Investigation of Payment Cards Systems Information Security Control
Investigation of Payment Cards Systems Information Security Control
Abstract—Using Payment Card Industry Data Security documents which regulate bank activities. NBU's
Standard (PCI DSS), introduced to the required obligatory (National Bank of Ukraine) instruction "About special
execution in 2008 for all organizations working with card payment means emission and transactions with them"
systems VISA, MasterCard, American Express, Discover adopted 30.04.2010 [6] regulates the payment cards
and JCB, has been described. Considered all the 12
requirements of the standard, proved their productivity and
security standard documents. Considered payment cards
the main ways of these requirements implementation in work peculiarities the following issues must be regulated:
payment cards automatic systems have been investigated. x payment cards emission security work support;
x bank actions directed on payment cards
Keywords—payment cards, standard, requirements, transaction risks minimizing;
authorized staff, privileges, coding, encryption, decryption x security support during transactions with payment
cards and work with overdraft clients debts.
I. INTRODUCTION
II. PCI DSS SEQURITY STANDARD PURPOSE
New information technologies not only widened
business possibilities during the last years but also Growth of losses from payment cards transactions
increased its susceptibility. On one hand electronic became one of the main reasons that forced international
document and data exchange with clients and partners payment systems to join their efforts and take additional
through the Internet makes business more effective [1], measures to secure their clients. With this aim in 2004 a
but on the other hand it threatens company's security [4]. common security requirement document was adopted -
There are no impregnable systems. Corporative net Payment Card Industry Data Security Standard. It joined
vulnerability may cause not only financial damage but security standards of the following payment systems:
also reputation damage, loss of competitive advantages VisaInt, MasterCard, American Express, Dicovercard and
and other negative consequences. That is why it is JCB.
important to know how to protect corporative Later, in September 2006 PCI Security Standards
infrastructure from the potential malefactor's actions. Council was established for the purpose of development
However, lately bank information system hacking and implementation of PCI DSS. The main Council's
happens more and more often all over the world, in function is to develop and publish PCI standards,
particular the abusing and stealing of payment card accompany documents, requirements determination for
holders data [3], [5]. That is why banks have to pay a lot the companies that apply for PCI DSS /"QSA"/
of attention to information/data security. At the present certification and scanning /"ASV"/, certification, trainings
banks have the correspondent experience in security of for future QSA auditors and audit control. In their turn
their transactions. It is based on banks' complex approach international payment systems report in accordance to
towards protective measures along all the stages the audit results and evaluate QSA work.
transactions consist of: All organizations authorized by Visa, MasterCard,
x research and improvement of card standard American Express, Discover and JCB to hold, work with
technology base as well as of transactions; and forward payment cards information must meet the
x counteraction to losses caused by abusing during PCI DSS security standard. These organizations are banks,
emission and acquiring; other suppliers of payment services, Internet shops and
x training of bank and trading (service) enterprises traditional trade enterprises.
personnel and obligatory qualification test for Conformity is not one-time requirement. Trade
those who have access to bank products - payment enterprises should show their conformity status once per
cards. year, at the same time provide the conformity support
Bank security documents including payment cards permanently.
security documents are among the most important bank
Authorized licensed use limited to: Montclair State University. Downloaded on October 09,2023 at 00:11:16 UTC from IEEE Xplore. Restrictions apply.
III. STANDARD REQUIREMENTS the market. Otherwise the system will be additionally
There are 12 obligatory requirements: vulnerable.
A. Intersystem Screen Configuration and Support for G. Data Access Delimitation in Accordance With Office
the Purpose of Card Holder Data Security Needs
The requirement was proved to be important not long Only authorized personnel have access to important
ago and points out on a necessity to use firewalls of ISA data. The best way is to introduce the so-called "white
type. Contemporary firewalls block attacks on the session lists" - in other words everything is prohibited. First all
level as well as initialization of dangerous to web sites and privileges are cancelled, and after only authorized
systems code that cannot be protected with the older personnel gets minimal rights enough for to work with
solutions. data.
B. Not to Use Manufacturer Installed by Default System H. Giving Each Person a Unique Identification Number
Passwords and Other Security Parameters It helps to solve the problem when several users with
This requirement is not excessive since the majority of equal rights have an access to one and the same data base.
companies - more than 60% - violate the rule installing Double identification should be used for to strengthen
and using passwords by default [2]. Trusted Computing access control. The remote access with the help of
base can be also used by malefactor. Operational systems RADIUS and TACACS+ technologies gives more secure
and applications are usually equipped with automatic identification.
updating systems, but the majority of users do not pay I. Physical Data Access Limitation
attention to it and do not update software from the For security reasons the card information should be
moment it was installed. Malefactors take the advantage processed and stored in a secure place. If it is not available
of it.
for some reason the physical control should be applied.
