Across
- 1. The process of securely storing cardholder data after a transaction has been authorized (11 letters)
- 3. Items produced to imitate genuine articles, especially for fraudulent purposes (17 letters)
- 5. A document provided by a third-party assessor confirming an organization's compliance with PCI DSS (10 letters)
- 6. Dividing networks or systems into distinct sections to enhance security (18 letters)
- 8. A practice of restricting access to cardholder data only to those who require it (13 letters)
- 13. The practice of regularly updating software and systems to address vulnerabilities and improve security (7 letters)
- 15. Type of encryption used to secure cardholder data during transmission over public networks (3 letters)
- 16. Systems Mechanisms employed to thwart potential threats or attacks (13 letters)
- 17. Established rules or procedures for communication and data exchange (17 letters)
- 18. This document outlines security requirements for organizations that handle cardholder information (3 letters)
- 21. Illicit practice of capturing payment card data from legitimate transactions (15 letters)
- 22. Flaws or weaknesses in systems that can be exploited by attackers (15 letters)
- 23. The process of securely destroying or rendering cardholder data unusable (16 letters)
- 24. The unique identifier assigned to each credit or debit card transaction (3 letters)
Down
- 2. A tool used to detect and prevent unauthorized access by monitoring and analyzing network traffic (17 letters)
- 4. Term for a system or process that logs and monitors activities within a network or system (9 letters)
- 7. Term for a system that authenticates the identity of users and ensures they have the appropriate permissions (13 letters)
- 9. This type of assessment involves a qualified assessor evaluating an organization's compliance with PCI DSS (18 letters)
- 10. The process of making cardholder data unreadable using cryptographic methods (10 letters)
- 11. Testing This type of testing evaluates systems, networks, and applications for vulnerabilities that could be exploited by attackers (18 letters)
- 12. A technique used to verify the identity of an individual based on their physical characteristics, such as fingerprints or iris scans (10 letters)
- 13. Established rules or principles governing behavior or actions (16 letters)
- 14. Term for security controls that detect and prevent unauthorized access to systems or networks (8 letters)
- 17. The act of deliberately tricking a person or system into revealing confidential information (8 letters)
- 19. Term for an unauthorized individual gaining access to cardholder data (10 letters)
- 20. Wallets Electronic systems for storing and managing payment information securely (12 letters)