Security related to credit cards, Other Subject


Credit card safety relies on the physical safety of the plastic card in addition to the privacy of the credit card number. Consequently, whenever a person other than the card holder has access to the card or its number, security is potentially compromised. Merchants often accept credit card numbers with no extra confirmation for mail order purchases. They though record the delivery address as a security calculates to reduce fake purchases. Various merchants will admit a credit card number for in-store purchases, upon which access to the number permit simple fraud, but many need the card itself to be there, and need a signature. Thus, a stolen card can be cancelled, and if this is complete rapidly no fraud can take place in this way used for internet purchases, there is occasionally the same level of security as for mail order (number only) therefore involve only that the cheater take care about collecting the goods, but frequently there are additional measures.  The major one is to need a security PIN with the card, which need that the thief has access to the card, as well as the PIN.

A supplementary characteristic to secure the credit card transaction and ban the use of a misplaced credit card is the MobiClear resolution. Every transaction is valid through a call to the user cellular phone. The transaction is free once the deal has been definite by the cardholder approaching his/her pincode during the call.

The PCI DSS is the security standard issued by The PCI SSC (Payment Card Industry Security Standards Council). This data security standard is used by acquiring banks to impose cardholder data security measures ahead their merchants.

Posted Date: 10/13/2012 1:26:48 AM | Location : United States

Related Discussions:- Security related to credit cards, Assignment Help, Ask Question on Security related to credit cards, Get Answer, Expert's Help, Security related to credit cards Discussions

Write discussion on Security related to credit cards
Your posts are moderated
Related Questions
Medieval Art: The medieval art of the Western world covers a huge scope of place and time, over 1000 years of art history in, the Middle East, Europe and North Africa. It involved

what are the vitiating factors of a contract?

Question 1: A joiner has received an electric shock from a portable electric, 230 V drill while fitting decorative ceiling board to the lounge of a Guest House. The drill is fi

Cognitive Behavioural Therapy, usually shortened as CBT, is a very practical treatment in which therapist and client work together collaboratively. It centres on the understanding

how do you make fractions equivalent to other fractions

Question : Read the following statement and answer the following questions: ‘The personalities we develop depend largely on the environment in which we live. When a child's

Describe the importance of the discovery rule and how it relates to the statue of limitations.

what are advantages and disadvantaGES OF AIRWAYES

Importance of Information Technology: The prime importance of information technology with regards to education is that various learning resources can be instantly accessed by

Question: a) What do you understand by the terms Forward Kinematics and Inverse Kinematics? Provide an example of an application for each term? b) Explain the term Smooth