Compliance Audit - Assessing POS Devices for Tampering
Offered By: YouTube
Course Description
Overview
Learn about assessing Point of Sale (POS) devices for tampering in this informative conference talk from Louisville Infosec 2017. Explore the evolution of skimming attacks, understand the true cost of breaches, and examine PCI standards on skimming and substitution. Delve into common tampering examples, general recommendations for the public, and discover who is responsible for checking device integrity. Gain insights into developing a comprehensive tampering assessment program, including creating a perfect state profile and implementing essential checklist items. This presentation equips you with valuable knowledge to enhance security measures and protect against POS device vulnerabilities.
Syllabus
Intro
In the Beginning...
Skimming Attacks on the Rise
The REAL Cost of a Breach
PCI on Skimming/Substitution
Framing the Problem, Addressing Myths
Common Tampering Examples
General Recommendations for the Public
Who Checks for Tampering?
Tampering Assessment Program Definition
Perfect State Profile
Tampering Assessment Program Essentials
High Level Tampering Assessment Checklist
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network