Payment Card Industry and Security

123456789101112131415161718192021222324
Across
  1. 1. The process of securely storing cardholder data after a transaction has been authorized (11 letters)
  2. 3. Items produced to imitate genuine articles, especially for fraudulent purposes (17 letters)
  3. 5. A document provided by a third-party assessor confirming an organization's compliance with PCI DSS (10 letters)
  4. 6. Dividing networks or systems into distinct sections to enhance security (18 letters)
  5. 8. A practice of restricting access to cardholder data only to those who require it (13 letters)
  6. 13. The practice of regularly updating software and systems to address vulnerabilities and improve security (7 letters)
  7. 15. Type of encryption used to secure cardholder data during transmission over public networks (3 letters)
  8. 16. Systems Mechanisms employed to thwart potential threats or attacks (13 letters)
  9. 17. Established rules or procedures for communication and data exchange (17 letters)
  10. 18. This document outlines security requirements for organizations that handle cardholder information (3 letters)
  11. 21. Illicit practice of capturing payment card data from legitimate transactions (15 letters)
  12. 22. Flaws or weaknesses in systems that can be exploited by attackers (15 letters)
  13. 23. The process of securely destroying or rendering cardholder data unusable (16 letters)
  14. 24. The unique identifier assigned to each credit or debit card transaction (3 letters)
Down
  1. 2. A tool used to detect and prevent unauthorized access by monitoring and analyzing network traffic (17 letters)
  2. 4. Term for a system or process that logs and monitors activities within a network or system (9 letters)
  3. 7. Term for a system that authenticates the identity of users and ensures they have the appropriate permissions (13 letters)
  4. 9. This type of assessment involves a qualified assessor evaluating an organization's compliance with PCI DSS (18 letters)
  5. 10. The process of making cardholder data unreadable using cryptographic methods (10 letters)
  6. 11. Testing This type of testing evaluates systems, networks, and applications for vulnerabilities that could be exploited by attackers (18 letters)
  7. 12. A technique used to verify the identity of an individual based on their physical characteristics, such as fingerprints or iris scans (10 letters)
  8. 13. Established rules or principles governing behavior or actions (16 letters)
  9. 14. Term for security controls that detect and prevent unauthorized access to systems or networks (8 letters)
  10. 17. The act of deliberately tricking a person or system into revealing confidential information (8 letters)
  11. 19. Term for an unauthorized individual gaining access to cardholder data (10 letters)
  12. 20. Wallets Electronic systems for storing and managing payment information securely (12 letters)