Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

What is the latest standard in PCI-DSS and how are companies using NFC (Near Fie

ID: 3765155 • Letter: W

Question

What is the latest standard in PCI-DSS and how are companies using NFC (Near Field Communications) and implementing PCI-DSS into their solutions?

As mobile devices become more powerful and users would like to bring devices into organizations this has become a nightmare for IT organizations as far as security and providing services to users. Please discuss BYOT (Bring Your Own Technology) or BYOD (Bring Your Own Device) I would like read any experience you may have with implementing or viewing your organization implement this solution. If you do not have any personal expereience please discuss a brief solution for an organization to implement this policy based on your research and readings from the chapter

Explanation / Answer

Actually PCI-DSS means Payment Card Idustry-data security standards.Latest version running now is Version 3.0.

Near field communication (NFC) is the set of protocols that enable electronic devices to establish radio communication with each other by touching the devices together, or bringing them into proximity to a distance of typically 10cm or less. Early business models such as advertising and industrial applications were not successful, having been overtaken by alternative technologies such as bar codes or UHF tags, but what distinguishes NFC is that devices are often cloud connected.

steps involved in PCI-DSS are as follows

BYOD: BRING YOUR OWN DEVICE:

Bring your own device (BYOD) is an IT policy where employees are allowed or encouraged to use their personal mobile devices—and, increasingly, notebook PCs—to access enterprise data and systems. There are four basic options, which allow:

Advantages of implementing BYOD:

Increased productivity and innovation

Employees are more comfortable with a personal device and become expert using it—making them more productive. Personal devices tend to be more cutting-edge, so the enterprise benefits from the latest features. Also users upgrade to the latest hardware more frequently.

Employee satisfaction

Your people use the devices they have chosen and invested in—rather than what was selected by IT. 83 percent of users considered their mobile device more important than their morning cup of coffee. Allowing employees to use personal devices also helps them avoid carrying multiple devices.

Cost savings

BYOD programs sometimes save budget by shifting costs to the user, with employees paying for mobile devices and data services. However, this often results in little to no savings, so do not base your decision primarily on anticipated savings.

Things to check before implementing BYOD:

Personal cost

Some employees will be unwilling to invest their own money. As mobile devices replace company-provided laptops, certain employees will expect the organization to pay for these new devices as well.

Enterprise cost

Will you have the resources to manage BYOD safely? Are you willing to set up a private app store for maximum control? Will your service desk be able to handle the inevitable flood of support calls?

Enterprise control

Certain job functions require access to very sensitive data, and mobile devices are being embedded into business processes such as manufacturing, transportation and retail transactions. In these roles, IT needs complete control over the mobile devices and applications installed on them.

Here are the four key steps to enjoying the benefits of bring your own device:

Plan

Conduct a cost/benefit analysis while deciding how you will enable mobile and who will have access. Not determining a policy is risky: if you don't, BYOD will “just happen” without controls. Decide on the depth of access to be allowed to each segment of users: “mobile optional,” “mobile enhanced,” or “mobile primary.” Determine mobile device funding and security policies for each segment, then estimate the total IT system and support needed.

Secure and manage

71 percent of CEOs and IT managers say that security is their most significant mobile enterprise challenge. Carefully choose which technologies will be used to manage and secure mobile devices. A smartphone containing confidential data can be stolen or lost—putting sensitive information in the wrong hands. Your mobile enterprise system must be flexible enough to control connections to an ever-growing variety of devices.

Communicate your BYOD policy

39 percent of organizations have already had a data breach due to an employee's or contractor’s lost or stolen mobile device. Do your people understand the risks? Communicate which data may be accessed and which devices are appropriate. Make rules clear to employees up-front—what they may or may not do—and provide lessons on how to comply and get the most out of their access.

Support

Guaranteed, there will be many more calls to your Help Desk concerning and a wide variety of devices, and the answers will take longer to find. This is where you need to invest up-front to gain the long-term benefit of granting your employees access through personal devices.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote