wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

security requirements for safe e-payment

profile
Suraj OP
Aug 28, 2022
1 Like
0 Discussions
75 Reads

Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enabled users to employ the existing credit card payment infrastructure on an open network in a secure fashion. However, it failed to gain attraction in the market. Visa now promotes the 3-D Secure scheme.

 

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality


Comments ()


Sign in

Read Next

ONLINE NEWSROOMS

Blog banner

Incident management in ITSM

Blog banner

Know your Processors!

Blog banner

Meshoo

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Service transition principles

Blog banner

Mumbaicha Dabbawalla

Blog banner

Security issues

Blog banner

Use case of K-means clustering

Blog banner

Docker Framework

Blog banner

Starvation

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Travelling blog

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

MySQL

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

ADIDAS

Blog banner

TAILS OS

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Emailing the merger document

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Is Your Password Complex Enough?

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Best password managers: Reviews of the top products

Blog banner

OS ASSIGNMENT

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Photorec - media recovery tool

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Why am I never satisfied with my Life?

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Virtual memory

Blog banner

Big Data Architecture

Blog banner

IT RISK

Blog banner

Evolution of the Microprocesor

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Evolution of operating systems

Blog banner

Online Games

Blog banner