Point-of-Sale (POS) Attacks Overview Suppose you are an information security