Breaches can occur all the time and payment networks are usually the prime targets of hacker communities. A hacker is usually looking for vulnerable systems and attempts to break into these systems when vulnerable systems are found to steal financial information that could be sold online for easy money. Breaches can occur all the time and payment networks are usually the prime targets of hacker communities. A hacker is usually looking for vulnerable systems and attempts to break into these systems when vulnerable systems are found to steal financial information that could be sold online for easy money.In the past few issues of CIO Pakistan, I have discussed what PCI DSS (Payment Card Industry — Data Security Standard) is and how the audit process helps to make the transaction process more secure. In this issue, I’d like to draw out a better, clearer profile of the hacker and what he is looking for. As a security professional, you must have the ability to put yourself in the shoes of your worst nightmare and think as he does. Only then will you be able to take proactive measures to be more ready to handle what comes your way. Always remember: being effective at security best practices requires you to have a keen sense of human behavior. What Hackers Look For and Where SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe There are two kinds of merchants: online and physical merchants, which are also referred as ‘Brick and Mortar’ merchants with a POS (Point of Sale) device to accept card payments. Customers engage with both and there are usually bits of customer data available with both. Hackers are always looking for card holder data preferably combined with personal information. Stealing just the card is no longer adequate enough. The “stealing” is done in two possible ways: 1-Stealing from online merchants is mainly done through the internet and is usually due to security holes in the system components, such as firewalls, servers and applications 2-There are several ways through which the hackers steal data from the physical merchant. One way of stealing can be hacking a vulnerable wireless network that transmits the cardholder dataDifferent Kinds of BreachesDifferent parts of the world, reveal different kinds of breaches. In Europe for example, more breaches occur for online merchants and less for physical merchants. In the United States, however, more breaches occur through physical merchants and comparatively fewer breaches occur online.Interestingly enough, the highest percentage of breaches occurs at Level 4 merchants, who are smaller businesses and have fewer transactions. This is usually because smaller businesses usually don’t have dedicated ICT departments or security consultants.Transactions are based on a relationship of mutual trust. Without involving the banks, the buyer and seller base their decision to make a sale or extend credit based on past track record and experience. By risking lower security measures, the relationship runs the threat of compromising reputation. Reputation is what leads to consumer confidence and enables the exchange or extension of financial liabilities.The Sensitive Data There are essentially two kinds of credit data. Each requires different types of protection:First, there is the ‘Cardholder Data’. This is comprised of the credit card number, name, and expiry date. Next there is the ‘Sensitive Authentication Data’ (SAD). This contains the magnetic strip data along with 3 or 4 digital codes such as the CVC and PIN block.For the transaction process, the merchant is never allowed to store the SAD beyond the authorization however the merchant may store the cardholder data if properly encrypted and/or hashed. The PCI Auditor is responsible for ensuring which data is stored and which is filtered out of the merchant’s system.Pre-Auditing Steps for PCI Validation Before the PCI assessor goes through the validation of the 12 main PCI sections, there are few important things to consider to plan the auditing process.ScopingThe first step is to clearly define the scope of the assessment for PCI validation. For instance, a customer may have 2,000 workstations in his organization but only a few of them might be actually storing, processing or transmitting the cardholder data. As per PCI DSS, all systems that are connected or networked to the cardholder systems are in the scope and would require assessment, which would make the audit a very lengthy and expensive process. Segmentation of network to isolate the sensitive systems is recommended to reduce the assessment scope.An auditor would have to verify the isolation to confirm the scope before assessment.SamplingA customer might have a large number of similar systems and it would be waste of time and resources to assess every system that would yield the same results. For instance, if a business has several retail shops that are using similarly configured systems, an auditor can select a sample of similar shops for assessment. All unique systems would need to be audited individually.Compensating ControlIn case of business, technical or legal constraints, compensating controls are allowed with documented justification. For example, if some system does not allow long passwords, then here’s a way out: you may compensate control with a more complicated password that has a short expiry along with additional logging in the place of a longer password.ReportingDuring the auditing process, documentation and reporting should be made at every key step of the process. The reporting should include Vendor/Assessor Contact Information, Audit dates/timeline, Business Description, Processor Relationship, Merchant POS (Point of Sale) products used & their versions, Wireless LAN, networks diagram, transaction flow diagrams and summary of audit.There is really no sure way to protect any transaction, be it online or offline, but it is important to be able to understand the risks associated with each. The amount of money that companies spend in securing products through physical exchange of money is also not without its risks. The perception of someone physically robbing you, seems a lot ‘easier’ to control than online, but that isn’t always true.You have to understand that interception of any transaction is done after a great deal of observation and patience. So yes, a breach can occur with any transaction point, at any time. Sticking your head in a silo and thinking your business functions in isolation is not the solution to any problem.Offline penetration testing is just as vital to the integrity and security of a brick and mortar business, as it is for an online business. Offline trends analysis is just as critical as is the online, though online, at times, the analysis is easier because of the amount of data that can be gathered and analyized at any given time.By writing these series of PCI Audit articles, the purpose is not to scare you into never using your credit card again. That obviously cannot happen. The purpose is for you to be aware of the signs that there might be a vulnerability in the system you are using, and how you can work towards strengthening it out of the system.About the Author:Talha Ghafoor is a Senior Security Specialist and a qualified CISSP, CISA, PCI-QSA, and JNCIS-FWV. He has 10+ years of industry experience with strong history of working with Tier 1/Fortune 10 Financial Services Institutions in Europe.Talha’s expertise lies in firewalls, intrusion prevention, encryption and open source software. You can contact him at: talha@ciopakistan.com Related content feature Gen AI success starts with an effective pilot strategy To harness the promise of generative AI, IT leaders must develop processes for identifying use cases, educate employees, and get the tech (safely) into their hands. By Bob Violino Sep 27, 2023 10 mins Generative AI Generative AI Generative AI feature A fluency in business and tech yields success at NATO Manfred Boudreaux-Dehmer speaks with Lee Rennick, host of CIO Leadership Live, Canada, about innovation in technology, leadership across a vast cultural landscape, and what it means to hold the inaugural CIO role at NATO. By CIO staff Sep 27, 2023 6 mins CIO IT Skills Innovation feature The demand for new skills: How can CIOs optimize their team? By Andrea Benito Sep 27, 2023 3 mins opinion The CIO event of the year: What to expect at CIO100 ASEAN Awards By Shirin Robert Sep 26, 2023 3 mins IDG Events IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe