Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Read the Bellingham, Washington, Control System Case and then answer the foll

ID: 3567005 • Letter: 1

Question

1. Read the Bellingham, Washington, Control System Case and then answer the following question:

What do you think could/should have been done to prevent this incident (relate your answer to cyber security)?

2. Read Well Fargo Payment Card Industry (PCI) Data Security Standard (DSS), Answer the following questions:

a) How does the bank card policy comply with the standard?

b) How does the bank card policy not comply with the standard?

c) What recommendations would you make to close the gaps between the standard and the policy?

d) Should the government force banks/credit unions to comply with all aspects of the standard? Why?

Explanation / Answer

1)Identify NIST SP 800-53 management, operational, and technical safeguards or countermeasures that, if implemented, could have prevented or ameliorated the event

2)a)

The Visa's program, Cardholder Information Security (CISP), MasterCard's program, Site Data Protection (SDP) and Discover Network's program, Discover Information Security and Compliance program (DISC) are based on the PCI Data Security Standards, each card association and company maintains its own compliance program and reserves the right to take independent action for non-compliance with these standards.

b)The Annual Self-Assessment is designed to ensure that merchants have considered and addressed the most critical aspects of protecting cardholder data and also quarterly system perimeter scan, Network scanning tools. So, for these types of issues the bank card policy not comply with the standard.

c)Best practices like

1.

2. Protect stored data

3. Provide secure password features

4. Log application activity

5. Develop secure applications

6. Protect wireless transmissions

8. Facilitate secure network implementation

9. Cardholder data must never be stored on a server connected to the Internet

10. Facilitate secure remote software updates

11. Facilitate secure remote access to application

12. Encrypt sensitive traffic over public networks

d)Regulations establish minimum prudential, operational,
administrative, governance, accounting and audit
requirements. As in the case of legislation, one set of
requirements does not fit all financial institutions. Credit
union regulations are likely to differ from those of other
financial institutions in the areas of:

Do not retain full magnetic stripe or CVV2, CVC2 and CID data. PIN blocks must never be retained