Skip to main content

The Evolution of PCI DSS

  • Chapter
  • First Online:
PCI DSS

Abstract

Many believe that the Payment Card Industry Data Security Standard (PCI DSS) began in December 2004. However, much like Darwin’s theory of evolution, the evolution of the PCI DSS controls framework has a much longer history.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.metmuseum.org/toah/works-of-art/1988.433.3/

  2. 2.

    www.digibarn.com/collections/small-items/charga-plate/index.html

  3. 3.

    www.theukcardsassociation.org.uk/history_of_cards/index.asp

  4. 4.

    www.timetoast.com/timelines/credit-card-in-1950

  5. 5.

    www.relativelyinteresting.com/evolution-credit-card-paper-plastic-virtual/

  6. 6.

    https://postalmuseum.si.edu/americasmailingindustry/American-Express.html

  7. 7.

    https://due.com/blog/digital-wallet-revolution/

  8. 8.

    https://worldpay.globalpaymentsreport.com/#/

  9. 9.

    www.emarketer.com/content/global-ecommerce-2019

  10. 10.

    www.ukfinance.org.uk/sites/default/files/uploads/pdf/UK-Finance-UK-Payment-Markets-Report-2019-SUMMARY.pdf

  11. 11.

    https://safeatlast.co/blog/data-breach-statistics/#gref

  12. 12.

    www.statista.com/statistics/273572/number-of-data-breaches-in-the-united-states-by-business/

  13. 13.

    www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-2018/consumer_sentinel_network_data_book_2018_0.pdf

  14. 14.

    www.worldpay.com/en-us/insights-hub/article/how-to-become-pci-compliant

  15. 15.

    www.theukcardsassociation.org.uk/security/Non_compliance_PCIDSS.asp

  16. 16.

    www.nationalgeographic.org/thisday/apr24/fall-troy/

  17. 17.

    www.romanarmy.net/Latearmy.shtml

  18. 18.

    www.sans.org/reading-room/whitepapers/basics/defense-in-depth-525

  19. 19.

    www.davidfroud.com/wp-content/uploads/2016/07/PCI-DSS-v1.0.pdf

  20. 20.

    https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41.pdf

  21. 21.

    ftp://ftp.sei.cmu.edu/pub/documents/00.reports/pdf/sim010.pdf.

  22. 22.

    www.giac.org/paper/gsec/1555/history-encryption/102877

  23. 23.

    https://pandorafms.com/blog/creeper-and-reaper/

  24. 24.

    https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-83.pdf

  25. 25.

    https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf

  26. 26.

    www.k9history.com/uk-royal-air-force-police-dog-history.htm

  27. 27.

    www.nap.edu/read/5116/chapter/3

  28. 28.

    https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-40.pdf

  29. 29.

    https://csrc.nist.gov/publications/detail/sp/800-40/rev-3/final

  30. 30.

    www.owasp.org/index.php/History_of_OWASP

  31. 31.

    www.esecurityplanet.com/network-security/how-was-sql-injection-discovered.html

  32. 32.

    www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf

  33. 33.

    www.pcisecuritystandards.org/documents/PCI-Secure-Software-Standard-v1_0.pdf?agreement=true&time=1576693614480

  34. 34.

    https://csrc.nist.gov/CSRC/media/Publications/white-paper/2019/06/07/mitigating-risk-of-software-vulnerabilities-with-ssdf/draft/documents/ssdf-for-mitigating-risk-of-software-vulns-draft.pdf

  35. 35.

    www.owasp.org/index.php/Top_10-2017_A1-Injection

  36. 36.

    https://threatpost.com/magecart-infestations-saturate-web/148911/

  37. 37.

    https://prezi.com/oqwyu-nb9yym/the-history-of-combination-locks-and-rotations/

  38. 38.

    https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-12.pdf

  39. 39.

    https://englishlegalhistory.wordpress.com/2013/05/30/history-of-burglary/

  40. 40.

    https://totalsecuritysummit.co.uk/industry-spotlight-secure-your-rfid-access-controls-against-card-cloning/

  41. 41.

    https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/378443/28_09_CCTV_OR_Manual2835.pdf

  42. 42.

    https://shop.hak5.org/collections/hak5-field-kits

  43. 43.

    www.wbdg.org/FFC/ARMYCOE/FIELDMAN/fm31930.pdf

  44. 44.

    www.sans.org/reading-room/whitepapers/logging/importance-logging-traffic-monitoring-information-security-1379

  45. 45.

    https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-42.pdf

  46. 46.

    https://cyber-defense.sans.org/resources/papers/gsec/implementation-methodology-information-security-management-system-to-comply-bs-7799-requi-104600

  47. 47.

    www.iso.org/standard/42103.html

  48. 48.

    www.britannica.com/event/Siege-of-Troy-1250-BCE

  49. 49.

    www.varonis.com/blog/cybersecurity-statistics/

  50. 50.

    www.tasgroup.eu/solutions/cashless-world/certifications/tas-pci-dss-white-paper-2017

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Jim Seaman

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Seaman, J. (2020). The Evolution of PCI DSS. In: PCI DSS. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5808-8_2

Download citation

Publish with us

Policies and ethics