wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security requirements for Safe E-Payments

profile
HARSH KUMAWAT
Aug 28, 2022
1 Like
0 Discussions
83 Reads

Security measures in International and Cross Border financial transactionsSecurity Requirements for Safe E-Payment Systems

The concrete security requirements of electronic payment systems vary, depending on both on their features and the trust assumptions placed on their operation. In general, however, electronic payment systems must exhibit integrity, authorization, confidentiality, availability, and reliability

 

 

 

1. Integrity and authorization 

A payment system with integrity allows no money to be taken from a user without explicit authorization by that user.It may also disallow the receipt of payment without explicit consent, to prevent occurrences of things like unsolicited bribery.Authorization constitutes the most2. Out-band authorizatio.In this approach, the verifying party (typically a bank) notifies the authorizing party (the payer) of a transaction.The authorizing party is required to approve or deny the payment using a secure, out-band channel (such as via surface mail or the phone).This is the current approach for credit cards involving mail orders and telephone orders: Anyone who knows a user's credit card data can initiate transactions, and the legitimate user must check the statement and actively complain about unauthorized transactions. If the user does not complain within a certain time (usually 90 days), the transaction is considered "approved" by default

 

 

2. Password authorization

A transaction protected by a password requires that every message from the authorizing party include a cryptographic check value.The check value is computed using a secret known only to the authorizing and verifying parties.This secret can be a personal identification number, a password, or any form of the shared secret.In addition, the shared secret that is short like a six-digit pin is inherently susceptible to various kinds of attacks.They cannot by themselves provide a high degree of security. They should only be used to control access to a physical token like a smart card (or a wallet) that performs the actual authorization using secure cryptographic mechanisms, such as digital signatures4. Signature authorization.In this type of transaction, the verifying party requires the digital signature of the authorizing party Digital signatures provide nonrepudiation of origin: Only the owner of the secret signing key can "sign" messages (whereas everybody who knows the corresponding public verification key can verify the authenticity of signatures.

 

 

3. Confidential

Some parties involved may wish for the confidentiality of  transactions.Confidentiality in this context means the restriction of the knowledge about various pieces of information related to a transaction: the identity of the payer/payee, purchase content, amount, and so on.Typically, the confidentiality requirement dictates that this information be restricted only to the participants involved.Where anonymity or un-traceability are desired, the requirement may be to limit this knowledge to certain subsets of the participants only, as described later

 

 

4. Availability and reliability 

All parties require the ability to make or receive payments whenever necessary.Payment transactions must be atomic: They occur entirely or not at all, but they never hang in an unknown or inconsistent state. No payer would accept a loss of money (not a significant amount, in any case) due to a network or system crash.Availability and reliability presume that the underlying networking services and all software and hardware components are sufficiently dependable.Recovery from crash failures requires some sort of stable storage at all parties and specific resynchronization protocols.These fault tolerance issues are not discussed here because most payment systems do not address them explicitly.    

.    


Comments ()


Sign in

Read Next

MODERN OPERATING SYSTEM

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

What is HTML?

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Race Condition in Operating Theatre

Blog banner

Honeypot in cyber security

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Direct memory access (DMA)

Blog banner

Understanding Regression Analysis

Blog banner

Uniprocessor Scheduling

Blog banner

Direct Memory Access

Blog banner

Importance of education

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Delhi city

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Question

Blog banner

Disk Management

Blog banner

Spyware

Blog banner

SQL Injection

Blog banner

Race Conditions

Blog banner

10 Interesting facts you should know!!!

Blog banner

Memory hierarchy

Blog banner

E-mail security

Blog banner

Malware

Blog banner

Blockchain in IoT Applications

Blog banner

Risk factors in service transistion

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Music

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

GIS

Blog banner

The Memory Hierarchy

Blog banner

Mendeley (management software)

Blog banner

Memory Management in Operating System

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Cryptanalysis tool

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Memory Management in Operating System

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner