Security related to credit cards, Other Subject

Security

Credit card safety relies on the physical safety of the plastic card in addition to the privacy of the credit card number. Consequently, whenever a person other than the card holder has access to the card or its number, security is potentially compromised. Merchants often accept credit card numbers with no extra confirmation for mail order purchases. They though record the delivery address as a security calculates to reduce fake purchases. Various merchants will admit a credit card number for in-store purchases, upon which access to the number permit simple fraud, but many need the card itself to be there, and need a signature. Thus, a stolen card can be cancelled, and if this is complete rapidly no fraud can take place in this way used for internet purchases, there is occasionally the same level of security as for mail order (number only) therefore involve only that the cheater take care about collecting the goods, but frequently there are additional measures.  The major one is to need a security PIN with the card, which need that the thief has access to the card, as well as the PIN.

A supplementary characteristic to secure the credit card transaction and ban the use of a misplaced credit card is the MobiClear resolution. Every transaction is valid through a call to the user cellular phone. The transaction is free once the deal has been definite by the cardholder approaching his/her pincode during the call.

The PCI DSS is the security standard issued by The PCI SSC (Payment Card Industry Security Standards Council). This data security standard is used by acquiring banks to impose cardholder data security measures ahead their merchants.

Posted Date: 10/13/2012 1:26:48 AM | Location : United States







Related Discussions:- Security related to credit cards, Assignment Help, Ask Question on Security related to credit cards, Get Answer, Expert's Help, Security related to credit cards Discussions

Write discussion on Security related to credit cards
Your posts are moderated
Related Questions
Identify the resources that can be used for providing experiences for integrated learning; determine criteria and apply those in selecting appropriate integrated learning expene

Explain Symbolic Interaction Theory and discuss its perspective on social processes, inequality, and institutions.  Provide specific examples from the textbook to explain how this

Cognitive Behavioural Therapy, usually shortened as CBT, is a very practical treatment in which therapist and client work together collaboratively. It centres on the understanding

Do you have global english assigment''s answers? Please

Modern Information Technology Departments: In the early days of computer development, there was no such thing as a college degree in information technology. Software development &

what is the main difference between the two types of balances of art ?

COMMERCIAL ENVIRONMENT The commercial environment team is made up of four main fundamentals: health & safety, food, entertainment premises, and the consultation team. They make

Prepaid "Credit" Cards A prepaid credit card is not a credit card, while no credit is presented by the card issuer: the card-holder spends money which has been "stored" by mean

write a structured algorithm to calculate the cost of five cars (each). If the customs charge is 40percent and VAT is 15 percent

TRANSACTION TYPES A numeral of transaction category may be performing, together with the subsequent: Sale: where the cardholder pays for goods or service Refund: w