wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

security requirements for safe e-payment

profile
Suraj OP
Aug 28, 2022
1 Like
0 Discussions
75 Reads

Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enabled users to employ the existing credit card payment infrastructure on an open network in a secure fashion. However, it failed to gain attraction in the market. Visa now promotes the 3-D Secure scheme.

 

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality


Comments ()


Sign in

Read Next

Review on Cyber Forensics and its Analysis Tools

Blog banner

Direct Memory Access

Blog banner

Explain Kernel in OS

Blog banner

Segmentation and paging concept

Blog banner

Data Analytics in Data Science

Blog banner

The art of being alone

Blog banner

MY FIRST BLOG?

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Capacity management in ITSM

Blog banner

Business Intelligence v/s Big Data

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Smitten Kitchen Keepers

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Rain

Blog banner

Explain website hacking issues

Blog banner

Importance Of Blockchain

Blog banner

Mumbai Metro 3

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Review on Recovering Deleted Files

Blog banner

Incident management in ITSM

Blog banner

Indian Culture and Tradition

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Different Types of Data

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

I/O Buffering

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Virtual Memory

Blog banner

Deadlock and Starvation

Blog banner

Firewall

Blog banner

Consumer to consumer business mode

Blog banner

RACI model in IT services

Blog banner

Compromising Mobile Platforms

Blog banner

Data Mining

Blog banner

Every body is beautiful

Blog banner

Blog on health and fitness

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Fault tolerance

Blog banner

Deadlock

Blog banner

Importance of modern technology era

Blog banner