Hacking Point of Sale – Payment Application Secrets, Threats, and Solutions
Payment Application Secrets, Threats, and Solutions
Paperback Engels 2014 9781118810118Samenvatting
Must–have guide for professionals responsible for securing credit and debit card transactions
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head–on. Exploring all aspects of the problem in detail – from how attacks are structured to the structure of magnetic strips to point–to–point encryption, and more it′s packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.
A unique book on credit and debit card security, with an emphasis on point–to–point encryption of payment transactions (P2PE) from standards to design to application
Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO
Explains how protected areas are hacked and how hackers spot vulnerabilities
Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.
Specificaties
Lezersrecensies
Inhoudsopgave
<p>Part I Anatomy of Payment Application Vulnerabilities 1</p>
<p>Chapter 1 Processing Payment Transactions 3</p>
<p>Chapter 2 Payment Application Architecture 25</p>
<p>Chapter 3 PCI 55</p>
<p>Part II Attacks on Point of Sale Systems 91</p>
<p>Chapter 4 Turning 40 Digits into Gold 93</p>
<p>Chapter 5 Penetrating Security Free Zones 125</p>
<p>Chapter 6 Breaking into PCI–protected Areas 147</p>
<p>Part III Defense 165</p>
<p>Chapter 7 Cryptography in Payment Applications 167</p>
<p>Chapter 8 Protecting Cardholder Data 195</p>
<p>Chapter 9 Securing Application Code 219</p>
<p>Conclusion 249</p>
<p>Appendix A POS Vulnerability Rank Calculator 251</p>
<p>Appendix B Glossary 257</p>
<p>Index 265</p>
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan