wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

security requirements for safe e-payment

profile
Suraj OP
Aug 28, 2022
1 Like
0 Discussions
75 Reads

Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enabled users to employ the existing credit card payment infrastructure on an open network in a secure fashion. However, it failed to gain attraction in the market. Visa now promotes the 3-D Secure scheme.

 

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality


Comments ()


Sign in

Read Next

Virtual Memory

Blog banner

Supervised and unsupervised learning

Blog banner

Software

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

History of Money

Blog banner

To travel is to live

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

File Management In OS

Blog banner

VIRUS

Blog banner

Memory management

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Disk cache

Blog banner

Power of words

Blog banner

Explain Multiprocessors

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

RAID

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

Microsoft Windows Overview

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

OPERATING SYSTEM

Blog banner

Bharat Maps

Blog banner

Deadlock

Blog banner

Deadlock in operating system

Blog banner

VPN

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Game via listing method

Blog banner

Cyber Security in Data Breaching

Blog banner

Why is online marketing is important in current scenario

Blog banner

Socket Programming in Java

Blog banner

Deadlock

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Evolution of Operating system

Blog banner

Inventory management software system

Blog banner

Self managing devices

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Security issues

Blog banner

How social media affect

Blog banner

Deadlock and Starvation

Blog banner