PCI DSS Noncompliance: CardSystems Solutions Case Study
Verified
Added on 2023/06/03
|2
|925
|204
AI Summary
This lab reviews a case study on PCI DSS noncompliance by CardSystems Solutions, including an assessment of the auditor's findings, negligence in the case, and recommended security policies and controls. The consequences of data loss and mitigation techniques are also discussed.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
26 | LAB #3 Case Study on PCI DSS Noncompliance: CardSystems Solutions 6.What security policies do you recommend to help with monitoring, enforcing, and ensuring PCI DSS compliance? 7.What security controls and security countermeasures do you recommend for CardSystems Solutions to be in compliance with PCI DSS requirements? 8.What was the end result of the attack and security breach to CardSystems Solutions and its valuation? 9.What are the possible consequences associated with the data loss? 10.Who do you think is ultimately responsible for CardSystems Solutions’ lack of PCI DSS compliance? 11.What should CardSystems Solutions have done to mitigate possible SQL injections and data breaches on its credit card transaction-processing engine? 12.True or false: Although CardSystems Solutions had proper security controls and security countermeasures, it was not 100 percent PCI DSS-compliant because the company failed to properly implement ongoing monitoring and testing on its development and production systems. The implementation of proper security firewall for preventing any cyber attack and the constant updating of the anti-virus that are placed for detecting the entry of any malware in the systems. Security controls that is recommended for CardSystems Solutions for being in compliance with the PCI-DSS compliance is the implementation and utilisation of the firewalls. The security countermeasures that are recommended are the detection software for detecting the malware in the system. The company lost huge data of credit card of the customers from the database and the impact of this attack was that the reputation of the company was damaged so severely that the company almost went out of business. The possible consequence that are associated with the loss of data are the loss of trust among the company and the customers, huge capital loss that is required for retrieval of data, and the damage to the reputation of the companies that can make the company bankrupted. The responsible departments of the lack of the compliance of PCI-DSS are the IT department of the company, the senior manager staff and the technician department of the company. The possible mitigation techniques for the SQL injections and the data breaches are the implementation of rigid firewall in the system, the utilization of updated antivirus, the database created with proper prepared statements combined with parameterised queries and the use of stored procedures. True, the company did not properly implement the ongoing monitoring and the testing of the development and production systems, which led to the undetected SQL injection attack on the database of the company and the company suffered the loss of credit card data of the customers.