Security related to credit cards, Other Subject

Security

Credit card safety relies on the physical safety of the plastic card in addition to the privacy of the credit card number. Consequently, whenever a person other than the card holder has access to the card or its number, security is potentially compromised. Merchants often accept credit card numbers with no extra confirmation for mail order purchases. They though record the delivery address as a security calculates to reduce fake purchases. Various merchants will admit a credit card number for in-store purchases, upon which access to the number permit simple fraud, but many need the card itself to be there, and need a signature. Thus, a stolen card can be cancelled, and if this is complete rapidly no fraud can take place in this way used for internet purchases, there is occasionally the same level of security as for mail order (number only) therefore involve only that the cheater take care about collecting the goods, but frequently there are additional measures.  The major one is to need a security PIN with the card, which need that the thief has access to the card, as well as the PIN.

A supplementary characteristic to secure the credit card transaction and ban the use of a misplaced credit card is the MobiClear resolution. Every transaction is valid through a call to the user cellular phone. The transaction is free once the deal has been definite by the cardholder approaching his/her pincode during the call.

The PCI DSS is the security standard issued by The PCI SSC (Payment Card Industry Security Standards Council). This data security standard is used by acquiring banks to impose cardholder data security measures ahead their merchants.

Posted Date: 10/13/2012 1:26:48 AM | Location : United States







Related Discussions:- Security related to credit cards, Assignment Help, Ask Question on Security related to credit cards, Get Answer, Expert's Help, Security related to credit cards Discussions

Write discussion on Security related to credit cards
Your posts are moderated
Related Questions
You have volunteered to work in the Peace Corps in order to use your skills to benefit others. The country you have been assigned has just ended a 5 year civil war. You show up at

Logical Model – Mapped EERD (Map the conceptual model to a logical model using the relevant steps. Carry out normalisation to 3rd normal forms and discuss the progression through


To remove mucus that may be building up in the throat to avoid the person from chocking and becoming ill this will help to improve the flow of air into the lungs resulting in patie

Principles of Archaeology: Archaeology is the study of past cultural behavior, from the beginnings of the human species to events that happened yesterday, through the material rem

complete a home work questionnaire for parents

Question: (a) Show ego-defense mechanisms giving a real life example for each. (b) What are the basic concepts of reality therapy? (c) Using real life illustrations, ho

Question 1 Discuss the theories of socialization Question 2 How does social control establish unity? Question 3 Based on which levels does man adapt himself to his environmen

Imagine a situation where a young adult has to approach an attractive person of the opposite sex that he (or increasingly nowadays she) wants to ask out for a date. On one hand int

Question: ‘An offshore company is one that does not conduct substantial business in its country of incorporation. It is sometimes known as non-resident company.' (a) What