Security related to credit cards, Other Subject


Credit card safety relies on the physical safety of the plastic card in addition to the privacy of the credit card number. Consequently, whenever a person other than the card holder has access to the card or its number, security is potentially compromised. Merchants often accept credit card numbers with no extra confirmation for mail order purchases. They though record the delivery address as a security calculates to reduce fake purchases. Various merchants will admit a credit card number for in-store purchases, upon which access to the number permit simple fraud, but many need the card itself to be there, and need a signature. Thus, a stolen card can be cancelled, and if this is complete rapidly no fraud can take place in this way used for internet purchases, there is occasionally the same level of security as for mail order (number only) therefore involve only that the cheater take care about collecting the goods, but frequently there are additional measures.  The major one is to need a security PIN with the card, which need that the thief has access to the card, as well as the PIN.

A supplementary characteristic to secure the credit card transaction and ban the use of a misplaced credit card is the MobiClear resolution. Every transaction is valid through a call to the user cellular phone. The transaction is free once the deal has been definite by the cardholder approaching his/her pincode during the call.

The PCI DSS is the security standard issued by The PCI SSC (Payment Card Industry Security Standards Council). This data security standard is used by acquiring banks to impose cardholder data security measures ahead their merchants.

Posted Date: 10/13/2012 1:26:48 AM | Location : United States

Related Discussions:- Security related to credit cards, Assignment Help, Ask Question on Security related to credit cards, Get Answer, Expert's Help, Security related to credit cards Discussions

Write discussion on Security related to credit cards
Your posts are moderated
Related Questions
Neural basis of speech and language Elucidating the neural basis of speech and language has been one of the greatest challenges in cognitive neuroscience. Much of what we know tod

Controls   When Management chooses to moderate a risk, they will do so by execute one or more of three dissimilar types of controls. Administrative Administrative cont

Question: (a) You should always ask your commercial printer what they consider as "camera ready" before you start the job. Describe Camera-ready Art? (b) Describe what is ha

Describe the factors which decide the broad area of Scientific activity?

What is pragmatism and what should be the role of teacher according ti it.

• Consider your own clinical practice setting and clearly identify a key practice issue or problem that could be improved using appropriate evidence (research) to support the chang

Question 1 Explain any five main features of Indian economy Question 2 Write short note on                         a) Gross domestic product (GDP)

Human interactions are influenced by cultural settings. Explain how cultural settings influence our understanding and implementation of assertiveness.

I want to know some ethical conflict in sri lanka and compare it relative to deontological and teleological theory

Connectivity Using a B2B Protocol Exchange As earlier mentioned, some suppliers participating in a private marketplace desire to remain the catalog contents to them and not par