Page 1 - GS220401
P. 1

April 11, 2022  •  Issue 22:04:01

              Navigating multi-layered security






                                                               Until we uncover the root cause of payment data theft and
                                                               fraud,  he  added,  piling  on  compliance  and  certifications
                                                               will do nothing more than lock the front door while keeping
                                                               the back door wide open.

                                                               Authentication
                                                               Deignan pointed out that every payment system relies on an
                                                               authorization network that issues approvals and declines.
                                                               Authorizations are binary processes; they say yes, I give my
                                                               consent to move value, or no, I do not, and if we were to rely
                                                               solely on authorizations, all kinds of fraud would occur, he
                                                               stated.

                                                               Authentication, on the other hand, is the act of measuring,
                                                               proving or asserting genuineness, Deignan said. It answers
                                                               the questions: is it real, is it true, is it valid or is it genuine? If
                                                               you authenticate cardholders, merchants and issuers, all
        By Dale S. Laszig                                      relying parties could trust the whole transaction, which
                                                               would remove the incentive for threat actors to steal, he
                    ulti-layered security strategies are top of mind   said.
                    for cybersecurity specialists, and approach-
                    es are as varied as individual technologies.   Deignan additionally noted that every transaction has
        M The Green Sheet asked six information secu-          multiple  elements  to authenticate,  such  as  payor,  payee
        rity leaders for their views on security best practices; their   and physical devices, and the authentication process must
        responses reflect a common commitment and diversity of   establish exactly who initiated the payment and is a party
        methodologies. This article explores what some experts call   to it, as well as exact information about the recipient of
        a holistic security strategy: ways in which layered technolo-  the funds. This can be accomplished by authenticating
        gies secure and protect physical and digital environments.   appropriate  credentials,  which  he  summarized  as
                                                               "something the user has, knows or is."
        Andrew Deignan is global vice president of marketing
        at MagTek, a company that has focused on security for
        more than 25 years. "We have advocated on behalf of
        our customers, and ultimately cardholders, that a system
        reliant on static authorization data will always be a target   Contributed articles inside by:
        for threat actors," he said. "As an industry, we have placed   Lee Hansen .............................................................................................19
        the onus on merchants to protect what the issuers expose
        in plain view on the front and back of the cards they issue."  Natasa Cvijanovic .................................................................................28

        Deignan acknowledged that progress has been made but     Nicholas Cucci, C.F.E. ...........................................................................30
        suggested the industry focuses too much on compliance    Tyler Kem .................................................................................................32
        and  certifications  and  not  enough  on  practical  security.
        This approach tends to stifle innovation, he noted, while   Chad Otar ................................................................................................34
        burdening POS devices with multi-level certifications and   TOC on page 3
        leaving payments systems vulnerable to theft and fraud.


                                                                                      Continued on page 26
   1   2   3   4   5   6