SlideShare a Scribd company logo
1 of 11
Assignment 1
Assignment 1: Bottling Company Case Study<
Due Week 10 and worth 140 points
Imagine you are a manager at a major bottling company.
Customers have begun to complain that the bottles of the brand
of soda produced in your company contain less than the
advertised sixteen (16) ounces of product. Your boss wants to
solve the problem at hand and has asked you to investigate. You
have your employees pull thirty (30) bottles off the line at
random from all the shifts at the bottling plant. You ask your
employees to measure the amount of soda there is in each
bottle. Note: Use the data set provided by your instructor to
complete this assignment.
Bottle Number
Ounces
Bottle Number
Ounces
Bottle Number
Ounces
1
14.23
11
15.77
21
16.23
2
14.32
12
15.80
22
16.25
3
14.98
13
15.82
23
16.31
4
15.00
14
15.87
24
16.32
5
15.11
15
15.98
25
16.34
6
15.21
16
16.00
26
16.46
7
15.42
17
16.02
27
16.47
8
15.47
18
16.05
28
16.51
9
15.65
19
16.21
29
16.91
10
15.74
20
16.21
30
16.96
Write a two to three (2-3) page report in which you:
1. Calculate the mean, median, and standard deviation for
ounces in the bottles.
2. Construct a 95% Confidence Interval for the ounces in the
bottles.
3. Conduct a hypothesis test to verify if the claim that a bottle
contains less than sixteen (16) ounces is supported. Clearly
state the logic of your test, the calculations, and the conclusion
of your test.
4. Provide the following discussion based on the conclusion of
your test:
a. If you conclude that there are less than sixteen (16) ounces in
a bottle of soda, speculate on three (3) possible causes. Next,
suggest the strategies to avoid the deficit in the future.
Or
b. If you conclude that the claim of less soda per bottle is not
supported or justified, provide a detailed explanation to your
boss about the situation. Include your speculation on the
reason(s) behind the claim, and recommend one (1) strategy
geared toward mitigating this issue in the future.
Contents
PCI Compliance
Effectiveness of PCI
Life cycle of PCI
Key business process of PCI
PCI Security Standards
PCI – DSS (Payment Card Industry – Digital Security
Standards)
PCI Compliance
Do not use vendor-supplied defaults for system passwords and
other security parameters.
Protect stored cardholder data.
Encrypt transmission of cardholder data across open, public
networks.
Use and regularly update anti-virus software.
Develop and maintain secure systems and applications.
Restrict access to cardholder data by business need-to-know.
Assign a unique ID to each person with computer access.
Restrict physical access to cardholder data.
Track and monitor all access to network resources and
cardholder data.
Regularly test security systems and processes.
Maintain a security policy and ensure that all personnel are
aware of it.
What is PCI DSS compliance?
The Payment Card Industry Data Security Standard (PCI DSS)
refers to payment security standards that ensure all sellers
safely and securely accept, store, process, and transmit
cardholder data (also known as your customers’ credit card
information) during a credit card transaction.
Any merchant with a merchant ID that accepts payment cards
must follow these PCI-compliance regulations to protect against
data breaches. The requirements range from establishing data
security policies for your business and employees to removing
card data from your processing system and payment terminals.
Effectiveness of PCI
Increased awareness and general concerns over data privacy
Significant fines and penalties that can be imposed by payment
card brands
Potential reputation and brand damage, leading to loss of
revenue
Concerns over civil liability resulting from customer identity
theft
Industry peer pressure
Proposed changes to the Privacy Act around mandatory
disclosure of breaches
Alignment with corporate risk management guidelines
Life cycle of PCI
Key business process of PCI
payment Card industry Participants
Before you can understand the process of a payment card
industry, it’s best first to familiarize yourself with the key
players involved:
Cardholder
Merchant
Acquiring Bank/Merchant’s Bank
Acquiring Processor/Service Provider
Payment Card Network/Association Member
Issuing Bank/Payment Card Issuer
Payment Card Transaction Process
Authorization
Authentication
Clearing & Settlement
payment Card Processing Fees & Costs
Merchant Discount Rate
Interchange Fee
Assessments
Markups
Chargebacks
When a payment Card Transaction Gets Declined
Incorrect payment card number or expiration date
Insufficient funds
Some payment card companies reject international charges
The issuing bank or payment card company experienced
technical issues while your transaction was being processed
If the customer made a large number of online purchases within
a short period of time, some banks will reject several of the
charges as a fraud-prevention measure
Why It's Important
Credit card fraud in the US is at an all-time high. The PCI DSS
standard establishes a framework by which organizations can
protect their cardholder data environment. By complying with
PCI requirements, merchants and service providers can reduce
the risk of a breach, gain competitive advantage, and increase
their credibility.
Our PCI engagements focus on managing the full life cycle of
our client’s certification process for their cardholder data
environment. Compliance Point offers a full suite of services to
assist organizations with all aspects of their compliance effort.
PCI DSS
The PCI Data Security Standard applies to major credit card
providers, and is intended to protect cardholder data
PCI PA-DSS
The Payment Application Data Security Standard applies to
software vendors and others who develop payment applications
that store, process, or transmit cardholder data as part of
authorization or settlement, where these payment applications
are sold, distributed, or licensed to third parties.
Point-to-Point Encryption
Point-to-Point Encryption, also known as end-to-end encryption,
is an emerging technology that is used to protect sensitive credit
card data from point of swipe, while in transit, all the way to
the payment processor. This type of protection is critical as
hackers increasingly focus on stealing credit card data while it
is in transit. Compliance Point is one of a very select group of
PCI compliance certification firms authorized to certify to Point
to Point Encryption standards.
Experian Independent 3rd Party Assessment
it is an annual assessment of Experian's 3rd Party Processors'
ability to protect Experian's Personally Identifiable Information
data. If you are a company processing, storing, or transmitting
Personally Identifiable Information provided by Experian, you
may be required to have your systems assessed to determine
how well you are protecting this information externally and
internally from unauthorized users.
PCI – DSS (Payment Card Industry – Digital Security
Standards):
Developed to improve card holder data security to help prevent
payment card fraud.
Created by 4 major payment cards brand – Visa, MasterCard,
Discover & American Express.
Includes security assessment procedures company must comply
with annually.
Requires employees to keep payment card information
confidential and secure.
To provide security requirements allowing flexibility to
implement and customize security measures of payment account
data security.
References:
Odysseas Papadimitriou, Apr 2, 2009 How Credit Card
Transaction Processing Works: Steps, Fees & Participants
Retrieved on 05/21/2018 from https://wallethub.com/edu/credit-
card-transaction/25511/
Retrieved on 05/21/2018 from
https://chargebacks911.com/knowledge- base/the-lifecycle-of-
a-credit-card-purchase/
Retrieved on 05/21/2018 from
https://www.pwc.com.au/consulting/assets/risk-
controls/complianceburdenoropportunity.pdf
Retrieved on 05/21/2018 from
http://www.compliancepoint.com/pci-security-standards-audits
Retrieved on 05/21/2018 from
https://squareup.com/guides/pci-compliance
Assignment 1Assignment 1 Bottling Company Case StudyDue Week.docx

