wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

security requirements for safe e-payment

profile
Suraj OP
Aug 28, 2022
1 Like
0 Discussions
75 Reads

Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enabled users to employ the existing credit card payment infrastructure on an open network in a secure fashion. However, it failed to gain attraction in the market. Visa now promotes the 3-D Secure scheme.

 

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality


Comments ()


Sign in

Read Next

SQL Injection

Blog banner

Dos (Denial of service) Attack

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

The seven-step improvement process

Blog banner

Penetration Testing

Blog banner

About myself

Blog banner

Operating system

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Embaded operating system

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Software

Blog banner

How to Run your First android App

Blog banner

ADIDAS

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Virtual memory

Blog banner

10 Survival Tips that might save your life

Blog banner

Operating system

Blog banner

Deadlock and Starvation

Blog banner

Information of meesho company

Blog banner

Race Condition in Operating Theatre

Blog banner

Review on Recovering Deleted Files

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Concurrency and memory

Blog banner

Starvation

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Direct Memory Access

Blog banner

Assignment 2

Blog banner

Water Resources are about to exhaust...

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

OS Assignment-3

Blog banner

DISK SCHEDULING

Blog banner

Multiple processor scheduling

Blog banner

NETWORK SECURITY RISKS

Blog banner

Emailing the merger document

Blog banner

Service Design Model

Blog banner

Virtual memory

Blog banner