Author
Jevgenijs Smirnovs
Document name
Point VxPC F02.01.xxx
Implementation Guide
E-mail
jevgenijs.smirnovs@verifone.com
Date
12-Jun-2015
Phone
+371 67844726
Page number
31
Version
1.0
© 2015 VeriFone. All rights reserved. VeriFone, the VeriFone logo, Vx, Mx, VeriCentre, VeriShield, Verix V, Verix and PAYware are either
trademarks or registered trademarks of VeriFone in the United States and/or other countries. All other trademarks or brand names are the
properties of their respective holders. All features and specifications are subject to change without notice.
The information contained in this document is confidential and property of VeriFone, Inc. This material may not be copied or published, or
divulged in part or in totality without written permission form VeriFone, Inc.
Payment Service Provider offers merchants online servi
electronic payments.
Sensitive
Authentication Data
related information (including but not limited to card validation
codes/values, full track data (from the magnetic stripe or equivalent on a
chip), PINs, and PIN blocks) used to authenticate cardholders and/or au-
thorize payment card transactions.
Service Code
A three digit code from the magnetic stripe data defining (1) Interchange
and technology, (2) Authorization processing and (3) Range of services and
PIN requirements.
SNMP
Simple Network Management Protocol
, is a network protocol. It is used
mostly in network management systems to monitor network-attached de-
vices for conditions that warrant administrative attention.
SSH
Secure Shell (SSH) is a network protocol that allows
using a secure channel between two networked devices.
SSL
Secure Sockets Layer is a commonly used method to protect transmission
across public networks. SSL includes strong encryption.
Syslog is a standard for computer data l
Transmission Control Protocol is one of the core protocols of the Internet
protocol suite.
TLS
Acronym for “Transport Layer Security.” Designed with goal of providing
data secrecy and data integrity between two communicating applications.
TLS is successor of SSL.
Terminal Management System.
User Datagram Protocol is one of the core protocols of the Internet proto-
col suite.
WEP
Wired Equivalent Privacy, a wireless network security standard. Sometimes
erroneously called "Wireless Encryption Protocol". Weak algorithm used to
encrypt wireless networks. Several serious weaknesses have been identi-
fied by industry experts such that a WEP connection can be cracked with