More Related Content

Similar to Assignment 1Assignment 1 Bottling Company Case StudyDue Week.docx

Merchant Services Audit 03 2011
Merchant Services Audit   03 2011Merchant Services Audit   03 2011
Merchant Services Audit 03 2011carolta555
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminardlinehan2
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxgealehegn
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation servicesTariq Juneja
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASISDermot Clarke
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link businessMike Shelah
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCIKelly Lam
 
Introduction To SAQ 4 U
Introduction To SAQ 4 UIntroduction To SAQ 4 U
Introduction To SAQ 4 URAlcala65
 
PCI Compliance 101
PCI Compliance 101PCI Compliance 101
PCI Compliance 101pgalletta
 
PCI Compliance (for developers)
PCI Compliance (for developers)PCI Compliance (for developers)
PCI Compliance (for developers)Maksim Djackov
 
Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010Donald E. Hester
 
Payment Card Industry Introduction CMTA APR 2010
Payment Card Industry Introduction CMTA APR 2010Payment Card Industry Introduction CMTA APR 2010
Payment Card Industry Introduction CMTA APR 2010Donald E. Hester
 
Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010Donald E. Hester
 
Introduction to PCI APR 2010
Introduction to PCI APR 2010Introduction to PCI APR 2010
Introduction to PCI APR 2010Donald E. Hester
 
