IT541_Unit1 - Unit 1 1 Running Head: DEBIT CARD PURCHASE...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Unit 1 1 Running Head: DEBIT CARD PURCHASE Debit Card Purchase with PIN Jennifer Angel Kaplan University IT 541 Dr. Steven Case January 12, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unit 1 2 Abstract Common threats abound today based on the theory people's private lives should be public knowledge by some hackers. The creation of rules and regulations by the federal government to help secure such information have been released, rewritten and over a course of time updated to allow older issues and new challenges to cohesively exist on an equal plain. Through these guidelines businesses, both e-commerce and brick & mortar must conform too; in order to accept payments from a credit and or debit card. The CIA Triad along with the Triple A's are essentially another form of PCI SSC, which in tune with security is currently keep a watchful eye on people's private lives. This paper will attempt to provide an in depth look at the CIA Triad and its accompanying levels of importance through thoughtful and careful studying of information readily available.
Background image of page 2
Unit 1 3 Table of Contents Title Page………………………………………………………………………………………. .1 Abstract………………………………………………………………………………………….2 Table of Contents………………………………………………………………………………. .3 CIA TRIAD………. .……………………………………………………………………………4 Debit Card Purchase with PIN…………………………………………………………………. .7 Conclusion………………………………………………………………………………………9 References. ........................................................................................................................... …...10
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unit 1 4 CIA Triad The CIA Triad is built on three very important areas governing security. Confidentiality is one of the most important areas of the Triad. Confidentiality is the process of protecting data owned by a company. This means there are certain aspects of the information that needs to be kept away from public venues. The downside of allowing information of this nature escape the company can be crucial to the organization. An example of a breech of information could transpire between a doctor and a patient; this is commonly classified as a dissemination of protected health information or (PHI). With the debit card scenario, the dissemination of (PFI) protected financial information between a customer and a bank is top priority. At the blue collar level, we may see instances of the dissemination of Business-critical information to a rival
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2010 for the course IT 541 taught by Professor Cs during the Winter '10 term at Kaplan University.

Page1 / 10

IT541_Unit1 - Unit 1 1 Running Head: DEBIT CARD PURCHASE...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online