Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Buy Rights Online Buy Rights

Rights Contact Login For More Details

  • Wiley

More About This Title Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

English

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.

  • A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application
  • Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO
  • Explains how protected areas are hacked and how hackers spot vulnerabilities
  • Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.

English

Slava Gomzin, CISSP, PCIP, ECSP, Security+ is the Security and Payments Technologist at Hewlett-Packard. Prior to joining HP, Slava was a security architect and PCI ISA, corporate product security officer, and R&D and application security manager at Retalix, a Division of NCR Retail.

English

Introduction xxiii

Part I Anatomy of Payment Application Vulnerabilities 1

Chapter 1 Processing Payment Transactions 3

Chapter 2 Payment Application Architecture 25

Chapter 3 PCI 55

Part II Attacks on Point of Sale Systems 91

Chapter 4 Turning 40 Digits into Gold 93

Chapter 5 Penetrating Security Free Zones 125

Chapter 6 Breaking into PCI-protected Areas 147

Part III Defense 165

Chapter 7 Cryptography in Payment Applications 167

Chapter 8 Protecting Cardholder Data 195

Chapter 9 Securing Application Code 219

Conclusion 249

Appendix A POS Vulnerability Rank Calculator 251

Appendix B Glossary 257

Index 265

loading