Purpose This project provides an opportunity for you to apply principles related to auditing to ensure information systems are in compliance with pertinent
Purpose
This project provides an opportunity for you to apply principles related to auditing to ensure information systems are in compliance with pertinent laws and regulations, as well as industry requirements.
Required Source Information and Tools
To complete the project, you will need the following:
- Course textbook
- Access to the Internet to perform research for the project
- PCI Security Standards Council: https://www.pcisecuritystandards.org
- Important PCI Compliance Information for Merchants: https://www.bigcommerce.com/blog/pci-compliance/#weve-successfully-achieved-pci-compliance-whats-next
- COSO Internal Control—Integrated Framework Executive Summary: https://www.coso.org/_files/ugd/3059fc_1df7d5dd38074006bce8fdf621a942cf.pdf
- COSO Internal Control—Integrated Framework PowerPoint
- COSO Internal Control—Integrated Framework (2013) whitepaper: https://assets.kpmg/content/dam/kpmg/pdf/2016/05/2750-New-COSO-2013-Framework-WHITEPAPER-V4.pdf
Note: The 2013 version of the framework is also available for purchase, or you may be able to retrieve it through our library.
Learning Objectives and Outcomes
You will be able to:
- Explain the purpose of PCI DSS
- Analyze business factors that influence PCI DSS compliance
- Describe potential consequences of failing to demonstrate PCI DSS compliance
- Apply standards and frameworks to the development of information security internal control systems
- Analyze the use of information security controls within IT infrastructure domains
Introduction
Public and private sector companies are expected to comply with many laws and regulations as well as industry requirements to promote information security. Assessments and audits of the information technology (IT) environment help to ensure a company is in compliance. A successful information security professional must be able to assess a business’s needs, evaluate various standards and frameworks, and develop a customized, integrated internal control system that addresses the company’s compliance responsibilities. Furthermore, the professional must be able to communicate with various people—both inside and outside the organization—to facilitate awareness of how control activities mitigate weaknesses or potential losses that could compromise the company’s information security.
Scenario
S&H Aquariums is a new online retailer that is about to begin selling aquariums and other items for aquarium hobbyists. In recent months, many companies have been featured in the news because of information security breaches that have exposed customers’ credit card data. S&H Aquariums’ management team is worried about the negative impact a potential breach could have on the company’s reputation and business standing.
S&H Aquariums has hired you, an information systems security expert, to ensure that the company is prepared to accept credit card payments for purchases made through the company’s Web site. To kick off the planning phase, the board of directors would like you to write a report explaining what the company will need to do to minimize risks to sensitive data and comply with applicable laws and regulations, as well as industry standards. In preparation, you sit down with the company’s president and discuss the following details:
- Per the company’s strategic plan, the company expects to have between 20,000 and 1,000,000 credit card transactions during the first year of operations. However, the board would like to know what differences to anticipate as the volume of credit card transactions grows in the coming years.
- The company will initially accept payments made with MasterCard and Visa only, but it may decide to accept other credit cards in the future.
- The board of directors is discussing the possibility of opening a bricks-and-mortar store in the future, and the board would like to consider any compliance-related issues prior to making that decision.
- The board consists of professionals from a variety of fields. It is unlikely that any of the board members are familiar with complex information security concepts or with PCI DSS, the set of requirements that prescribes operational and technical controls to protect cardholder data.
Tasks
- Review the information related to PCI DSS compliance provided in the course textbook and in the Internet resources listed for this project. Consider how this information relates to the description of S&H Aquariums provided in the scenario above.
- Write a report for S&H Aquariums’ board of directors. Include the following:
- Introduction
- PCI DSS Overview
- Include a discussion of the six principles, twelve primary requirements, and the sub-requirements of PCI DSS.
- Rationale
- Explain why the company needs to address the PCI DSS requirements and describe potential consequences if the company is not able to demonstrate compliance.
- Immediate Considerations for PCI DSS Compliance
- Analyze factors (including those introduced in the scenario above) that will influence S&H Aquariums’ immediate plans for PCI DSS compliance. Discuss payment brands (credit card companies), transaction volumes, merchant levels (i.e., 1 through 4), and types of reporting required in relation to S&H Aquariums’ business projections.
- Future Considerations for PCI DSS Compliance
- Analyze contingencies that may influence PCI DSS compliance in the future. Address potential questions from the board, including but not limited to:
- What would be expected of the company if credit card volume increases past 1,000,000 transactions in future years?
- What should S&H Aquariums do to demonstrate PCI DSS compliance if it begins to accept American Express or Discover?
- How would opening a bricks-and-mortar store affect the company’s responsibilities for PCI DSS compliance?
- Analyze contingencies that may influence PCI DSS compliance in the future. Address potential questions from the board, including but not limited to:
- Conclusion
As a reminder, you may use the textbook for this course and the Internet to conduct research. You are encouraged to respond creatively, but you must cite credible sources to support your work.
Submission Requirements
- Format: Microsoft Word
- Font: Arial, 12-point, double-space
- Citation Style: APA
- Length: 2–3 pages
Self-Assessment Checklist
- I have created a report that uses a professional tone and includes correct terminology.
- In my report, I have described PCI DSS, provided a sound rationale for addressing PCI DSS compliance, and analyzed immediate and future considerations for PCI DSS compliance.
- I have conducted adequate independent research for this part of the project.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.