Security related to credit cards, Other Subject

Security

Credit card safety relies on the physical safety of the plastic card in addition to the privacy of the credit card number. Consequently, whenever a person other than the card holder has access to the card or its number, security is potentially compromised. Merchants often accept credit card numbers with no extra confirmation for mail order purchases. They though record the delivery address as a security calculates to reduce fake purchases. Various merchants will admit a credit card number for in-store purchases, upon which access to the number permit simple fraud, but many need the card itself to be there, and need a signature. Thus, a stolen card can be cancelled, and if this is complete rapidly no fraud can take place in this way used for internet purchases, there is occasionally the same level of security as for mail order (number only) therefore involve only that the cheater take care about collecting the goods, but frequently there are additional measures.  The major one is to need a security PIN with the card, which need that the thief has access to the card, as well as the PIN.

A supplementary characteristic to secure the credit card transaction and ban the use of a misplaced credit card is the MobiClear resolution. Every transaction is valid through a call to the user cellular phone. The transaction is free once the deal has been definite by the cardholder approaching his/her pincode during the call.

The PCI DSS is the security standard issued by The PCI SSC (Payment Card Industry Security Standards Council). This data security standard is used by acquiring banks to impose cardholder data security measures ahead their merchants.

Posted Date: 10/13/2012 1:26:48 AM | Location : United States







Related Discussions:- Security related to credit cards, Assignment Help, Ask Question on Security related to credit cards, Get Answer, Expert's Help, Security related to credit cards Discussions

Write discussion on Security related to credit cards
Your posts are moderated
Related Questions
QUESTION "Diplomacy is a tool of politics". (a) What similarities or differences can you draw between diplomacy and politics? Diplomacy has been instrumental in shaping t

Problem 1 In what ways can radio be a better medium for transmitting messages to an audience? Problem 2 (a) Explain three different types of radio interviews and illust

What is B2C e-commerce? Business-to-consumer (B2C) e-commerce or commerce between companies and consumers, includes customers gathering information, information goods (or goods

Mary who, 42, lives with husband and 5 children aged 5 to 18. Mary had an Italian father and an aboriginal mother and was born and lives in remote western Queensland all her life.

how do you write a profile of someone. please give suitable profile titles. i have to write a profile on bishop poleni. we have never ever written profiles before in class and my e

Problem 1: (a) Describe the process of counseling and show how the technics used by the counselor can have an effect on the client. (b) How does the counselor handle the p

Hi i need help on how to write an anylitical essay on the topic above

Explain Symbolic Interaction Theory and discuss its perspective on social processes, inequality, and institutions.  Provide specific examples from the textbook to explain how this

Social Geography: Social geography is the branch of human geography that is most closely related to social theory in general and sociology in particular, dealing with the relation

Question: (a) "In counseling, there is rarely any convergence in the legal and ethical structure" Critically assess the validity of this statement (b) Does the legal proce