SlideShare a Scribd company logo
Glossary of PCI Terms
Here is a glossary of terms associated with PCI.
Approved Scanning Vendor (ASV)
In order to be PCI Compliant, you will require a successful scan
certificate from an Approved Scanning Vendor. An ASV will certify
you that you are up to all the technical requirements. ASVs are
enlisted by PCI SSC on the basis of their performance.
Audit log
It is the record of activities of system up to a certain date; but it
should have enough details to track back sequence of events that go
from the beginning of transaction to the end.
Card holder Data (CD)
Cardholder data contains full Primary Account Number (PAN).
Cardholder data also contains the following information:
· Name of the Cardholder
· Expiration Date
· Service Code (optional)
Card holder Data Environment (CDE)
It is an environment containing all the processes and technology
including the people that process, transmit or store customer
cardholder information or authentication information. CDE also
includes connected system components and virtualization technology
like applications, servers etc.
Encryption
The conversion of text into coded form is known as encryption. Only
the people having the specific decrypting codes can get access to such
data and only through a specific cryptographic key this data can be
accessed. This puts a barrier between unauthorized disclosure and the
encryption and decryption process.
File Integrity Monitoring
This concludes if the files or logs have been changed or altered in any
way. When specific important files or logs are changed, PCI sends
notifications and alerts to the security personnel.
Firewall
This technology keeps the network protected from unauthorized
access by limiting or stopping traffic among networks having different
security level based on specific criteria. Hosting options of PCI
Compliance has various types of firewalls, including dedicated
firewall appliances, virtual private firewalls, and shared firewalls.
Intrusion Detection Service (IDS)
This is the software or hardware that gives alerts about network or
system intrusions. This system might have alert sensors, a centralized
logging system and monitoring options to keep track of events.
Intrusion Prevention Service (IPS)
It is same as the Intrusion Detection Service, while IDS detects the
intrusions the IPS tries to prevent the intrusions or possibly block the
intrusions detected by the IDS.
Penetration Test
This is a test conducted on applications and network and also on
processes and controls, to check any vulnerability and to know about
how much at risk is the security and how openly can security be
accessed or breached.
Primary Account Number (PAN)
The Primary Account Number is also known as unique payment card
number or account number that gives details about the cardholder
account and the issuer, it is used for either credit or debit cards.
Private Network
Private networks consider using private IP address space and their
access must be protected through firewalls and routers from a public
network.
Service Provider
Service provider is a non-payment brand entity that processes, stores
or transmits payment cardholder data. Any company that affects the
security of the payment cardholder information is included as the
service provider, i.e. a company providing management services or a
company providing hosting services by managing firewalls, IDS, etc.
HighProxies:
https://www.highproxies.com

More Related Content

PPTX
P2PE - PCI DSS
PPTX
Introduction to Token Service Provider (TSP) Certification
PDF
PCI DSS for Pentesting
PPTX
PCI DSS for Penetration Testing
PPTX
PCI DSS Compliance
PPTX
PCI DSS 2.0 Detailed Introduction
PPTX
A practical guides to PCI compliance
PDF
1. PCI Compliance Overview
P2PE - PCI DSS
Introduction to Token Service Provider (TSP) Certification
PCI DSS for Pentesting
PCI DSS for Penetration Testing
PCI DSS Compliance
PCI DSS 2.0 Detailed Introduction
A practical guides to PCI compliance
1. PCI Compliance Overview

What's hot (20)

PDF
Pci ssc quick reference guide
PPTX
Introduction to PCI DSS
PDF
Digital Identification Systems, pune, Security Solutions
PDF
PCI-DSS_Overview
PPS
P0 Pcidss Overview
PPTX
An Introduction to PCI Compliance on IBM Power Systems
PDF
Pcidss qr gv3_1
PDF
PCI Compliance White Paper
PDF
Payment Card Industry (PCI) Data Security Standard Glossary, Abbreviations an...
PPT
PCI DSS
PDF
Quick Reference Guide to the PCI Data Security Standard
PDF
PCIDSS compliance made easier through a collaboration between NC State and UN...
PPTX
Security Ecosystem of Digital Wallets
PPTX
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
PDF
PCI Compliance: What You Need to Know
PDF
Hpe secure data-payments-pci-dss-control-applicability-assessment
PDF
Hitachi ID Privileged Access Manager
PPTX
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PDF
Best Practices for PCI Scope Reduction - TokenEx & Kyte
PPTX
PCI Descoping: How to Reduce Controls and Streamline Compliance
Pci ssc quick reference guide
Introduction to PCI DSS
Digital Identification Systems, pune, Security Solutions
PCI-DSS_Overview
P0 Pcidss Overview
An Introduction to PCI Compliance on IBM Power Systems
Pcidss qr gv3_1
PCI Compliance White Paper
Payment Card Industry (PCI) Data Security Standard Glossary, Abbreviations an...
PCI DSS
Quick Reference Guide to the PCI Data Security Standard
PCIDSS compliance made easier through a collaboration between NC State and UN...
Security Ecosystem of Digital Wallets
GACO Webinar: Practical Cybersecurity Compliance for Small Business Contractors
PCI Compliance: What You Need to Know
Hpe secure data-payments-pci-dss-control-applicability-assessment
Hitachi ID Privileged Access Manager
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
Best Practices for PCI Scope Reduction - TokenEx & Kyte
PCI Descoping: How to Reduce Controls and Streamline Compliance
Ad

