Description
Book SynopsisMust-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately.
Table of ContentsIntroduction xxiii
Part I Anatomy of Payment Application Vulnerabilities 1
Chapter 1 Processing Payment Transactions 3
Chapter 2 Payment Application Architecture 25
Chapter 3 PCI 55
Part II Attacks on Point of Sale Systems 91
Chapter 4 Turning 40 Digits into Gold 93
Chapter 5 Penetrating Security Free Zones 125
Chapter 6 Breaking into PCI-protected Areas 147
Part III Defense 165
Chapter 7 Cryptography in Payment Applications 167
Chapter 8 Protecting Cardholder Data 195
Chapter 9 Securing Application Code 219
Conclusion 249
Appendix A POS Vulnerability Rank Calculator 251
Appendix B Glossary 257
Index 265