pcisecuritystandards.org

Website:http://www.pcisecuritystandards.org
Upvotes received8
Downvotes received9
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (254)

1

5 Thumbs up   4 Thumbs down

Encryption


Process of converting information into an unintelligible form except to holders of a specific cryptographic key. Use of encryption protects information between the encryption process and the decryptio [..]
Source: pcisecuritystandards.org

2

1 Thumbs up   0 Thumbs down

public network


Network established and operated by a third party telecommunications provider for specific purpose of providing data transmission services for the public. Data over public networks can be intercepted, [..]
Source: pcisecuritystandards.org

3

1 Thumbs up   0 Thumbs down

SQL Injection


Form of attack on database-driven web site. A malicious individual executes unauthorized SQL commands by taking advantage of insecure code on a system connected to the Internet. SQL injection attacks [..]
Source: pcisecuritystandards.org

4

1 Thumbs up   0 Thumbs down

SQL injection


Form of attack on database-driven web site. A malicious individual executes unauthorized SQL commands by taking advantage of insecure code on a system connected to the Internet. SQL injection attacks [..]
Source: pcisecuritystandards.org

5

1 Thumbs up   0 Thumbs down

Token


In the context of authentication and access control, a token is a value provided by hardware or software that works with an authentication server or VPN to perform dynamic or two-factor authentication [..]
Source: pcisecuritystandards.org

6

0 Thumbs up   0 Thumbs down

AAA


Acronym for “authentication, authorization, and accounting.” Protocol for authenticating a user based on their verifiable identity, authorizing a user based on their user rights, and accounting for a [..]
Source: pcisecuritystandards.org

7

0 Thumbs up   0 Thumbs down

Access control


Mechanisms that limit availability of information or information-processing resources only to authorized persons or applications.
Source: pcisecuritystandards.org

8

0 Thumbs up   0 Thumbs down

Account Data


Account data consists of cardholder data and/or sensitive authentication data. See Cardholder Data and Sensitive Authentication Data.
Source: pcisecuritystandards.org

9

0 Thumbs up   0 Thumbs down

Account number


See Primary Account Number (PAN).
Source: pcisecuritystandards.org

10

0 Thumbs up   0 Thumbs down

Acquirer


Also referred to as “merchant bank,” “acquiring bank,” or “acquiring financial institution”. Entity, typically a financial institution, that processes payment card transactions for merchants and is de [..]
Source: pcisecuritystandards.org


To view all 254 definitions, please sign in.