Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
12 Cards in this Set
- Front
- Back
- 3rd side (hint)
Protect stored card holder data
|
Requirement 3
|
Protect Card Holder Data
|
|
Install and maintain a firewall configuration to protect cardholder data
|
Requirement 1
|
Build and maintain a secure network
|
|
Use and regularly update anti-virus software or program
|
Requirement 5
|
Maintain a Vulnerability Management Program
|
|
Do not user vendor supplied defaults for system passwords and other security parameters.
|
Requirement 2
|
Build and maintain a secure network
|
|
Encrypt transmission of cardholder data across open, public networks (Data in motion).
|
Requirement 4
|
Protect Card Holder Data
|
|
Restrict access to cardholder data by business need to know.
|
Requirement 7
|
Implement Strong Access Control Measures.
|
|
Restrict Physical Access to Cardholder Data
|
Requirement 9
|
Implement Strong Access Control Measures.
|
|
Develop and maintain secure systems and programs - patching.
|
Requirement 6
|
Maintain a Vulnerability Management Program
|
|
Track and Monitor All Access to network resources and cardholder data.
|
Requirement 10
|
Regularly Monitor and Test Networks
|
|
Assign a unique ID to each person with computer access
|
Requirement 8
|
Implement Strong Access Control Measures.
|
|
Maintain a policy that addresses information security for all personnel.
|
Requirement 12
|
Maintain an Information Security Policy.
|
|
Regularly test security systems and processes
|
Requirement 11
|
Regularly Monitor and Test Networks
|