Credit-Card Data Breaches Drive Security Solutions 43
4foot10 writes with a link to a CRN article about the booming business of PCI adoption. The Payment Card Industry Data Security Standard (PCI DSS) was worked out by credit card companies as a guideline for securing customer data. As a series of high-profile customer information leaks have occurred over the last year, the business is increasingly getting lucrative for those who can keep up. "As PCI-related business begins to boom, security VARs and integrators find themselves in the enviable position of having almost too much work to handle. And there's plenty of room for the market to grow: Visa estimates that just 36 percent of Level 1 merchants (which process more than 6 million credit-card transactions annually) and 15 percent of Level 2 merchants (which process at least 1 million) have complied with PCI. Solution providers can either handle PCI-related assessments of companies' networks and then recommend solutions to address holes, or provide the remediation services after an audit, which often requires companies to implement firewalls or encryption to their networks."
The standard itself (Score:3, Informative)
Far too many shops don't comply with the majority (or any) of the recommendations.
Re: (Score:3, Informative)
Oh, if only. Until recently I worked for a company that sells systems that perform credit card transactions for a particular segment of merchants (I don't want to say more than that for reasons that will become obvious soon enough. They went through a series of revisions in their product lines, but for the most part the systems are very hard to set up, configure, and troubleshoot, and if you were going to go looking for the most technically inept customer base t
Re: (Score:2)
Re: (Score:1)
And second, which is funny, you don't have to pass PCI audit to
Putting a band-aid on a sucking chest wound (Score:2, Insightful)
Oh, that's right, it's more lucrative to give out credit like candy, and then put responsibility for fraudulent charges on the merchants.
Re: (Score:2, Insightful)
Re: (Score:2)
Re: (Score:2)
The "ridiculously heightened security" as you put it is just common sense. It was only a couple of years ago that you could routinely use search engines like Google to search retailer web sites for files (as basic as plain text files and Access databases, etc.) containing customer payment and shipping information. Nowadays most retailers at least have their payment databases out of the webroot space (often on a different server), but I doubt whether more than a very few of them actually store the card data
Re: (Score:1)
layers 1-3 aren't the biggest problem (Score:5, Insightful)
Re: (Score:2)
I agree with that entirely, but it also extends to the people writing the software and the devices.
I have a client (more than one, actually) running QuickBooks 2007. This POS has to run as Administrator on a Windows box. There is theoretically a way to change that but the Web page describing it is extremely long - and there are no guarantees that the next update (QuickBooks has released many recently because the 2007 version is buggy as hell) won't screw that up.
So in essence the entire small business marke
when even the source doesn't have a clue (Score:2)
Security experts say every time a retailer ends up in the headlines for losing customer credit-card data, a PCI project gets its wings. And,as more companies look to the channel for help with securing their networks for PCI compliance, it's turning out to be a wonderful life for solution providers.
in which they link the PCI acronym to an encyclopedia site detailing what PCI as in Peripheral Component Interconnect means.
Good job.
PCI is Paternalism (Score:2)
But we call all rest easy knowing that some vendor has spent $5 per IP to get a "hackersafe" badge to throw up on his webiste.
Re: (Score:2)
Re: (Score:1)
No it doesn't (Score:2)
I have worked with several gateways/processors and the details depend a lot on their implementation. However typically we set up two accounts, a CVV account and a non CVV account. We funnel initial transactions through the CVV account and recurring transactions through the non-CVV accounts.
Sometimes explicit linkage is required (ie a transaction reference for the initial transaction) and sometimes there is just "trust" that the no-CV
Re: (Score:1)
Re: (Score:2)
Mind, with the price of gas, I can understand the desire for extra security.
Re: (Score:2)
1: Authorize a single transaction, including date/time, CC#, expiration, and ammount.
2: Authorize "recurring payments", which stores #1 and includes what limits (if any) on the recurrence. (15/month? "paid in full" a month?)
3: For each recurring payment, including CC# (et al) and reference to #1. Processor checks #1, and if it is (1) still valid and unrefuted and (2) satisfies #2's limits processes the payments.
Re: (Score:1)
Bullshit (Score:2)
Re: (Score:1)
Re: (Score:2)
No. They're not. And for *true* risk managers, they're a joke and a waste of time.
encrypt transmission across public networks .. (Score:2)
On the server the data is stored encrypted and is accessed through well defined system calls. The encryption is done by a hardware module that sits between the harddrive and the system. That way if the server is sucessfully ha
Re: (Score:1)
Re: (Score:2)
When you apply for a card, the server generates a unique identity. These details are stored on the card and on the server. The card is sent out to you and when in use a processor on the card generates a one time encrypted transaction from the data on the card. This is sent across the network to the server. The server performs the same transaction on the data stored in the server. If the two matches then the tr
Re: (Score:1)
What is the point for a lot of this when the out.. (Score:2)
It's just broken (Score:2)
Requiring that to make a purchase you have to give a shop all the information they require to make additional purchases on your behalf is just stupid.
The solution is simple, public/private key cryptography.
eg. http://jesstaa.blogspot.com/2006/06/credit-cards. h tml [blogspot.com]
Have to stop storing them (Score:2)
If people want to bill you every month - they should send *you* an account number (which they could make easy to do, as above) and you instruct you
Credit-Card Data Breaches Drive Ambiguous Titles (Score:1)
Scanning only part of PCI (Score:2)
Making sure the systems don't raise any security scanning flags can be a pain but mostly it's a tick the box affair. (I have had to handle the SSL issue you mention. Actually disabling SSLv2 is easy, the hard part is