Inventory Management & Administration System Tourism suite What is the PCI DSS? The PCI DSS 1.2.1 stands for Payment Card Industry Data Security Standard.

Slides:



Advertisements
Similar presentations
TeBAS Tourism suite Technical Business Application System.
Advertisements

Chapter Five Users, Groups, Profiles, and Policies.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
What’s New, Improved or Just Maybe Different! Presented by: Lisa Huppertz, CM/ECF Coordinator.
Database Administration and Security Transparencies 1.
Access Control Methodologies
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Decoding AWS CloudTrail with OSSEC
Security Controls – What Works
Security & Privacy The changing world of Privacy and the core drivers.
Information Security Policies and Standards
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Notes: Update as of 12/31/2010 inclusive. Chart counts NIST CVE – Reported Software Flaws by “published” date, utilizing the NIST NVD. SQL Server.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Kevin R Perry August 12, Part 1: High Level Changes & Clarifications.
Why Comply with PCI Security Standards?
Payment Card Industry (PCI) Data Security Standard
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Convincing your IT Administrator to Poke a Hole in the Firewall for caTissue Suite: Introduction Ian Fore Feb 28, 2011.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Chapter 10: Authentication Guide to Computer Network Security.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Designing Active Directory for Security
Introduction to Payment Card Industry Data Security Standard
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
MDS Enhancements TSH User Group Meeting MDS Base Modifications 250 Cases Updated this Year Cases Completed By System Area ODBC1 Purchasing25 Pricing12.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 UNDERSTANDING USER ACCOUNTS  Local user accounts  stored in the Security.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Kevin Brunson| Page #1 © 2009 Blackbaud Support Roundtable: The Raiser’s Edge 7.91 Overview and Q&A Support Roundtable: The Raiser’s Edge 7.91 Overview.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Setting up/Managing Bank Personnel Intuit Financial Services University Business Financial Solutions Certification.
NT4 SP4 Security Jack Schmidt - Fermilab
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Payment Card Industry (PCI) Data Security Standard Version 3.1
SAP Navigation.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
21 CFR PART 11.
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Rules and Standards
PCI-DSS Security Awareness
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Session 11 Other Assurance Services
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
مراجعه النظم Information Systems Audit
Final HIPAA Security Rule
Lesson 16-Windows NT Security Issues
County HIPAA Review All Rights Reserved 2002.
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Presentation transcript:

Inventory Management & Administration System Tourism suite What is the PCI DSS? The PCI DSS stands for Payment Card Industry Data Security Standard. PCI-DSS is aiming to improve the quality of work and maintain the confidentiality, integrity and availability of data and Information. This comprehensive standard is intended to help organizations proactively protect customer account data. TeBAS is always seeking to bring the best of breed values to its clients hence a decision has been taken to comply and meet PCI- DSS application development requirement and implement it across IMAS systems. is proudly announcing that the following are the new features that are implemented across IMAS systems in order to meet the required and applied PCI-DSS: New Features Render all passwords unreadable during transmission and storage on all system components using strong cryptography. Control addition, deletion, and modification of user IDs, credentials, and other identifier objects.

Inventory Management & Administration System Tourism suite Set first-time passwords to a unique value for each user and change immediately after the first use. Remove/disable inactive user accounts at least every 90 days. Enable accounts used by vendors for remote maintenance only during the time period needed. Do not use group, shared, or generic accounts and passwords. Change user passwords at least every 90 days. Require a minimum password length of at least seven characters. Use passwords containing both numeric and alphabetic characters. Do not allow an individual to submit a new password that is the same as any of the last four passwords he or she has used. Limit repeated access attempts by locking out the user ID after not more than six attempts. Set the lockout duration to a minimum of 30 minutes or until administrator enables the user ID. If a session has been idle for more than 15 minutes, require the user to re-enter the password to re-activate the terminal. Implement automated audit trails for all system components to reconstruct the following events:

Tourism suite Inventory Management & Administration System All individual accesses to cardholder data. All actions taken by any individual with root or administrative privileges Access to all audit trails. Invalid logical access attempts. Use of identification and authentication mechanisms. Initialization of the audit logs. Record at least the following audit trail entries for all system components for each event : User identification. Type of event. Date and time. Success or failure indication. Origination of event. Identity or name of affected data, system component, or resource

Tourism suite TeBAS