You are here: hacking technology > firewall > Content
Hot Articles
Recommend Articles
New Articles
How you spend your Payment Card Industry Audit
  Add date: 08/30/2010   Publishing date: 08/30/2010   Hits: 3
Total 2 pages, Current page:1, Jump to page:
 
forward for organizations that store or process credit card information, is of crucial importance, since they must be able to demonstrate compliance with the Payment Card Industry Data Security Standards (PCI DSS). PCI DSS attempts to protect consumers, to safeguard the reputation of the sector itself, while not mandated by the government, has quickly this initiative by the industry for any merchant who wants to settle with the card firm credit card company. With all of the companies that software to their company, a worrying increase in the F?lle of rape of data on industries that rely primarily run but to the credit card processing, by means of application security is always a critical part of any more of the total IT security strategy organization in general. The PCI Security Standards Council to continue the PCI DSS is obtained?hen as needed to ensure that the new or ge?changed requirements are necessary to reduce the security risk of the payment includes. Since the PCI SSC does not rest on their laurels, nor should an organization and should therefore not surprising that the compliance to be a one-time event, but requires a J?Dangerous for commitment to continual improvement of audit procedures. In fact, many organizations are finding that a more efficient process, is necessary in each test.
The PCI DSS, established by the company?s credit card, contains?lt provisions on security management, policies, procedures, network architecture, design?o and other critical protective measures. However, a very pr?skriptiv Requirement - Section 6.6 - a payment processing organization to all web applications to weight?requires hrleisten whether proving the implementation of a code review or install a firewall application itself as problematic in the absence of many elements w?During its first test. In fact, says a study by VeriSign, that 56 percent of your customers' organizations at the first section 6 This is worrying because PCI has good reason to focus their efforts on good governance in the security industry applications. In the last ten years, the H?incidence and intensity?t increased the attacks on the application level enormously. Current results are alarming industry?The total number of vulnerabilities in the biggesten reported traditional applications has increased from quarter to quarter and is expected to increase steadily in the future.?The number of vulnerabilities discovered in the applications is much gr??He discovered that the number of vulnerabilities in operating systems.?More than 62 percent of companies experienced a vulnerability in the software in 2008 because of the uncertainty, shows a survey by Forrester Research.?A study of WhiteHat Security recently tested more than 600 live?Public web applications and found that nine of 10 had at least one bigs vulnerability.?Almost 60 percent of all appl?ge is not the first security test. For internally developed applications, this figure rises to almost 90 percent.
Although the credit card industry processors fear otherwise their PCI audits to make as much as ver?be changed, it is the latter case, the PCI Security Standards Council has emphasized the use of several Ans?, Tzen einschlie to the problem of application security?lich of the value of building a secure code from the beginning - as in Article 6 of the PCI DSS required. However, as we referred to the study by VeriSign, proves to Section 6 of the most demanding requirements. PCI DSS said § 6, "Develop and maintain secure systems and applications. "The way that the company commissioned to produce secure applications can be in four different but related activity?ten together summarized: (1) review of the custom code development, external and internal applications in order to identify security weaknesses, (2) all web applications developed in a safe coding guidelines are based, (3) verify that the processes, a developer training require a secure coding techniques, and (4) or contact an application firewall, source code analysis, penetration testing or security over time to hold. Let's take a closer look at the specific challenges within the sub-requirements in Section 6, where companies often some M?, Possibilities to overcome them and review and not:

 
Other pages: : 1 * 2 * Next>>
Prev:Quantix partners want to offer two-factor authentication in a cloud environment Next:The application of the principles behind Lego k?can help IT managers in their quest for more IT secu

Comment:

Category: Home > firewall