1
42.8 million cyberattacks are expected this year alone. How can businesses eliminate their data as a target for hackers? Three technologies - EMV chip, tokenisation and point-to-point encryption can help organizations make their customer data less valuable to criminals. Here’s how it works: Fight Cybercrime by Making Stolen Data Worthless to Thieves There are many places card data travels throughout the transaction process. Each player that comes in contact with card data plays a vital role in keeping data safe. ? #!$% ? :( :( STOLEN DATA Data is Devalued. It cannot be read and used fraudulently by criminals. For more information visit: www.pcisecuritystandards.org | @PCISSC Customer uses card at store or online Click to complete your purchase Store owner’s bank + What: Removes the need for card data to be stored by merchants or on consumers’ devices How: The original card value cannot be determined by the receiver Best for: Protecting stored data used for customer service, loyalty programs and mobile payments $$$ Card in hand is real! Card data is unreadable! 9 9 9 3 4 5 6 7 6 3 2 1 0 0 0 0 1 9 * # $ / # # @ & % > / # V O ? / # # @ X POINT-TO-POINT ENCRYPTION Card data is removed! EMV CHIP CreditCard Bank Name 999 34567 6321 00001 VISHNIT PARIK Store owner point-of-sale (POS) computer system 0000 000 J.Citizen Card networks A M E R I C A N E X P R E S S - D I S C O V E R - J C B - M A S T E R C A R D - V I S A Customer’s bank Technologies that protect data in the transaction process: TOKENISATION CreditCard Bank Name 0000 0000 0000 0000 JOHN CITIZEN EXP 00/00 Customer Identification Number (American Express) Primary Account Number Chip CreditCard Bank Name 0000 0000 0000 0000 JOHN CITIZEN EXP 00/00 Expiration Date 1234 Magnetic Stripe (data on tracks 1 & 2) Customer Identification Number (Discover, JCB, MasterCard, VISA) Bank Name Call 000.000.0000 for info 0000 000 J.Citizen Data needs to be protected both in transit and at rest What: Prevents cards from being cloned How: The chip creates unique transaction code with every purchase that can’t be replicated by counterfeit cards Best for: Protecting in-store purchases, not online transactions What: Masks card data as it travels through the transaction cycle How: Math formula replaces original data with new values which are decrypted by the receiver Best for: Data in transit + = VULNERABLE DATA

VULNERABLE DATA - PCI Security Standards · PDF fileFight Cybercrime by Making Stolen Data Worthless to Thieves There are many places card data travels throughout the transaction process

Embed Size (px)

Citation preview

Page 1: VULNERABLE DATA - PCI Security Standards · PDF fileFight Cybercrime by Making Stolen Data Worthless to Thieves There are many places card data travels throughout the transaction process

42.8 million cyberattacks are expected this year alone. How can businesses eliminate their

data as a target for hackers? Three technologies - EMV chip, tokenisation and point-to-point

encryption can help organizations make their customer data less valuable to criminals.

Here’s how it works:

Fight Cybercrime by Making Stolen Data Worthless to Thieves

There are many places card data travels throughout the transaction process.

Each player that comes in contact with card data plays a vital role in keeping data safe.

?

#!$%

?

:( :(

STOLENDATA

Data is Devalued.

It cannot be read and used fraudulently by criminals.

For more information visit:

www.pcisecuritystandards.org | @PCISSC

Customer uses card at store or online

Click to complete your

purchase

Store owner’s bank

+

What: Removes the need for card data to be stored by merchants or on consumers’ devices

How: The original card value cannot be determined by the receiver

Best for: Protecting stored data used for customer service, loyalty programs and mobile payments

$$$

Card in hand is real!

Card data is unreadable!

9 9

9

3 4 5 6 7 63

2

1 0

0 0 01 9

* # $ / #

# @

& ^% >/ #

V O ?/ # # @

X ✓

POINT-TO-POINT ENCRYPTION

Card data is removed!

EMV CHIP

CreditCard

Bank Name Call 000.0000.0000Bank Name Call 000.000.0000 for info

0000 000J.Citizen

CreditCardBank Name

999 34567 6321 00001

VISHNIT PARIKEXP 01/19

CreditCard

Bank Name Call 000.0000.0000Bank Name Call 000.000.0000 for info

0000 000J.Citizen

Store owner point-of-sale (POS) computer system

CreditCard

Bank Name Call 000.0000.0000

Bank Name Call 000.000.0000 for info

0000 000J.Citizen

Card networks

AMERIC

AN

EX

PRES

S -

DISCOVER - JCB - MASTERC

ARD

- VISA

Customer’s bank

Technologies that protect data in the transaction process:

TOKENISATION

CreditCard Bank Name

0000 0000 0000 0000

JOHN CITIZEN

EXP 00/00

Customer Identification Number

(American Express)

Primary Account Number

Chip

CreditCard Bank Name

0000 0000 0000 0000

JOHN CITIZENEXP 00/00

Expiration Date

1234

Magnetic Stripe(data on tracks 1 & 2)

Customer Identification Number (Discover, JCB, MasterCard, VISA)

Bank Name Call 000.000.0000 for info

0000 000J.Citizen

Data needs to be protected both in transit and at rest

What: Prevents cards from being cloned

How: The chip creates unique transaction code with every purchase that can’t be replicated by counterfeit cards

Best for: Protecting in-store purchases, not online transactions

What: Masks card data as it travels through the transaction cycle

How: Math formula replaces original data with new values which are decrypted by the receiver

Best for: Data in transit

+

=

VULNERABLE DATA