wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

security requirements for safe e-payment

profile
Suraj OP
Aug 28, 2022
1 Like
0 Discussions
75 Reads

Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enabled users to employ the existing credit card payment infrastructure on an open network in a secure fashion. However, it failed to gain attraction in the market. Visa now promotes the 3-D Secure scheme.

 

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality


Comments ()


Sign in

Read Next

How To Secure Operating Systems ?

Blog banner

Answer

Blog banner

Life of an army person

Blog banner

Student Grade Calculator in LISP

Blog banner

How China Regained It's World's Largest Growing Economy Status

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Bharat Maps

Blog banner

DNS Cache

Blog banner

Heart Fulness Meditation

Blog banner

Wiretapping

Blog banner

Virtual Memory

Blog banner

Evolution of Operating system.

Blog banner

File and File System Structure

Blog banner

A little bit of salt is all the hash needs!

Blog banner

ahh wait a min

Blog banner

Rain

Blog banner

Information of meesho company

Blog banner

Linux VServer Architecture

Blog banner

Race condition

Blog banner

GIS Mapping

Blog banner

Disk Management

Blog banner

The Peephole

Blog banner

Service Strategy In ITSM

Blog banner

Direct Memory Access

Blog banner

Spyware

Blog banner

Article on team management software

Blog banner

Corporate Discipline.

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Cyber Security Control

Blog banner

HR Automation : Need of the hour

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Deadlock and Starvation

Blog banner

From Model Mistakes to Metrics

Blog banner

Modern Operating System

Blog banner

INTRODUCTION

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Man In The Middle Attack

Blog banner

Kafka - A Framework

Blog banner

How to tie a Tie

Blog banner

Ambiguous

Blog banner

gis substation

Blog banner

Importance of Website

Blog banner