wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

security requirements for safe e-payment

profile
Suraj OP
Aug 28, 2022
1 Like
0 Discussions
75 Reads

Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enabled users to employ the existing credit card payment infrastructure on an open network in a secure fashion. However, it failed to gain attraction in the market. Visa now promotes the 3-D Secure scheme.

 

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality


Comments ()


Sign in

Read Next

memory management

Blog banner

VIRTUAL MACHINE

Blog banner

How to Find the Right Therapist For Me?

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

What if COVID does not exist!

Blog banner

How I use google in my daily life

Blog banner

Memory management

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

The Memory Hierarchy

Blog banner

How social media affect

Blog banner

Artificial Intelligence (AI)

Blog banner

Google

Blog banner

CRISP-DM Methodology

Blog banner

Short note on Microsoft office

Blog banner

Linux

Blog banner

Google classroom

Blog banner

DURGA POOJA

Blog banner

Web Site

Blog banner

Paid Email

Blog banner

My Favorite Sportsperson

Blog banner

Save Environment

Blog banner

Disk Scheduling

Blog banner

R Programming

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

File management -disha parekh

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

memory managment

Blog banner

Direct Memory Access

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Product Discount Calculator

Blog banner

Every body is beautiful

Blog banner

Big Data Architecture

Blog banner

KAHAWA TEA

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Is Your Password Complex Enough?

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

FRIENDSHIP

Blog banner

1.1 basic elements

Blog banner

Security and E-mail

Blog banner

Health is Wealth

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner