Skip to main content

The Ripple Effect

  • Chapter
  • First Online:
PCI DSS

Abstract

In this book I have been a strong advocate of the PCI DSS integrated data security controls framework, its strong heritage built from other industry security controls and its effectiveness to defend your business against your ever-present threats. I am still amazed to hear of those payment card security businesses who

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.statista.com/statistics/753938/worldwide-enterprise-server-hourly-downtime-cost/

  2. 2.

    www.ntirety.com/calculating-the-real-cost-of-downtime-for-your-business/

  3. 3.

    www.iia.org.uk/resources/audit-committees/governance-of-risk-three-lines-of-defence/

  4. 4.

    First-line operational management has ownership, responsibility, and accountability for directly assessing, controlling, and mitigating risks.

  5. 5.

    www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html

  6. 6.

    www.gamcreative.com/

  7. 7.

    www.privacy-regulation.eu/en/article-32-security-of-processing-GDPR.htm

  8. 8.

    www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/pipeda-compliance-help/pipeda-compliance-and-training-tools/pipeda_sa_tool_200807/#principle7

  9. 9.

    www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other-Guides/Guide-to-Data-Protection-by-Design-for-ICT-Systems-(310519).pdf

  10. 10.

    https://sso.agc.gov.sg/Act/PDPA2012#P1VI-

  11. 11.

    www.isipp.com/resources/full-text-of-the-california-consumer-privacy-act-of-2018-ccpa/

  12. 12.

    www.oaic.gov.au/privacy/australian-privacy-principles-guidelines/chapter-11-app-11-security-of-personal-information/

  13. 13.

    https://identity.utexas.edu/assets/uploads/publications/CID_ITAP_Report_2019.pdf

  14. 14.

    www.ukfinance.org.uk/system/files/Fraud%20The%20Facts%202019%20-%20FINAL%20ONLINE.pdf

  15. 15.

    www.ftc.gov/reports/consumer-sentinel-network-data-book-2018

  16. 16.

    www.europol.europa.eu/newsroom/news/cybercrime-becoming-bolder-data-centre-of-crime-scene

  17. 17.

    www.ncsc.gov.uk/collection/10-steps-to-cyber-security?curPage=/collection/10-steps-to-cyber-security/the-10-steps/network-security

  18. 18.

    www.ncsc.gov.uk/collection/10-steps-to-cyber-security/the-10-steps/secure-configuration

  19. 19.

    www.fireeye.com/services/freeware/memoryze.html

  20. 20.

    www.groundlabs.com/

  21. 21.

    www.manageengine.com/data-security/index.html?topMenu

  22. 22.

    www.spirion.com/sensitive-data-discovery/

  23. 23.

    www.extrahop.com/products/security/

  24. 24.

    www.glasswire.com/

  25. 25.

    www.wireshark.org/

  26. 26.

    www.ssllabs.com/ssltest/

  27. 27.

    www.thesslstore.com/ssltools/ssl-checker.php

  28. 28.

    https://gf.dev/tls-test

  29. 29.

    www.wormly.com/test_ssl

  30. 30.

    www.digicert.com/help/

  31. 31.

    www.cybok.org/media/downloads/Malware__Attack_Technology_issue_1.0.pdf

  32. 32.

    https://threatpost.com/biggest-malware-threats-of-2019/151423/

  33. 33.

    www.eweek.com/security/webroots-listing-of-the-nastiest-malware-of-2019

  34. 34.

    www.pcisecuritystandards.org/documents/PCI-Secure-Software-Standard-v1_0.pdf?agreement=true&time=1547813202710

  35. 35.

    www.ncsc.gov.uk/collection/10-steps-to-cyber-security/the-10-steps/managing-user-privileges

  36. 36.

    https://1password.com/

  37. 37.

    www.dashlane.com/

  38. 38.

    www.lastpass.com/

  39. 39.

    https://haveibeenpwned.com/

  40. 40.

    https://haveibeenpwned.com/Passwords

  41. 41.

    https://howsecureismypassword.net/

  42. 42.

    www.theregister.co.uk/2014/04/25/kvm_crooks_jailed/

  43. 43.

    https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/

  44. 44.

    www.ncsc.gov.uk/collection/10-steps-to-cyber-security/the-10-steps/monitoring

  45. 45.

    https://content.fireeye.com/m-trends

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Jim Seaman

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Seaman, J. (2020). The Ripple Effect. In: PCI DSS. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5808-8_15

Download citation

Publish with us

Policies and ethics