PCI Compliance for Community Colleges @One CISOA 2011
PCI Compliance for Community Colleges @One CISOA 2011PCI Compliance for Community Colleges @One CISOA 2011
PCI Compliance for Community Colleges @One CISOA 2011Donald E. Hester
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standardsallychiu
 

Similar to Assignment 1Assignment 1 Bottling Company Case StudyDue Week.docx (20)

Merchant Services Audit 03 2011
Merchant Services Audit   03 2011Merchant Services Audit   03 2011
Merchant Services Audit 03 2011
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
What Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSS
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminar
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptx
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation services
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link business
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCI
 
Introduction To SAQ 4 U
Introduction To SAQ 4 UIntroduction To SAQ 4 U
Introduction To SAQ 4 U
 
PCI Compliance 101
PCI Compliance 101PCI Compliance 101
PCI Compliance 101
 
PCI Compliance Process
PCI Compliance ProcessPCI Compliance Process
PCI Compliance Process
 
PCI Compliance (for developers)
PCI Compliance (for developers)PCI Compliance (for developers)
PCI Compliance (for developers)
 
Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010
 
Payment Card Industry Introduction CMTA APR 2010
Payment Card Industry Introduction CMTA APR 2010Payment Card Industry Introduction CMTA APR 2010
Payment Card Industry Introduction CMTA APR 2010
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010
 
Introduction to PCI APR 2010
Introduction to PCI APR 2010Introduction to PCI APR 2010
Introduction to PCI APR 2010
 
PCI Compliance for Community Colleges @One CISOA 2011
PCI Compliance for Community Colleges @One CISOA 2011PCI Compliance for Community Colleges @One CISOA 2011
PCI Compliance for Community Colleges @One CISOA 2011
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
 

More from trippettjettie

1000 Words Research several organizations where you would like t.docx
1000 Words Research several organizations where you would like t.docx1000 Words Research several organizations where you would like t.docx
1000 Words Research several organizations where you would like t.docxtrippettjettie
 
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docxtrippettjettie
 
1004.1.8 Multicultural Empires and the New World (through 15.docx
1004.1.8  Multicultural Empires and the New World (through 15.docx1004.1.8  Multicultural Empires and the New World (through 15.docx
1004.1.8 Multicultural Empires and the New World (through 15.docxtrippettjettie
 
10.1Find the measure of the complement of the angle.1) Find the .docx
10.1Find the measure of the complement of the angle.1) Find the .docx10.1Find the measure of the complement of the angle.1) Find the .docx
10.1Find the measure of the complement of the angle.1) Find the .docxtrippettjettie
 
100-150 words per bulletHow will I use influence and positive ta.docx
100-150 words per bulletHow will I use influence and positive ta.docx100-150 words per bulletHow will I use influence and positive ta.docx
100-150 words per bulletHow will I use influence and positive ta.docxtrippettjettie
 
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docxtrippettjettie
 
10 points response is submitted, but it is incomplete or does n.docx
10 points response is submitted, but it is incomplete or does n.docx10 points response is submitted, but it is incomplete or does n.docx
10 points response is submitted, but it is incomplete or does n.docxtrippettjettie
 
10 Learning & Leading with Technology February 2012The .docx
10 Learning & Leading with Technology  February 2012The .docx10 Learning & Leading with Technology  February 2012The .docx
10 Learning & Leading with Technology February 2012The .docxtrippettjettie
 
10 Leadership Challengesand Opportunities R-diger Wittmann.docx
10 Leadership Challengesand Opportunities R-diger Wittmann.docx10 Leadership Challengesand Opportunities R-diger Wittmann.docx
10 Leadership Challengesand Opportunities R-diger Wittmann.docxtrippettjettie
 
10 page APA format research methodology paper about the National.docx
10 page APA format research methodology paper about the National.docx10 page APA format research methodology paper about the National.docx
10 page APA format research methodology paper about the National.docxtrippettjettie
 
10 Sentence minumumWatch the video, Condition of Educa.docx
10 Sentence minumumWatch the video, Condition of Educa.docx10 Sentence minumumWatch the video, Condition of Educa.docx
10 Sentence minumumWatch the video, Condition of Educa.docxtrippettjettie
 
1000 WordsUtopias are envisioned societies where human beings li.docx
1000 WordsUtopias are envisioned societies where human beings li.docx1000 WordsUtopias are envisioned societies where human beings li.docx
1000 WordsUtopias are envisioned societies where human beings li.docxtrippettjettie
 
