PCI DSS Version 4.0: A Guide to The Payment Card Industry Data Security Standard

  • 36m
  • Stephen Hancock
  • IT Governance
  • 2024

An ideal introduction to PCI DSS v4.0

Organisations that accept payment cards are prey for criminal hackers trying to steal financial information and commit identity fraud. Many attacks are highly automated, searching for website and payment card system vulnerabilities remotely, using increasingly sophisticated tools and techniques. When a vulnerability is discovered, an attack can start – with the management and staff of the target organisation unaware of what is going on.

PCI DSS exists to ensure that organisations process credit and debit card payments in a way that effectively protects cardholder data.

This guide will help you understand how:

  • The PCI DSS;
  • You can comply with the requirements of the Standard;
  • The PCI DSS and ISO/IEC 27001:2022;
  • PTS (PIN Transaction Security); and
  • P2PE (Point-to-point encryption).

About the Author

Stephen Hancock is a highly experienced cyber security consultant and auditor. He has been a PCI Qualified Security Assessor for more than 10 years. He has advised on PCI DSS and conducted assessments internationally for many clients ranging from multinational retailers to start-up fintech companies and payment service providers. Stephen has been involved in developing and delivering training courses for PCI DSS and ISO 27001, and holds a number of information security qualifications.

In this Book

  • Foreword
  • What is the Payment Card Industry Data Security Standard (PCI DSS)?
  • High-Profile Cardholder Breaches
  • What is the Scope of the PCI DSS?
  • Compliance and Compliance Programmes
  • Consequences of a Breach
  • How Do You Comply with the Requirements of the Standard?
  • Maintaining Compliance
  • PCI DSS – The Standard
  • Aspects of PCI DSS Compliance
  • The PCI Self-Assessment Questionnaire (SAQ)
  • Procedures and Qualifications
  • The PCI DSS AND ISO/IEC 27001
  • The Software Security Framework (SSF)
  • PIN Transaction Security (PTS)
  • Point-to-Point Encryption (P2PE)
  • Software-Based PIN Entry on Commercial Off-the-Shelf (COTS) Devices
  • Further Reading
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)