Friday, 29th March 2024
To guardian.ng
Search

Telcos, Others Get Impetus to Fight CyberCrime

By Chike Onwuegbuchi
12 February 2016   |   1:10 am
TELECOMMUNICATIONS operators and banks implementing security standards required to protect their networks against hackers can now heave a sigh of relief thanks to the recently released ISACA guidance that simplifies the process. With a template implementation plan, example self-assessment and an audit/assurance programme, the new guideline makes it easier for implementation of security standards such…

Cybercrime

TELECOMMUNICATIONS operators and banks implementing security standards required to protect their networks against hackers can now heave a sigh of relief thanks to the recently released ISACA guidance that simplifies the process.

With a template implementation plan, example self-assessment and an audit/assurance programme, the new guideline makes it easier for implementation of security standards such as PCI DSS version 3.1, COBIT 5 processes among others.

Before the new practical guide, organizations were faced with complex in implementation process that often lead to failure.

The guide solution also provide for mapping of different security standard together which was not in existence before.

Adesanya Ahmed, founder of Petrovice Resources International who was the only Africa appointed expert reviewer for the benchmark said, that a practical guide to the Payment Card Industry Data Security Standard (PCI DSS) explains the security requirements, processes and technologies that are required to implement the Payment Card Industry Data Security Standard (PCI DSS), which is a compliance requirement for all enterprises that process, store, transmit or access cardholder information for any of the major payment brands, such as American Express, Discover, JCB, MasterCard and Visa brands.

Nigeria CommunicationsWeek investigations revealed that the practical guide solution was made available to organizations last month.

He added that the guide provides a comprehensive overview of the PCI DSS and explains how to implement its demanding security requirements.

“The guide also contains a wealth of background information about payment cards and the nature of payment card fraud. The content in this guide goes beyond other sources of information about the PCI DSS by providing the following valued information: Concise summaries of PCI DSS requirements version 3.1, consolidated information from numerous PCI DSS publications background advice on challenging requirements, techniques that are required to scope and implement the requirements, PCI DSS requirements mapped to COBIT 5 processes and International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 27001/2 controls as well as detailed explanation of how to design a professional audit /assurance plan,” he said.

0 Comments