Payment Card Industry Data Security Standard

The Payment Card Industry Data Security Standard is a worldwide information security standard assembled by the Payment Card Industry Security Standards Council (PCI SSC). The standard was created to help organizations that process card payments prevent credit card fraud through increased controls around data and its exposure to compromise. The standard applies to all organizations which hold, process, or pass cardholder information from any card branded with the logo of one of the card brands.

The standard is maintained by the Payment Card Industry Security Standards Council, which maintains both the PCI DSS and a number of other standards, such as the Payment Card Industry PIN Entry Device security requirements (PCI PED) and the Payment Application Data Security Standard (PA-DSS).

Validation of compliance can be performed either internally or externally, depending on the volume of card transactions the organization is handling, but regardless of the size of the organization, compliance must be assessed annually. Organizations handling large volumes of transactions must have their compliance assessed by an independent assessor known as a Qualified Security Assessor (QSA), while companies handling smaller volumes have the option of self-certification via a Self-Assessment Questionnaire (SAQ). In some regions these SAQs still require signoff by a QSA for submission.

Enforcement of compliance is done by the bodies holding relationships with the in-scope organizations. Thus, for organizations processing Visa or Mastercard transactions, compliance is enforced by the organization’s acquirer, while organizations handling American Express transactions will deal directly with American Express for the purposes of compliance. In the case of third party suppliers such as hosting companies who have business relationships with in-scope organizations, enforcement of compliance falls to the in-scope company, as neither the acquirers nor the card brands will have appropriate contractual relationships in place to mandate compliance. Non-compliant companies who maintain a relationship with one or more of the card brands, either directly or through an acquirer risk losing their ability to process credit card payments and being audited and/or fined.
source : wikipedia

Snort – the de facto standard for intrusion detection/prevention

What is Snort?

Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.

Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as well, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages to Windows clients using Samba’s smbclient.

Snort has three primary uses. It can be used as a straight packet sniffer like tcpdump(1), a packet logger (useful for network traffic debugging, etc), or as a full blown network intrusion prevention system.

The Power of Open Source Development

The roots of Snort’s development methodology hail from the Open Source movement, a movement pioneered by Richard Stallman at MIT during the 1980’s. The idea behind Open Source is that all software should have source code available and be developed by communities of interested developers. This ideology and the power that it unleashes to develop superior software was further explained and highlighted in what is considered to be the seminal treatise on Open Source development, “The Cathedral and the Bazaar” by Eric S. Raymond. In “The Cathedral and the Bazaar”, Raymond outlines how the Open Source development methodology can be leveraged to create superior software compared to traditional proprietary methods. The Snort project relies on this ideology heavily and it’s impact shows, in test after test Snort has come out at or near the top of the heap when compared head to head with other sensor technologies.

The Snort Community

The power and reach of Snort is due in large part to the power and reach of the Snort user community. Aside from the seasoned developers at Sourcefire, there are literally thousands of experienced programmers reviewing and testing the functionality and rule sets. By leveraging the “many eyeballs” theory that was popularized by Eric Raymond and used to launch Linux to success in the operating systems market, people in the open source Snort community worldwide can detect and respond to bugs and other security threats more quickly and efficiently than in a “closed” environment.

To help foster this sense of community and provide a platform for users to share their ideas and experiences, local Snort User Groups have been formed throughout the world. To find a user group in your area, click here.

Ref: http://www.snort.org/about_snort/