<<

Fight by Making Stolen Data Worthless to Thieves 42.8 million cyberattacks are expected this year alone. How can businesses eliminate their data as a target for hackers? Three technologies - EMV chip, tokenisation and point-to-point can help organizations make their customer data less valuable to criminals. Here’s how it works: There are many VULNERABLE DATA places card data CreditCardCreditCard BankBank Name Name travels throughout 1234 00000000 00000000 0000 0000 the transaction EXPEXP 00/0000/00 JOHNJOHN CITIZEN CITIZEN process. Chip Expiration Primary Account Customer Date Number Identification Number Each player that (American Express) comes in contact

with card data J.Citizen 0000 000 plays a vital role in Bank Name Call 000.000.0000 for info keeping data safe. Magnetic Stripe Customer Identification Number (data on tracks 1 & 2) (Discover, JCB, MasterCard, VISA)

Customer uses Click to complete your card at store purchase or online

Data needs to be protected both in transit and at rest Store owner point-of-sale

CreditCard (POS) computer J.Citizen 0000 000 Bank Name Call 000.000.0000 for info Bank Name Call 000.0000.0000 system

Store owner’s

CreditCard J.Citizen 0000 000

Bank Name Call 000.000.0000 for info bank Bank Name Call 000.0000.0000

OVER - J ISC CB D - - M S S A E S T R E P

Card R

X

C

E

A

N R

networks D A

C

I

-

V R

E I

S

A M

A

Customer’s bank

Technologies that protect data in the transaction process:

EMV CHIP Card in hand is real! What: Prevents cards from being cloned Bank Name

CreditCard

999EXP 01/19 34567 6321 00001 How: The chip creates unique transaction VISHNIT PARIK with every purchase that can’t be replicated by

counterfeit cards CreditCard J.Citizen 0000 000

Bank Name Call 000.000.0000 for info Bank Name Call 000.0000.0000 Best for: Protecting in-store purchases, not online transactions

+

POINT-TO-POINT ENCRYPTION

@

9

#

#

1

0 /

Card data is unreadable!

? 0

O 0

V

0

#

1

What: Masks card data as it travels through

/

2 >

3 %

6 ^

the transaction cycle

7

&

6

@

5

#

4

X # ✓

3 How: Math formula replaces original data

/

9

with new values which are decrypted by $

9

# 9 * the receiver

Best for: Data in transit

+ TOKENISATION Card data is removed! What: Removes the need for card data to be stored by merchants or on consumers’ devices $$$ How: The original card value cannot be determined by the receiver Best for: Protecting stored data used for customer service, loyalty programs and mobile payments

=

:( #!$% Data is :( ? STOLEN Devalued. ? DATA It cannot be read and used fraudulently by criminals.

For more visit: www.pcisecuritystandards.org | @PCISSC