StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information security in a real-world business or government agency - Research Paper/ - Case Study Example

Cite this document
Summary
Credit card companies handle private and sensitive information about customers; hence it has to follow various security policies. This case study focuses on credit card processing company CardSystems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Information security in a real-world business or government agency - Research Paper/ Case Study
Read Text Preview

Extract of sample "Information security in a real-world business or government agency - Research Paper/"

Download file to see previous pages

Later in 2005, Cardsystems implemented payment cardholder information (PCI) which was assembled by security standards council (SSC) to address the changing technology. With the advancement of wireless technology, the SCC added various guidelines to PCI to hamper data theft through wireless medium. The case will highlight the guidelines of having wireless security. The case also cites the importance of using open source security. Credit cards have become very popular and are being widely used by the consumers.

It enables the bearer of card to buy goods and services from retailers and merchants. With the boom in Internet marketing or e-business, credit cards have become important it is convenient and easier to buy from the Internet. The credit cards offer many benefits like credit rating, rewards for the use of the credit cards and are also a useful tool to manage expense. Examples of company offering credit cards are Visa, American express, Discover and MasterCard. They offer their services to banks and other businesses for the usage of credit cards.

Credit cards companies and businesses dealing with credit cards store important and sensitive information like social security number, birth date and home address. Hence, they are prime target by the hackers and are very vulnerable to data theft and data leak. To address the issue of information security, Visa and MasterCard had developed their own security standards in 2001 like Visa’s cardholder information security program (CISP) and MasterCard’s site data protection program (SDP). These programs were initiated for the protection of data and information in an effort to prevent credit-card data theft.

These programs had become a required criterion for businesses handling credit-card transactions from financial banks to universities (Stamp, 2005, Pg 172). The scandal of 40 million credit card numbers being stolen from CardSystems in June, 2005 rocked the world around. Analysts debated

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information security in a real-world business or government agency - Case Study”, n.d.)
Information security in a real-world business or government agency - Case Study. Retrieved from https://studentshare.org/miscellaneous/1558030-information-security-in-a-real-world-business-or-government-agency-research-paper-case-study
(Information Security in a Real-World Business or Government Agency - Case Study)
Information Security in a Real-World Business or Government Agency - Case Study. https://studentshare.org/miscellaneous/1558030-information-security-in-a-real-world-business-or-government-agency-research-paper-case-study.
“Information Security in a Real-World Business or Government Agency - Case Study”, n.d. https://studentshare.org/miscellaneous/1558030-information-security-in-a-real-world-business-or-government-agency-research-paper-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information security in a real-world business or government agency - Research Paper/ Case Study

Scope and Kinds of Cyber Security

These threats come in form of security concerns.... While it is an outer world where there is no restriction on anyone who may want to join the network of World Wide Web, it becomes imperative to create a security factor consideration which would enable safe operations.... Since all kinds of activities are being performed over the computer and internet, ranging from private data exchange to financial records, governmental records, other documents of national security, central databases and various other elements, in such cases it becomes important to establish a mechanism that would ensure safer operations on the internet....
22 Pages (5500 words) Research Paper

International Management: Rwanda

A king ruled it prior to colonization by Belgium (Central Intelligence agency 2013).... A rebel group that overthrew the then government restored order and the country is currently stable (Central Intelligence agency 2013).... The country stabilized from the civil war and joined commonwealth in the year 2009 and the United Nations' security council in 2013 (Central Intelligence agency 2013).... Kinyarwanda, French, and English are national languages (Central Intelligence agency 2013)....
4 Pages (1000 words) Research Paper

Information and Communication Technology

Regulation of ICT Sector According to Baldwin, "Regulation as an activity can be described as a discrete and identifiable, focused and sustained exercise aimed at controlling activities that are valuable to a community by public agency or government" (Baldwin and Cave, 1999).... Regulation may also be described as a deliberate set of commands, which are specific and take all forms of influence or social control, by a governing agency to control items that are valuable to the public (Baldwin and Cave, 1999)....
8 Pages (2000 words) Research Paper

Effects of Credit Rating Agencies

“Only because of the availability of clear, internationally accepted indicators of the risk of default were investors willing to invest in international securities—whether corporate or government bonds—whose credit quality they would have been virtually unable to assess on their own.... Although the global recession was a dampener to these investments, now with the global economy showing good signs of recovery, investment… However, the issue is, with investment opportunities that are available becoming more global and diverse in nature, both in the territories sense as well as business sectors sense, it has become difficult to decide not only which companies but also (Heakal, n....
8 Pages (2000 words) Research Paper

International Analysing Different Dimensions of Cyber-Warfare

In the modern world, every business operation is based on advanced technology.... Data transmission is a major aspect of the business world but cyber warfare leads to the exploitation of data.... International security is closely knitted with the approach of cyber warfare.... Increased connectivity has even facilitated security threats worldwide.... he major aim of this study is to analyze the implications of cyber warfare on international security....
15 Pages (3750 words) Research Paper

E-Government in Saudi Arabia

This article “E-government in Saudi Arabia” is dedicated to this phenomenon that is attracting the attention of politicians and economists.... This modern technology facilitates access to government information and services for officials, citizens, and business and increases governmental efficiency....  … Governments the world over are working on implementing E-government.... Al-Hashmi and his co-authors inform that E-government is not simply a matter of giving government administrators computers or automating old performances....
10 Pages (2500 words) Research Paper

Emerging Systemic Risks

It has also become a challenge for government entities and private sectors to effectively deal with the complex security threats of this century.... It is hoped that the findings from this research will be helpful to various stakeholders including governments, business organizations, and scholars and researchers.... security Management, on the other hand, is a field of management services that relate to the safety of information, safety, protection of information....
8 Pages (2000 words) Research Paper

Develop an Export Strategy for an Organisation

he exporter is supposed to request the airway bill from a particular airline agency for security purposes.... In addition, the Norway market has many competitors that also need government support; plan for the entry strategies with a widespread business plan to be encouraged for the impediments and competition.... This work called "Develop an Export Strategy for an Organisation" describes the beer business in Kenya, the theories of international trade, strategies for exporting, logistics, as well as ethics towards the recommendations....
7 Pages (1750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us