wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

security requirements for safe e-payment

profile
Suraj OP
Aug 28, 2022
1 Like
0 Discussions
75 Reads

Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enabled users to employ the existing credit card payment infrastructure on an open network in a secure fashion. However, it failed to gain attraction in the market. Visa now promotes the 3-D Secure scheme.

 

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality


Comments ()


Sign in

Read Next

What do you mean by online marketing and why do you need to know about it

Blog banner

K-means use cases

Blog banner

Paginng In OS

Blog banner

Apache Kafka

Blog banner

TAILS OS

Blog banner

Modern OS

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Understanding the 'Ambiverts'

Blog banner

Memory Management Techniques

Blog banner

To travel is to live

Blog banner

Benefits and drawback of web security.

Blog banner

Cyber Security Standards

Blog banner

RAID

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Twisted world

Blog banner

Deadlock

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

CRISP-DM Methodology

Blog banner

Sage

Blog banner

Threads

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Cache Memory in Operating Systems

Blog banner

RAID

Blog banner

Blockchain Transactions

Blog banner

Cache Memory

Blog banner

Modern operating system

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Friendship

Blog banner

Crypto tax evasion

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Multicore CPUs

Blog banner

What is Email? Uses of Emails

Blog banner

Instagram

Blog banner

A buffer overflow

Blog banner

The most common internet security threats

Blog banner