100 word minimum per question.Chapter 171. Identify and .docx
100 word minimum per question.Chapter 171. Identify and .docx100 word minimum per question.Chapter 171. Identify and .docx
100 word minimum per question.Chapter 171. Identify and .docxtrippettjettie
 
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docxtrippettjettie
 
100 Original Work.Graduate Level Writing Required.DUE Satu.docx
100 Original Work.Graduate Level Writing Required.DUE Satu.docx100 Original Work.Graduate Level Writing Required.DUE Satu.docx
100 Original Work.Graduate Level Writing Required.DUE Satu.docxtrippettjettie
 
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docxtrippettjettie
 
100 Original Work.Graduate Level Writing Required.DUE Frid.docx
100 Original Work.Graduate Level Writing Required.DUE Frid.docx100 Original Work.Graduate Level Writing Required.DUE Frid.docx
100 Original Work.Graduate Level Writing Required.DUE Frid.docxtrippettjettie
 
100 Guaranteed No PlagiarismPlease read all the instructions .docx
100 Guaranteed No PlagiarismPlease read all the instructions .docx100 Guaranteed No PlagiarismPlease read all the instructions .docx
100 Guaranteed No PlagiarismPlease read all the instructions .docxtrippettjettie
 
10-K 1 f12312012-10k.htm 10-K .docx
10-K 1 f12312012-10k.htm 10-K                               .docx10-K 1 f12312012-10k.htm 10-K                               .docx
10-K 1 f12312012-10k.htm 10-K .docxtrippettjettie
 
100 Original Work.Graduate Level Writing Required.DUE .docx
100 Original Work.Graduate Level Writing Required.DUE .docx100 Original Work.Graduate Level Writing Required.DUE .docx
100 Original Work.Graduate Level Writing Required.DUE .docxtrippettjettie
 

More from trippettjettie (20)

1000 Words Research several organizations where you would like t.docx
1000 Words Research several organizations where you would like t.docx1000 Words Research several organizations where you would like t.docx
1000 Words Research several organizations where you would like t.docx
 
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
100 wordsChapter 14 Theoretical Basis of CommunityPublic Heal.docx
 
1004.1.8 Multicultural Empires and the New World (through 15.docx
1004.1.8  Multicultural Empires and the New World (through 15.docx1004.1.8  Multicultural Empires and the New World (through 15.docx
1004.1.8 Multicultural Empires and the New World (through 15.docx
 
10.1Find the measure of the complement of the angle.1) Find the .docx
10.1Find the measure of the complement of the angle.1) Find the .docx10.1Find the measure of the complement of the angle.1) Find the .docx
10.1Find the measure of the complement of the angle.1) Find the .docx
 
100-150 words per bulletHow will I use influence and positive ta.docx
100-150 words per bulletHow will I use influence and positive ta.docx100-150 words per bulletHow will I use influence and positive ta.docx
100-150 words per bulletHow will I use influence and positive ta.docx
 
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
10 Pages. Due in 36 hours. No Plagiarism.  This is an arti.docx
 
10 points response is submitted, but it is incomplete or does n.docx
10 points response is submitted, but it is incomplete or does n.docx10 points response is submitted, but it is incomplete or does n.docx
10 points response is submitted, but it is incomplete or does n.docx
 
10 Learning & Leading with Technology February 2012The .docx
10 Learning & Leading with Technology  February 2012The .docx10 Learning & Leading with Technology  February 2012The .docx
10 Learning & Leading with Technology February 2012The .docx
 
10 Leadership Challengesand Opportunities R-diger Wittmann.docx
10 Leadership Challengesand Opportunities R-diger Wittmann.docx10 Leadership Challengesand Opportunities R-diger Wittmann.docx
10 Leadership Challengesand Opportunities R-diger Wittmann.docx
 
10 page APA format research methodology paper about the National.docx
10 page APA format research methodology paper about the National.docx10 page APA format research methodology paper about the National.docx
10 page APA format research methodology paper about the National.docx
 
10 Sentence minumumWatch the video, Condition of Educa.docx
10 Sentence minumumWatch the video, Condition of Educa.docx10 Sentence minumumWatch the video, Condition of Educa.docx
10 Sentence minumumWatch the video, Condition of Educa.docx
 
