Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Businesses The Internet

Credit-Card Data Breaches Drive Security Solutions 43

4foot10 writes with a link to a CRN article about the booming business of PCI adoption. The Payment Card Industry Data Security Standard (PCI DSS) was worked out by credit card companies as a guideline for securing customer data. As a series of high-profile customer information leaks have occurred over the last year, the business is increasingly getting lucrative for those who can keep up. "As PCI-related business begins to boom, security VARs and integrators find themselves in the enviable position of having almost too much work to handle. And there's plenty of room for the market to grow: Visa estimates that just 36 percent of Level 1 merchants (which process more than 6 million credit-card transactions annually) and 15 percent of Level 2 merchants (which process at least 1 million) have complied with PCI. Solution providers can either handle PCI-related assessments of companies' networks and then recommend solutions to address holes, or provide the remediation services after an audit, which often requires companies to implement firewalls or encryption to their networks."
This discussion has been archived. No new comments can be posted.

Credit-Card Data Breaches Drive Security Solutions

Comments Filter:
  • The standard itself (Score:3, Informative)

    by ergo98 ( 9391 ) on Saturday March 31, 2007 @07:44AM (#18554649) Homepage Journal
    The PDF [pcisecuritystandards.org] isn't full of anything revolutionary, and most are just common sense data security, but it is a great starting point for securing virtually any highly confidential data.

    Far too many shops don't comply with the majority (or any) of the recommendations.
    • Re: (Score:3, Informative)

      by 4e617474 ( 945414 )

      and most are just common sense data security

      Oh, if only. Until recently I worked for a company that sells systems that perform credit card transactions for a particular segment of merchants (I don't want to say more than that for reasons that will become obvious soon enough. They went through a series of revisions in their product lines, but for the most part the systems are very hard to set up, configure, and troubleshoot, and if you were going to go looking for the most technically inept customer base t

      • Wow. Well at least I take pride in only using cash (no debit cards) for fear of these situations. I'm fearful this is a lot more common.
    • by Mondor ( 704672 )
      If you would only know how right you are. There are two major problems with PCI standard. First, it is greatly outdated. It tries to push some "well known and proven" security measures as if there could be no others more effective. It is like instruction to put red flags around the lawn to keep wolves away. You may get a high-tech fence instead, and this would solve the problem, but this would not make you compliant. Just put these red flags on.

      And second, which is funny, you don't have to pass PCI audit to
  • Instead of coming up with all these technological countermeasures, why don't the credit card agencies simply stop offering credit without actually verifying the identity of the credit requestor? Make the data useless by itself, and people will stop trying to obtain it.

    Oh, that's right, it's more lucrative to give out credit like candy, and then put responsibility for fraudulent charges on the merchants.

    • Re: (Score:2, Insightful)

      by jd3nn1s ( 613014 )
      The PCI DSS has nothing to do with stopping fraudulent credit applications. It's about making sure that payment information you have given to a merchant is protected from security breaches. The merchant is rightly responsible for this.
      • You don't get my point. If the payment information is worthless to identity thieves because they can't do anything with it, then there'll be no need for putting the burden for ridiculously heightened security on merchants.
        • The "ridiculously heightened security" as you put it is just common sense. It was only a couple of years ago that you could routinely use search engines like Google to search retailer web sites for files (as basic as plain text files and Access databases, etc.) containing customer payment and shipping information. Nowadays most retailers at least have their payment databases out of the webroot space (often on a different server), but I doubt whether more than a very few of them actually store the card data

        • by jd3nn1s ( 613014 )
          How do you make the payment information worthless to someone wishing to carry out fraudulent purchases without new hardware systems?
  • by bl8n8r ( 649187 ) on Saturday March 31, 2007 @08:04AM (#18554729)
    The biggest problems facing internet security are greed, laziness, ineptitude, apathy and general ignorance. expensive credit card hardware cant fix pebkac, all it does is make newegg raise their shipping charges.