It also stands in the standard that the administrative Data classification and paper resources are covered by the
access code cannot be neglected. The IPSec, SSTP, SSL,
rule.
SSL/TLS technologies help with secure connection, that is
especially important in case of remote administrative J. Net Resources Access Monitoring
access. Audit is one of the PCI conformity key components. It
C. Card Holders Data Security Support helps to prove that the authorized user has access to the
card data and reveal unauthorized access attempts.
The requirement describes card holder/user data Monitoring and audit require date, time and transaction
(emitter bank is card owner). Ciphering should be used for
result recording.
security purpose. Any recorded information should be also
ciphered. The standard is very precise: PIN-codes must K. Regular Security System and Process Testing
not be recorded, but the rule is not always followed. Regular security system testing is a part of PCI
D. Card Holder Data Ciphering During Their standard. The systems with payment card information are
Forwarding Through the Public Opened Networks scanned. For companies that have web sites with online
payment opportunity, or store the credit card information
The requirement continues the previous one and is no
online (even one-time storage), or forward payment card
less important during payment transactions. The data with API monthly scanning is necessary.
requirement describes how data should be ciphered,
folded, distributed, secured, stored, forwarded, exchanged L. Information Security Policy Availability and
and how cipher keys should be stored. Following
E. Antivirus Software Using and Updating Security policy concerns all PCI DSS requirements. It
should be worked out, published, spread and supported in
The requirement can be standard itself, but usually a
workable condition. It should contain maintenance rules
big percentage of users do not have antivirus programs or for critical devices and be precise about personnel and
make mistakes using them. These users usually have weak
partners duties concerning information security policy.
updating strategies and/or incorrectly installed antivirus The official personnel security upgrading program should
program that does not update itself and does not inform be adopted and implemented.
personnel about necessary updating [2].
F. Secured System and Application Research and IV. SOFTWARE SAFEGUARDS CONSTRUCTION
Support PRINCIPLES AND DEMANDS
The correct application research and its further life Information protection software most significant
turned from recommendation to requirement in the PCI demerit is possibility to implement them in structural
DSS standard. Research and use are separated in it. All elements of automatized systems only with processor.
test elements must be deleted before the product comes to Other information protection software demerits are:
652
Authorized licensed use limited to: Montclair State University. Downloaded on October 09,2023 at 00:11:16 UTC from IEEE Xplore. Restrictions apply.
x Using processor operate time which increases and decrypt data, maintain their integrity as well as work
request response time and therefore reduces up digital signatures and certificates.
working operating efficiency. At the highest level Cryptography namespace could be
x Decreasing of RAM volume as well as HDD divided into four main parts, as shown at the Table I.
volume accessible for functional tasks to use.
TABLE I. MAIN ELEMENTS OF CRYPTOGRAPHY NAMESPACE
x Possibility of random or suitable change, which
may cause not only loosing protection functions Element Description
but also become an additional security hazard. Encryption Set of classes using for symmetric and
x Restrictions due to strict orientation on the some algorithm asymmetric encryption as well as for hashing.
types data-flow computers architecture (even
among the same class) – program depending on Assisting Classes maintaining random number
classes generation, providing transformation,
distinctive features of basic input/output system, cooperation with CryptoAPI libraries as well as
break-point vector table etc. encryption itself based on the stream model.
During organizing information protection software the .509 Classes determined at the namespace
most typical is development of complex programs certificates System.Security.rptograph.
509Certificates presenting digital certificates.
fulfilling a number of protection functions, mostly users Digital Classes determining System.Cryptography.Xml
detecting, delimitation access to data dimensions, signatures at namespace and presenting digital signatures
forbidding access to some RAM areas etc. The advantages XML at XML-documents.
of such programs are obvious: each program provides
solving a number of important protection problems. VI. MAIN SYMMETRIC ALGORYTHMS REALIZATION IN
Taking into account the described demerits and # LANGUAGE AT .NET FRAMEWORK
advantages, information protection software should Symmetric cryptoalgorithms DES and 3DES (TDES)
confirm such demands as: functional completeness, are a few of symmetric cryptoalgorithms available from
flexibility and unified using. standard crypto-providers CryptoAPI.
Provided analysis showed that the most complete Generally DES has been no longer secure algorithm,
correspondence for flexibility and unified demands therefore it could be used only in the systems where
provides such set of principles: open-ended module encryption safety is not critical.
structure, total structuring, presentation at the machine- Algorithm 3DES uses different keys DES for each of
independent language. iteration. 3DES/Triple DES variant using 2 keys is the
Open-ended module construction principle lie in the mostly used application in applied systems.
fact that any program at any level or volume has to be For investigation of data encryption/decryption during
presented as a system of possible modules. At the same their transferring in the unprotected environment was used
time every module at any level must be completely self- program module at C#, where beside DES and 3DES was
supporting and have standard input and output, which realized AES algorithm, which is presented by the class
allow connection with any other modules. Therefore, Rijndael in .NET. This algorithm supports keys with
program software should be developed according to the length 128, 192 and 256 bits.