1000 WordsUtopias are envisioned societies where human beings li.docx
1000 WordsUtopias are envisioned societies where human beings li.docx1000 WordsUtopias are envisioned societies where human beings li.docx
1000 WordsUtopias are envisioned societies where human beings li.docx
 
100 word minimum per question.Chapter 171. Identify and .docx
100 word minimum per question.Chapter 171. Identify and .docx100 word minimum per question.Chapter 171. Identify and .docx
100 word minimum per question.Chapter 171. Identify and .docx
 
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
100 wordsCase Study Chapter 17 Being Prepared Impact of D.docx
 
100 Original Work.Graduate Level Writing Required.DUE Satu.docx
100 Original Work.Graduate Level Writing Required.DUE Satu.docx100 Original Work.Graduate Level Writing Required.DUE Satu.docx
100 Original Work.Graduate Level Writing Required.DUE Satu.docx
 
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
100 Blue Ravine RoadFolsom, CA 95630916-932-1300www.erep.docx
 
100 Original Work.Graduate Level Writing Required.DUE Frid.docx
100 Original Work.Graduate Level Writing Required.DUE Frid.docx100 Original Work.Graduate Level Writing Required.DUE Frid.docx
100 Original Work.Graduate Level Writing Required.DUE Frid.docx
 
100 Guaranteed No PlagiarismPlease read all the instructions .docx
100 Guaranteed No PlagiarismPlease read all the instructions .docx100 Guaranteed No PlagiarismPlease read all the instructions .docx
100 Guaranteed No PlagiarismPlease read all the instructions .docx
 
10-K 1 f12312012-10k.htm 10-K .docx
10-K 1 f12312012-10k.htm 10-K                               .docx10-K 1 f12312012-10k.htm 10-K                               .docx
10-K 1 f12312012-10k.htm 10-K .docx
 
100 Original Work.Graduate Level Writing Required.DUE .docx
100 Original Work.Graduate Level Writing Required.DUE .docx100 Original Work.Graduate Level Writing Required.DUE .docx
100 Original Work.Graduate Level Writing Required.DUE .docx
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Assignment 1Assignment 1 Bottling Company Case StudyDue Week.docx

  • 1. Assignment 1 Assignment 1: Bottling Company Case Study< Due Week 10 and worth 140 points Imagine you are a manager at a major bottling company. Customers have begun to complain that the bottles of the brand of soda produced in your company contain less than the advertised sixteen (16) ounces of product. Your boss wants to solve the problem at hand and has asked you to investigate. You have your employees pull thirty (30) bottles off the line at random from all the shifts at the bottling plant. You ask your employees to measure the amount of soda there is in each bottle. Note: Use the data set provided by your instructor to complete this assignment. Bottle Number Ounces Bottle Number Ounces Bottle Number Ounces 1 14.23 11
  • 5. 16.21 30 16.96 Write a two to three (2-3) page report in which you: 1. Calculate the mean, median, and standard deviation for ounces in the bottles. 2. Construct a 95% Confidence Interval for the ounces in the bottles. 3. Conduct a hypothesis test to verify if the claim that a bottle contains less than sixteen (16) ounces is supported. Clearly state the logic of your test, the calculations, and the conclusion of your test. 4. Provide the following discussion based on the conclusion of your test: a. If you conclude that there are less than sixteen (16) ounces in a bottle of soda, speculate on three (3) possible causes. Next, suggest the strategies to avoid the deficit in the future. Or b. If you conclude that the claim of less soda per bottle is not supported or justified, provide a detailed explanation to your boss about the situation. Include your speculation on the reason(s) behind the claim, and recommend one (1) strategy geared toward mitigating this issue in the future. Contents PCI Compliance Effectiveness of PCI Life cycle of PCI Key business process of PCI
  • 6. PCI Security Standards PCI – DSS (Payment Card Industry – Digital Security Standards) PCI Compliance Do not use vendor-supplied defaults for system passwords and other security parameters. Protect stored cardholder data. Encrypt transmission of cardholder data across open, public networks. Use and regularly update anti-virus software. Develop and maintain secure systems and applications. Restrict access to cardholder data by business need-to-know. Assign a unique ID to each person with computer access. Restrict physical access to cardholder data. Track and monitor all access to network resources and cardholder data. Regularly test security systems and processes. Maintain a security policy and ensure that all personnel are aware of it. What is PCI DSS compliance? The Payment Card Industry Data Security Standard (PCI DSS) refers to payment security standards that ensure all sellers safely and securely accept, store, process, and transmit
  • 7. cardholder data (also known as your customers’ credit card information) during a credit card transaction. Any merchant with a merchant ID that accepts payment cards must follow these PCI-compliance regulations to protect against data breaches. The requirements range from establishing data security policies for your business and employees to removing card data from your processing system and payment terminals. Effectiveness of PCI Increased awareness and general concerns over data privacy Significant fines and penalties that can be imposed by payment card brands Potential reputation and brand damage, leading to loss of revenue Concerns over civil liability resulting from customer identity theft Industry peer pressure Proposed changes to the Privacy Act around mandatory disclosure of breaches Alignment with corporate risk management guidelines Life cycle of PCI Key business process of PCI payment Card industry Participants Before you can understand the process of a payment card industry, it’s best first to familiarize yourself with the key players involved: Cardholder Merchant Acquiring Bank/Merchant’s Bank
  • 8. Acquiring Processor/Service Provider Payment Card Network/Association Member Issuing Bank/Payment Card Issuer Payment Card Transaction Process Authorization Authentication Clearing & Settlement payment Card Processing Fees & Costs Merchant Discount Rate Interchange Fee Assessments Markups Chargebacks When a payment Card Transaction Gets Declined Incorrect payment card number or expiration date Insufficient funds Some payment card companies reject international charges The issuing bank or payment card company experienced technical issues while your transaction was being processed If the customer made a large number of online purchases within a short period of time, some banks will reject several of the charges as a fraud-prevention measure Why It's Important Credit card fraud in the US is at an all-time high. The PCI DSS standard establishes a framework by which organizations can protect their cardholder data environment. By complying with
  • 9. PCI requirements, merchants and service providers can reduce the risk of a breach, gain competitive advantage, and increase their credibility. Our PCI engagements focus on managing the full life cycle of our client’s certification process for their cardholder data environment. Compliance Point offers a full suite of services to assist organizations with all aspects of their compliance effort. PCI DSS The PCI Data Security Standard applies to major credit card providers, and is intended to protect cardholder data PCI PA-DSS The Payment Application Data Security Standard applies to software vendors and others who develop payment applications that store, process, or transmit cardholder data as part of authorization or settlement, where these payment applications are sold, distributed, or licensed to third parties. Point-to-Point Encryption Point-to-Point Encryption, also known as end-to-end encryption, is an emerging technology that is used to protect sensitive credit card data from point of swipe, while in transit, all the way to the payment processor. This type of protection is critical as hackers increasingly focus on stealing credit card data while it is in transit. Compliance Point is one of a very select group of PCI compliance certification firms authorized to certify to Point to Point Encryption standards. Experian Independent 3rd Party Assessment it is an annual assessment of Experian's 3rd Party Processors' ability to protect Experian's Personally Identifiable Information data. If you are a company processing, storing, or transmitting Personally Identifiable Information provided by Experian, you may be required to have your systems assessed to determine how well you are protecting this information externally and internally from unauthorized users.
  • 10. PCI – DSS (Payment Card Industry – Digital Security Standards): Developed to improve card holder data security to help prevent payment card fraud. Created by 4 major payment cards brand – Visa, MasterCard, Discover & American Express. Includes security assessment procedures company must comply with annually. Requires employees to keep payment card information confidential and secure. To provide security requirements allowing flexibility to implement and customize security measures of payment account data security. References: Odysseas Papadimitriou, Apr 2, 2009 How Credit Card Transaction Processing Works: Steps, Fees & Participants Retrieved on 05/21/2018 from https://wallethub.com/edu/credit- card-transaction/25511/ Retrieved on 05/21/2018 from https://chargebacks911.com/knowledge- base/the-lifecycle-of- a-credit-card-purchase/ Retrieved on 05/21/2018 from https://www.pwc.com.au/consulting/assets/risk- controls/complianceburdenoropportunity.pdf Retrieved on 05/21/2018 from http://www.compliancepoint.com/pci-security-standards-audits Retrieved on 05/21/2018 from https://squareup.com/guides/pci-compliance