{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

IT541_Unit1 - Unit 1 1 Running Head DEBIT CARD PURCHASE...

Info icon This preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Unit 1 1 Running Head: DEBIT CARD PURCHASE Debit Card Purchase with PIN Jennifer Angel Kaplan University IT 541 Dr. Steven Case January 12, 2010
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Unit 1 2 Abstract Common threats abound today based on the theory people's private lives should be public knowledge by some hackers. The creation of rules and regulations by the federal government to help secure such information have been released, rewritten and over a course of time updated to allow older issues and new challenges to cohesively exist on an equal plain. Through these guidelines businesses, both e-commerce and brick & mortar must conform too; in order to accept payments from a credit and or debit card. The CIA Triad along with the Triple A's are essentially another form of PCI SSC, which in tune with security is currently keep a watchful eye on people's private lives. This paper will attempt to provide an in depth look at the CIA Triad and its accompanying levels of importance through thoughtful and careful studying of information readily available.
Image of page 2
Unit 1 3 Table of Contents Title Page………………………………………………………………………………………..1 Abstract………………………………………………………………………………………….2 Table of Contents………………………………………………………………………………..3 CIA TRIAD………..……………………………………………………………………………4 Debit Card Purchase with PIN…………………………………………………………………..7 Conclusion………………………………………………………………………………………9 References ............................................................................................................................ …...10
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Unit 1 4 CIA Triad The CIA Triad is built on three very important areas governing security. Confidentiality is one of the most important areas of the Triad. Confidentiality is the process of protecting data owned by a company. This means there are certain aspects of the information that needs to be kept away from public venues. The downside of allowing information of this nature escape the company can be crucial to the organization. An example of a breech of information could transpire between a doctor and a patient; this is commonly classified as a dissemination of protected health information or (PHI). With the debit card scenario, the dissemination of (PFI) protected financial information between a customer and a bank is top priority. At the blue collar
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern