SlideShare a Scribd company logo
1 of 1
Continuing with the PCI DSS requirements, this will research
and discuss the second set of PCI DSS “control objectives,”
most of which include numerous requirements:
4. Implement Strong Access Control Measures
a. Restrict access to cardholder data by business need-to-know
b. Identify and authenticate access to system components
c. Restrict physical access to cardholder data
5. Regularly Monitor and Test Networks
a. Track and monitor all access to network resources and
cardholder data
b. Regularly test security systems and processes
6. Maintain an Information Security Policy
a. Maintain a policy that addresses information security for all
personnel

More Related Content

More from bfingarjcmc

Purpose of AssignmentThe purpose of this assignment is to help.docx
Purpose of AssignmentThe purpose of this assignment is to help.docxPurpose of AssignmentThe purpose of this assignment is to help.docx
Purpose of AssignmentThe purpose of this assignment is to help.docx
bfingarjcmc
 
Purpose of AssignmentStudents begin to strategize on how a chang.docx
Purpose of AssignmentStudents begin to strategize on how a chang.docxPurpose of AssignmentStudents begin to strategize on how a chang.docx
Purpose of AssignmentStudents begin to strategize on how a chang.docx
bfingarjcmc
 
Purpose of AssignmentIn Week 2, students will employ the supply .docx
Purpose of AssignmentIn Week 2, students will employ the supply .docxPurpose of AssignmentIn Week 2, students will employ the supply .docx
Purpose of AssignmentIn Week 2, students will employ the supply .docx
bfingarjcmc
 
Purpose Comment the Discussion (Which theory speaks to your advan.docx
Purpose Comment the Discussion (Which theory speaks to your advan.docxPurpose Comment the Discussion (Which theory speaks to your advan.docx
Purpose Comment the Discussion (Which theory speaks to your advan.docx
bfingarjcmc
 
Purpose In the first assignment, students are given a scenario ab.docx
Purpose In the first assignment, students are given a scenario ab.docxPurpose In the first assignment, students are given a scenario ab.docx
Purpose In the first assignment, students are given a scenario ab.docx
bfingarjcmc
 
Purpose Discussion Thing to RememberAnswer this discussion w.docx
Purpose Discussion Thing to RememberAnswer this discussion w.docxPurpose Discussion Thing to RememberAnswer this discussion w.docx
Purpose Discussion Thing to RememberAnswer this discussion w.docx
bfingarjcmc
 
Purpose A Comment to Discussion Team DynamicsThing to Remember.docx
Purpose A Comment to Discussion Team DynamicsThing to Remember.docxPurpose A Comment to Discussion Team DynamicsThing to Remember.docx
Purpose A Comment to Discussion Team DynamicsThing to Remember.docx
bfingarjcmc
 
Public Writing EssayUsing the topic you selected in Week Three’s B.docx
Public Writing EssayUsing the topic you selected in Week Three’s B.docxPublic Writing EssayUsing the topic you selected in Week Three’s B.docx
Public Writing EssayUsing the topic you selected in Week Three’s B.docx
bfingarjcmc
 
Public Writing EssayUsing the topic you selected in Week Three.docx
Public Writing EssayUsing the topic you selected in Week Three.docxPublic Writing EssayUsing the topic you selected in Week Three.docx
Public Writing EssayUsing the topic you selected in Week Three.docx
bfingarjcmc
 
Public Relations - Read about the following Public Relations (PR) di.docx
Public Relations - Read about the following Public Relations (PR) di.docxPublic Relations - Read about the following Public Relations (PR) di.docx
Public Relations - Read about the following Public Relations (PR) di.docx
bfingarjcmc
 
Public corruption is generally viewed as an obstacle to the developm.docx
Public corruption is generally viewed as an obstacle to the developm.docxPublic corruption is generally viewed as an obstacle to the developm.docx
Public corruption is generally viewed as an obstacle to the developm.docx
bfingarjcmc
 
Public and Private PartnershipsVolunteers are a vital resource ava.docx
Public and Private PartnershipsVolunteers are a vital resource ava.docxPublic and Private PartnershipsVolunteers are a vital resource ava.docx
Public and Private PartnershipsVolunteers are a vital resource ava.docx
bfingarjcmc
 

More from bfingarjcmc (20)

Purpose of AssignmentThe purpose of this assignment is to help.docx
Purpose of AssignmentThe purpose of this assignment is to help.docxPurpose of AssignmentThe purpose of this assignment is to help.docx
Purpose of AssignmentThe purpose of this assignment is to help.docx
 
Purpose of AssignmentStudents begin to strategize on how a chang.docx
Purpose of AssignmentStudents begin to strategize on how a chang.docxPurpose of AssignmentStudents begin to strategize on how a chang.docx
Purpose of AssignmentStudents begin to strategize on how a chang.docx
 
Purpose of AssignmentStudents learn to understand associate and le.docx
Purpose of AssignmentStudents learn to understand associate and le.docxPurpose of AssignmentStudents learn to understand associate and le.docx
Purpose of AssignmentStudents learn to understand associate and le.docx
 
