According to the News Wire "Inequality," what is the average per capita income in nations where the highest-income decile gets (a) over 45 percent of total inco
Define large organizations that receive significant benefits : Identify two large organizations (for-profit companies, non-profit enterprises, or government entities) that received significant benefits from utilizing.
What other american laws or regulations might relate : ISOL 633: In further analyzing PCI DSS, what other American laws or regulations might relate to, implicate, or otherwise find a nexus with PCI DSS?
Museum of modern art get after this sale : The Museum did not sell the painting. However the stated price, while surprising, would not be that unusual.
Identify and explain the impact of the change : For this project, you will take a set of financial reports from a fictional or real company and try to determine what would happen if something changed within.
What is the free trade price to two decimal places : Suppose Qd=-41*P+941, Qs=35*P+17 for home and Qd*=-41*P+428, Qs*=35*P+40 for foreign. What is the free trade price to two decimal places?
How each source supports your working thesis : For the Annotated Bibliography, you will write annotations for three sources. One source should be a primary source. Though a primary source can be different.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd