Discussion boards are collaborative learning experiences. Therefore, the student will answer questions in response to the provided prompt for each forum. The student must submit a thread of at least 250 words that completely answers the question(s) for each forum.
2.In addition to the thread, the student must also reply to at least 2 classmates’ threads. Each reply must be at least 100 words. The student must use complete paragraphs, proper APA formatting, and cite information that is not his/her own.
Main Discussion Board Post-
Minimum 250 words (-5 for less than 250 words)
Must have a reference from the book with a citation or a reference from the Bible (-5 if no Bible verse AND version).
Each reply must have a min 100 words (-5 for less than 100 words)
Must have two DB replies (-3 for each missing reply)
Each reply must have a Bible verse with the Edition of the Bible (-5 for each reply missing a Bible verse with Bible version
Each thread is due by 11:59 p.m. (ET) on Thursday of the assigned module/week and replies are due by 11:59 p.m. (ET) on Monday of the same module/week, with the exception of Module/Week 8. In Module/Week 8, your thread is due by 11:59 p.m. (ET) on Thursday and replies are due by 11:59 p.m. (ET) on Friday.
Part 1 Discussion Board Question
Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2 types of industries (e.g., Internet service providers, health care, education) and describe which of the latter standard(s) should be considered in that industry. Defend your response.
Post your thread by 11:59 p.m. (ET) on Thursday, and your 2 replies by 11:59 p.m. (ET) on Monday.
Part 2: Student Threads ( Must reply to each individually 100 words each)
Payment Card Industry (PCI)
Top of Form
Payment Card Industry (PCI) is a standard developed by the major card providers in an attempt to address public concern about hacks of credit cards. One of the first poster children of credit card hacks was the TJ Max hack in 2007, when 94 million credit cards were stolen (Chickowski, 2008). Due to that event and others, the big five credit card companies: Visa, Mastercard, American Express, Discover, and JCB got together to form the Security Standards Council (SSC). The primary outcome of the SSC, was the development of the Data Security Standard (DSS), which outlines several important security standards for processing and holding credit card data. The PCI DSS has 12 sections, but has been organized into 6 sections, covering the following security concepts: build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks, maintain an information security policy (Johnson, 2015). The standard has stood the test of time and today serves as a force against hackers that would otherwise have easy access to credit card data.
The PCI DSS standard applies to any entity that produces, processes, or stores credit card data. However, other standards apply to other industries. For example, the Healthcare Insurance Portability and Accountability Act (HIPAA) applies to any entity that produces, transmits, or stores Protected Healthcare Information (PHI). The Federal Information Security Management Act (FISMA) applies to all U.S. Government agencies. There are hundreds of other standards and some organizations have to comply with multiple standards at once.
Chickowski, E. (2008). TJX: Anatomy of a massive breach. Baseline, (81), 28–29.
Johnson, R. (2015). Security Policies and Implementation Issues (2 edition). Burlington, MA: Jones & Bartlett Learning.
Bottom of Form
Thread 2 Nathanael Gentry Forum 4: Fundamental Policies
Top of Form
The Payment Card Industry Data Security Standard (PCI DSS), currently in version 3.0 (2015), represents the efforts of major credit card companies (Visa, MasterCard, American Express) to protect payment information transmitted over the Internet (Johnson, 2015, p. 71). Since nearly all Internet industries (including all mentioned in the prompt) can accept online payment, all much maintain PCI DSS complaint systems. As Johnson (2015, p. 71) notes, PCI DSS mandates security policies and compliance validation from e-commerce companies; noncompliance can provoke punitive charges from the companies and even revocation of card-handling authorization. The standard ensures security through two facets: encryption and processing isolation (segmentation). PCI DSS requires at-rest encryption—the persistent encryption of data even in nonvolatile storage. Moreover, the standard recommends establishing entire compliant network segments; for applications that cannot isolate the payment-processing systems, all systems on the segment must comply with the standard (Johnson, 2015, p. 71).