“downwards” principle i.e. according to total structuring Hereafter are presented open text and obtained its
principle. cryptogram encrypted by Triple DES algorithm, key
Formulation at machine-independent language means length 192 bits with password “Rhbgnjpf[bcn” (Fig. 1, 2,
that program module presentation should be in the form 3).
allowing to include them most easily into the program
software of any automatized system. Such languages are
often multiplatform and have been supported by MS
CryptoAPI 2.0 and .NET Framework environments.
V. CRYPTOAPI ENVIRONMENT
CryptoAPI supports work with symmetric and
asymmetric keys i.e. allows data encryption and
decryption as well as works with electronic certificates.
Set of supported cryptographic algorithms depends on the
concrete crypto-provider. The main part of cryptographic
classes .NET is based on the crypto-providers CryptoAPI.
.NETFramework includes a set of cryptographic
services, which are expanding similar Windows services
using CryptoAPI. System.Security.Cryptography
namespace opens program access to different
cryptographic services, using which supplements encrypt Figure 1. Encryption demonstration.
653
Authorized licensed use limited to: Montclair State University. Downloaded on October 09,2023 at 00:11:16 UTC from IEEE Xplore. Restrictions apply.
x Simplicity of using – by means of available
simple interface.
Since used in program module algorithms have been
encryption international standards, therefore this module
could be used as a mean providing data security during
their storage as well as transferring through unprotected
net in pursuance of standard PCI DSS demands.
VII. CONCLUSIONS
PCI DSS is used to determine payment card holders
information security and to give recommendations to trade
Figure 2. Open text: ATM3598 – bankomat identifier; 2625 –
and service enterprises, software producers and suppliers
account number; 4042610070973332 – card number; 141965 – about software security.
security symbol; 2729 – client’s PIN; 50 – quantity of requested The standard was adopted for to help card holders and
money in UAH; 685 – transaction number; 008003990225 – all data card information holding organizations to secure their
message control code.
business and minimize losses from fraud. It helps
organizations that work with cards to upgrade their
security level. But it cannot be taken as the only reason for
the abovementioned measures.
Elements of cryptographic protection were observed in
the paper as one of the Standard demands. Were described
means of encryption symmetric algorithms realization in
the .NET Framework environment and presented example
of encryption module, developed in this environment.
Module is available in open access and could be integrated
into any security system since was realized in high-level
program language.
Presented program realized encryption and decryption
and writes its work results into the text file. Program
allows to choose crypto algorithm itself as well as the
Figure 3. Cryptographed message. level of its stability (through key length determining)
direct-acting before the work beginning.
Decoding is providing similarly indicating file
addresses using the same password. Changing password REFERENCES
changes also generated on its base key and initialization [1] S. Budzherak, “Investigation of methods providing information
vector making decoding impossible. security in SWIFT system,” XIII International PhD Workshop
Summarizing, such program module possesses OWD 2011, 22–25 October 2011, Gliwice pp. 110–112, Web-
page. - http://mechatronika.polsl.pl/owd/pdf2011/110.pdf
following advantages: [2] R.M. Magalhaes, “PCI DSS security,” Section: Web-page. -
x Variability – possible to select encryption http://www.windowsecurity.com
algorithm and its stability level (key length) [3] V.Gaikovitch, A.Pershin, Electronic Bank Systems Security.
direct-acting during process of each file United Europe, Moscow, 1994. (in Russian)
[4] I. Goldovsky, The Internet Payments Security. Piter, Sankt-
encryption. Petersburg, 2001. (in Russian)
x Flexibility – program module is written at high- [5] V.K. Zadiraka, O.S. Oleksiuk, M.O. Nedashkovsky, Bank
level object-oriented language # and realized at Information Security Methods, Vyshcha Shkola, Kyiv, 1999. (in
the platform .NET Framework allows be widely Ukrainian)
[6] National Bank of Ukraine instruction #223 “About special
used in different systems e.g. systems of the firm payment means emission and transactions with them,” 30.04.2010.
Microsoft as well as in Unix-similar Web-page. - http://zakon1.rada.gov.ua/laws/show/z0474-10. (in
environments. Ukrainian)
654
Authorized licensed use limited to: Montclair State University. Downloaded on October 09,2023 at 00:11:16 UTC from IEEE Xplore. Restrictions apply.