Form for merchants and service providers to attest to the results of a PCI DSS assessment
AOC
Retains copies of the signed Employee/Contractor Acknowledgement forms per Retention Requirements.
Insperity/HR
This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability
White Hat
Identify and authenticate access to system components
Req 8
The people, processes and technology that store, process, or transmit cardholder data or sensitive authentication data.
CDE
Are responsible for exercising good judgment regarding appropriate use of Blackink IT’s assets.
Users/Everyone
A website with a site certificate is one that uses encryption; this letter after http is one sign of it.
S
Encrypt transmission of cardholder data across open, public networks
Req 4
These people qualified by PCI SSC to perform PCI DSS on-site assessments
QSA
Document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet
Acceptable Use Policy
Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this
Bring Your Own Device
Develop and maintain secure systems and applications
Req 6
Type of firewall between all wireless networks and the cardholder data environment, and configure these firewalls to deny or, if traffic is necessary for business purposes, permit only authorized traffic between the wireless environment and the cardholder data environment.
Perimeter
While our systems may accommodate the use of _____ for company security, you should not expect confidentiality of your files at work.
Passwords
A ransomware attack that encrypted 3,800 city of Atlanta computers demanded 6 of these digital items to unfreeze them
Bitcoins
Do not use vendor-supplied defaults for system passwords and other security parameters
Req 2
A vendor agnostic, industry open standard designed to convey the severity of computer system security vulnerabilities and help determine urgency and priority of response.
CVSS
Smartphones and tablets belonging to employees that are for personal use only must use the _______ communication networks.
BI Guest network
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password
Keylogging
Install and maintain a firewall configuration to protect cardholder data
Req 1