Purpose of AssignmentIn Week 2, students will employ the supply .docx
Purpose of AssignmentIn Week 2, students will employ the supply .docxPurpose of AssignmentIn Week 2, students will employ the supply .docx
Purpose of AssignmentIn Week 2, students will employ the supply .docx
 
Purpose Comment the Discussion (Which theory speaks to your advan.docx
Purpose Comment the Discussion (Which theory speaks to your advan.docxPurpose Comment the Discussion (Which theory speaks to your advan.docx
Purpose Comment the Discussion (Which theory speaks to your advan.docx
 
Purpose In the first assignment, students are given a scenario ab.docx
Purpose In the first assignment, students are given a scenario ab.docxPurpose In the first assignment, students are given a scenario ab.docx
Purpose In the first assignment, students are given a scenario ab.docx
 
Purpose Discussion Thing to RememberAnswer this discussion w.docx
Purpose Discussion Thing to RememberAnswer this discussion w.docxPurpose Discussion Thing to RememberAnswer this discussion w.docx
Purpose Discussion Thing to RememberAnswer this discussion w.docx
 
Publisher TableWrite a project to display the Publishers table f.docx
Publisher TableWrite a project to display the Publishers table f.docxPublisher TableWrite a project to display the Publishers table f.docx
Publisher TableWrite a project to display the Publishers table f.docx
 
Purpose A Comment to Discussion Team DynamicsThing to Remember.docx
Purpose A Comment to Discussion Team DynamicsThing to Remember.docxPurpose A Comment to Discussion Team DynamicsThing to Remember.docx
Purpose A Comment to Discussion Team DynamicsThing to Remember.docx
 
Public Writing EssayUsing the topic you selected in Week Three’s B.docx
Public Writing EssayUsing the topic you selected in Week Three’s B.docxPublic Writing EssayUsing the topic you selected in Week Three’s B.docx
Public Writing EssayUsing the topic you selected in Week Three’s B.docx
 
PUNISHMENT BY PREVENTION OF REMOVAL OF AN AVERSIVE CONDITIONPREV.docx
PUNISHMENT BY PREVENTION OF REMOVAL OF AN AVERSIVE CONDITIONPREV.docxPUNISHMENT BY PREVENTION OF REMOVAL OF AN AVERSIVE CONDITIONPREV.docx
PUNISHMENT BY PREVENTION OF REMOVAL OF AN AVERSIVE CONDITIONPREV.docx
 
Public Writing EssayUsing the topic you selected in Week Three.docx
Public Writing EssayUsing the topic you selected in Week Three.docxPublic Writing EssayUsing the topic you selected in Week Three.docx
Public Writing EssayUsing the topic you selected in Week Three.docx
 
Public Sector Pensions and Benefits Please respond to the followin.docx
Public Sector Pensions and Benefits Please respond to the followin.docxPublic Sector Pensions and Benefits Please respond to the followin.docx
Public Sector Pensions and Benefits Please respond to the followin.docx
 
Public Relations - Read about the following Public Relations (PR) di.docx
Public Relations - Read about the following Public Relations (PR) di.docxPublic Relations - Read about the following Public Relations (PR) di.docx
Public Relations - Read about the following Public Relations (PR) di.docx
 
Public RelationsAssignment 1 Social MarketingYou have been .docx
Public RelationsAssignment 1 Social MarketingYou have been .docxPublic RelationsAssignment 1 Social MarketingYou have been .docx
Public RelationsAssignment 1 Social MarketingYou have been .docx
 
Public officials at all levels of government are frequently criticiz.docx
Public officials at all levels of government are frequently criticiz.docxPublic officials at all levels of government are frequently criticiz.docx
Public officials at all levels of government are frequently criticiz.docx
 
Public Health Services Please respond to the followingAnalyze.docx
Public Health Services Please respond to the followingAnalyze.docxPublic Health Services Please respond to the followingAnalyze.docx
Public Health Services Please respond to the followingAnalyze.docx
 
Public health services are divided into four major categories an.docx
Public health services are divided into four major categories an.docxPublic health services are divided into four major categories an.docx
Public health services are divided into four major categories an.docx
 
Public corruption is generally viewed as an obstacle to the developm.docx
Public corruption is generally viewed as an obstacle to the developm.docxPublic corruption is generally viewed as an obstacle to the developm.docx
Public corruption is generally viewed as an obstacle to the developm.docx
 
Public and Private PartnershipsVolunteers are a vital resource ava.docx
Public and Private PartnershipsVolunteers are a vital resource ava.docxPublic and Private PartnershipsVolunteers are a vital resource ava.docx
Public and Private PartnershipsVolunteers are a vital resource ava.docx
 

Continuing with the PCI DSS requirements, this will research and dis

  • 1. Continuing with the PCI DSS requirements, this will research and discuss the second set of PCI DSS “control objectives,” most of which include numerous requirements: 4. Implement Strong Access Control Measures a. Restrict access to cardholder data by business need-to-know b. Identify and authenticate access to system components c. Restrict physical access to cardholder data 5. Regularly Monitor and Test Networks a. Track and monitor all access to network resources and cardholder data b. Regularly test security systems and processes 6. Maintain an Information Security Policy a. Maintain a policy that addresses information security for all personnel