QSA Glosary Flashcards

(44 cards)

1
Q

AAA

A

Authentication, Authorization, and accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Account Data

A

Cardholder sensitive data to include account # and identifying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acquirer

A

The Merchant Bank, acquiring bank, or acquiring financial institution. Runs the payment acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AOC

A

Attestation of compliance. A form that attests results of a self-assessment or Report on Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AOV

A

attestation of validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ASV

A

approved scanning vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Audit Log

A

the record of system activities. same as audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BAU

A

business as usual. an organization’s normal routine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Card Skimmer

A

an physical swiper data capture device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CVV

A
Card verification code or value.
CAV = JCB
CVC = Mastercard
CVV = Visa and Discover
CSC = AmExp
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CDE

A

cardholder data environment. People, processes, and technology that store, process, or transmit cardholder data or sensitive cardholder Au data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CERT

A

Carnegie-Mellon’s Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIS

A

center for internet security. NFP enterprise w mission to help organizations reduce risk of business and e-commerce disruptions resulting from inadequate technical security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compensation controls

A

Used to mitigate a risk that cannot be eliminated. Must: - Meet intent and rigor of original PCI DSS req

  • Provide similar level of defense as original req
  • be “above and beyond” other reqs
  • be commensurate with the additional risk imposed by not adhering to original req
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CVSS

A

Common Vulnerability Scoring System. an open standard used to convey severity of computer security and vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dependency

A

in PA DSS world, hardware or software necessary for the payment application to meet PA DSS Reqs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DSS

A

Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Dual control

A

two or more separate entities working in conjunction to secure system function or information

19
Q

Egress Filtering

A

method of filtering outbound web traffic

20
Q

Entity

A

legal-eese for the organization going through the audit

21
Q

FIPS

A

federal info processing standards

22
Q

HSM

A

hosting security module or hardware security module. physically or logically controlled hardware that provides secure set of crypto devices and or key management

23
Q

IETF

A

internet engineering task force

24
Q

Masking

A

security data by displaying place values rather than actual numerical values

25
MPLS
multi-protocol label switching
26
NIST
National institute of standards and technology
27
National Vulnerability DB
NVD
28
OCTAVE
operationaly ciritcial threat, asset, and vul eval. A suite of tools, techs, and methods for risk-based info sect strategic assessment
29
OWASP
open web application secuirty project. OWASP.org
30
PED
Pin entry device
31
PVV
PIN verification Value
32
QIR
Qualified Integrator or Reseller
33
RFC 1918
standard ID'd by the internet engineering TF that defines the usage and appropriate address ranges for private networks
34
ROC
Report on compliance; our assessment of their compliance report
35
SANS
SysAdmin, Audit, Networking, and Security. SANS.org
36
SAQ
Self assessment questionnaire
37
Split Knowledge
when two or more entities hold components of a cryptographic key; when separate, provide no indication of the key
38
Wildcard
just what it sounds like however, in this case also can represent a non-security impacting change.
39
What is PCI DSS?
Payment Card Industry Data Security Standard
40
What is PCI PA-DSS
Payment Card Industry Payment Application Data Security Standard
41
What does P2PE stand for?
Point-to-point encryption
42
What is the PTS - POI acronym stand for?
PIN Transaction Security - point of interaction
43
PTS - PIN
PIN Transaction Security PIN Standards
44
PTS - HSM
PIN transaction Security - Hardware Security Modules