Similar to Glossary of PCI terms (20)

PDF
Adventures in PCI Wonderland
PPTX
Payment Card Acceptance PCI Compliance for Local Governments 2012
PPTX
SFISSA - PCI DSS 3.0 - A QSA Perspective
PDF
Pci dss intro v2
PDF
Does your API need to be PCI Compliant?
PDF
Tripwire pci basics_wp
PPTX
Payment card industry standrad 12 requiremnets.pptx
PPTX
PCI DSS Compliance Readiness
PPTX
Making Compliance Business as Usual
PPTX
PCI DSS & PA DSS Version 3.0 Changes Webinar
PPT
Experience for implement PCI DSS
PPTX
Maze & Associates PCI Compliance Tracker for Local Governments
PPT
pci-comp pci requirements and controls.ppt
PDF
PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...
PDF
Pci standards, from participation to implementation and review
PPTX
PCI Compliance for Community Colleges @One CISOA 2011
DOCX
Online_Transactions_PCI
PDF
Credit Card Processing for Small Business
PPTX
Payment Card Industry Introduction 2010
PPTX
Introduction to PCI APR 2010
Adventures in PCI Wonderland
Payment Card Acceptance PCI Compliance for Local Governments 2012
SFISSA - PCI DSS 3.0 - A QSA Perspective
Pci dss intro v2
Does your API need to be PCI Compliant?
Tripwire pci basics_wp
Payment card industry standrad 12 requiremnets.pptx
PCI DSS Compliance Readiness
Making Compliance Business as Usual
PCI DSS & PA DSS Version 3.0 Changes Webinar
Experience for implement PCI DSS
Maze & Associates PCI Compliance Tracker for Local Governments
pci-comp pci requirements and controls.ppt
PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...
Pci standards, from participation to implementation and review
PCI Compliance for Community Colleges @One CISOA 2011
Online_Transactions_PCI
Credit Card Processing for Small Business
Payment Card Industry Introduction 2010
Introduction to PCI APR 2010
Ad

Recently uploaded (20)

PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Introduction to Artificial Intelligence
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Cost to Outsource Software Development in 2025
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
How to Choose the Right IT Partner for Your Business in Malaysia
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Computer Software and OS of computer science of grade 11.pptx
Wondershare Filmora 15 Crack With Activation Key [2025
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
CHAPTER 2 - PM Management and IT Context
Which alternative to Crystal Reports is best for small or large businesses.pdf
Odoo Companies in India – Driving Business Transformation.pdf
L1 - Introduction to python Backend.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Designing Intelligence for the Shop Floor.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Softaken Excel to vCard Converter Software.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Introduction to Artificial Intelligence
Navsoft: AI-Powered Business Solutions & Custom Software Development
Cost to Outsource Software Development in 2025
iTop VPN Free 5.6.0.5262 Crack latest version 2025

Glossary of PCI terms

  • 2. Here is a glossary of terms associated with PCI. Approved Scanning Vendor (ASV) In order to be PCI Compliant, you will require a successful scan certificate from an Approved Scanning Vendor. An ASV will certify you that you are up to all the technical requirements. ASVs are enlisted by PCI SSC on the basis of their performance.
  • 3. Audit log It is the record of activities of system up to a certain date; but it should have enough details to track back sequence of events that go from the beginning of transaction to the end.
  • 4. Card holder Data (CD) Cardholder data contains full Primary Account Number (PAN). Cardholder data also contains the following information: · Name of the Cardholder · Expiration Date · Service Code (optional)
  • 5. Card holder Data Environment (CDE) It is an environment containing all the processes and technology including the people that process, transmit or store customer cardholder information or authentication information. CDE also includes connected system components and virtualization technology like applications, servers etc.
  • 6. Encryption The conversion of text into coded form is known as encryption. Only the people having the specific decrypting codes can get access to such data and only through a specific cryptographic key this data can be accessed. This puts a barrier between unauthorized disclosure and the encryption and decryption process.
  • 7. File Integrity Monitoring This concludes if the files or logs have been changed or altered in any way. When specific important files or logs are changed, PCI sends notifications and alerts to the security personnel.
  • 8. Firewall This technology keeps the network protected from unauthorized access by limiting or stopping traffic among networks having different security level based on specific criteria. Hosting options of PCI Compliance has various types of firewalls, including dedicated firewall appliances, virtual private firewalls, and shared firewalls.
  • 9. Intrusion Detection Service (IDS) This is the software or hardware that gives alerts about network or system intrusions. This system might have alert sensors, a centralized logging system and monitoring options to keep track of events.
  • 10. Intrusion Prevention Service (IPS) It is same as the Intrusion Detection Service, while IDS detects the intrusions the IPS tries to prevent the intrusions or possibly block the intrusions detected by the IDS.
  • 11. Penetration Test This is a test conducted on applications and network and also on processes and controls, to check any vulnerability and to know about how much at risk is the security and how openly can security be accessed or breached.
  • 12. Primary Account Number (PAN) The Primary Account Number is also known as unique payment card number or account number that gives details about the cardholder account and the issuer, it is used for either credit or debit cards.
  • 13. Private Network Private networks consider using private IP address space and their access must be protected through firewalls and routers from a public network. Service Provider Service provider is a non-payment brand entity that processes, stores or transmits payment cardholder data. Any company that affects the security of the payment cardholder information is included as the service provider, i.e. a company providing management services or a company providing hosting services by managing firewalls, IDS, etc.