While PCI DSS represents a private industry’s self-regulation, the Federal Information Security Management Act (FISMA) provides the government’s own regulation of its information security (Johnson, 2015, pp. 58-59). Standards developed by NIST concern inventory management, risk analysis, system security certification, and audits. Since private corporations handling government data must also comply with FISMA, defense contractors (e.g. Lockheed Martin, BWXT) and think-tanks (e.g. RAND) would face such requirements.
Finally, as Johnson (2015, pp. 62-63) notes, Control Objective for Information and Related Technology (COBIT) provides a library of security controls for corporate compliance with the Sarbanes-Oakley Act (SOX). Indeed, COBIT stretches far across private-sector regulations—including auditing, product and policy lifecycle management, and risk management. Since COBIT has international application, global industries like investment firms and technology companies should implement policies from its vast library.
Johnson, R. (2015). Security policies and implementation issues (Second edition). Burlington, MA: Jones & Bartlett Learning.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). Computer Science. Retrieved from https://myassignmenthelp.com/free-samples/csis-340-computer-science/online-payment-mode.html.
"Computer Science." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/csis-340-computer-science/online-payment-mode.html.
My Assignment Help (2020) Computer Science [Online]. Available from: https://myassignmenthelp.com/free-samples/csis-340-computer-science/online-payment-mode.html
[Accessed 01 March 2021].
My Assignment Help. 'Computer Science' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/csis-340-computer-science/online-payment-mode.html> accessed 01 March 2021.
My Assignment Help. Computer Science [Internet]. My Assignment Help. 2020 [cited 01 March 2021]. Available from: https://myassignmenthelp.com/free-samples/csis-340-computer-science/online-payment-mode.html.
For years, MyAssignmenthelp.com has been operating as one of the cheap assignment help providers in the USA. We are one of the best college paper writing services that keep service price minimal. We do not let the affordability of our service to hamper the standard of our work. We have separate teams of experts to provide report writing help . At MyAssigenmnthelp.com, we believe in earning credibility, so students can pay for assignments only after getting satisfied solutions. Tough assignments bother you? Trust us with your project. You will not regret paying us to write assignments for you.
Answer: Since time immemorial, the Maori tribes have experienced major renaissance and as a result of this, there are existing claims in relation to past grievances and the rights regarding self-governance. The Constitution of the Maori tribes has been developed in a way for the purpose of protecting them from acts of violence. It is evident that, the individuals belonging to the Maori culture have distinct system, customs and culture of their...Read More
Answer: This report entails the analysis of the data set from the survey which was conducted among the employees from TechnoMart regarding the association between the variation in working hours and the employees at TechnoMart depending on specific factors of change such as the occupation, union membership, and the employee job satisfaction. This report is sub-divided into different parts with the aim of addressing some of the critical concerns...Read More
Answer: Describe an ideal organization and occupation where you would you like to work. An ideal organization is a place where each individual is allowed to exhibit their strengths, which is working together in coordination with the other team member, in such a way that the team work should be given the highest priority (Armson & Whiteley, 2010). Also, the organization should provide its employee, the freedom to express their views and wo...Read More
Answer: Human computer interaction is an extensive topic and it needs to be handled carefully adhering to all the principles and concepts that surrounds it. Human factors that are applicable while designing a website or a mobile application must be put in to consideration to avoid loss of customers or clients. The loss of clients and customers may have otherwise occurred due to poorly designed websites that are not user friendly enough. Some o...Read More
Answer: Explain the role of reason within theology as it seeks to deepen its understanding of the mysteries of faith Foster, (2018) argues that, Christian spiritual value means what leads to action, event, belief or having a firm standing concerning an issue. It can also be regarded as tangible proof that will make an individual come to believe or understand a certain issue. I...Read More
Just share requirement and get customized Solution.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
great work as per expectation. Referencing done right. no plagiarism. no similarity found
My grade is high in this course after making some corrections, i email my assignment.com for additional materials and the assignment was done to my satisfaction. Bravo to the job well done from the professional tutors I\'m very happy. unlike other ...
Thank you for your fabulous work performance. Your solution gave the base to create my own work, which I did and I think it is perfectly splendid. I am looking forward working with you in the future. Once again, thank you kindly.
im satisfied with the work and i will continue do my assignment here. The price is also reasonable and the work completed 10 days earlier