    • I agree with that entirely, but it also extends to the people writing the software and the devices.

      I have a client (more than one, actually) running QuickBooks 2007. This POS has to run as Administrator on a Windows box. There is theoretically a way to change that but the Web page describing it is extremely long - and there are no guarantees that the next update (QuickBooks has released many recently because the 2007 version is buggy as hell) won't screw that up.

      So in essence the entire small business marke
  • I mean come on, the linked writing has the following text

    Security experts say every time a retailer ends up in the headlines for losing customer credit-card data, a PCI project gets its wings. And,as more companies look to the channel for help with securing their networks for PCI compliance, it's turning out to be a wonderful life for solution providers.

    in which they link the PCI acronym to an encyclopedia site detailing what PCI as in Peripheral Component Interconnect means.

    Good job.
  • The standard, while a nice list of controls, has only a slight chance of helping those cannot/will not manage their risk. In the mean time it is nothing but another layer of wasteful bureaucracy (redundant?) for those who do a good job of managing their risk.

    But we call all rest easy knowing that some vendor has spent $5 per IP to get a "hackersafe" badge to throw up on his webiste.
  • Comment removed based on user account deletion
  • Like any document, it gives a smart person a starting point and a dumb person (company) a way to say they're secure when they're really not. You need a 'firewall' and an 'IDS'; devices that qualify for this can do bare ass nothing (if you can justify why it's open and why you use it, it's probably fine to have open), though you can get a good tight firewall NEED-TO-ACCESS policy (allow what you need, isolate the servers from each other, deny any). I believe you can have access to the SQL database from the
    • by jd3nn1s ( 613014 )
      The most recent version of PCI DSS states that any direct external availability of DBMS is an instant failure, and this is tested by the ASVs (or at least it should be). Any buffer overflows in remote available services should also be detected by the required quarterly vulnerability scans.
    • by Alexander ( 8916 )
      "These documents are excellent for true security engineers"

      No. They're not. And for *true* risk managers, they're a joke and a waste of time.
  • You don't send sensitive information across the Internet period. On the client run an application that generates a unique one way hash of the transaction. This is sent to the server which performs the same hash using data stored on the server. It then sends a confirm msg to the client.

    On the server the data is stored encrypted and is accessed through well defined system calls. The encryption is done by a hardware module that sits between the harddrive and the system. That way if the server is sucessfully ha
    • by jd3nn1s ( 613014 )
      So how does the server learn the credit card number etc necessary to perform the transaction?
      • by rs232 ( 849320 )
        'So how does the server learn the credit card number etc necessary to perform the transaction?'

        When you apply for a card, the server generates a unique identity. These details are stored on the card and on the server. The card is sent out to you and when in use a processor on the card generates a one time encrypted transaction from the data on the card. This is sent across the network to the server. The server performs the same transaction on the data stored in the server. If the two matches then the tr
        • by jd3nn1s ( 613014 )
          OK so this solution requires additional hardware to allow your computer to interface with the chip on the card.
  • outsourced call center has all of your info and passwords.
  • The current way in which credit cards number are used is just broken. I find it amazing that it hasn't been fixed yet.
    Requiring that to make a purchase you have to give a shop all the information they require to make additional purchases on your behalf is just stupid.
    The solution is simple, public/private key cryptography.
    eg. http://jesstaa.blogspot.com/2006/06/credit-cards. h tml [blogspot.com]
  • It simply ought to be illegal for a business to store your credit card number (or bank account number.) In fact, it ought to be possible - especially on the internet - to do business without even disclosing your credit card number. The business opens a connection to Visa, and gives your browser the info it needs to complete the transaction from your end.

    If people want to bill you every month - they should send *you* an account number (which they could make easy to do, as above) and you instruct you
  • Wow. I always thought that the benefits of those encrypted Seagate drives were marginal, but I'd never have guessed that you could breach them with just a few credit card numbers.

The use of money is all the advantage there is to having money. -- B. Franklin

Working...