• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Credit card security on the net.

Extracts from this document...

Introduction

Unit 2 Individual Project 1

Submitted by:

Robert C. St. Jean

April 3, 2004


Just a few years ago I would have never dreamed of purchasing anything online.  I was extremely leery of using my credit card and transmitting my precious 16 digit number through the internet.  Now I buy everything online.  I have purchased software, CDs, peripheral computer devices, books, Christmas gifts, and memberships for a variety of services.  I live on the computer; at work, at home, at school.  I purchased so many things online that I know my credit card number by heart.

I began to get odd looks from my fiancé when I rattled off my number to the pizza place over the phone.  I don’t even carry cash on me now that McDonald’s, Wendy’s and Burger King are taking Credit Cards.  I do it so often that I rarely stopped to think, “how do they know its really me?”  

I made it a point to poll 20 friends and family members about their online purchases.

...read more.

Middle

Visa and MasterCard have implemented technically different but functionally similar authentication methods.  Visa introduced 3-D Secure followed by MasterCard with Secure Payment Application or SPA.  Both methods require the customer to accompany his or her credit card information with a digital pin number.  Without the pin, the credit card number itself is rendered useless.  

Visa: Three Domain Secure (3D Secure)

Visa’s 3-D or Three Domain Secure model attempts to verify the legitimacy of three echelons involved in the transaction.  They are:

  • Issuer Domain (Cardholders and Issuing Banks)
  • Acquirer Domain (Merchants and their Banks)
  • Interoperability Domain (Link between Issuer and Acquirer)

The Cardholder simply needs an internet connection and a browser to use the system.  Every effort was made to ensure that the responsibility to the card holder was minimal.  The card issuer must maintain cardholder information using hardware and software integrated with their backend card systems.  Acquirers are required to install payment gateway and 3D Secure Merchant Plug-ins.

...read more.

Conclusion

Visa’s view was that the end user SPA applets implemented by MasterCard lengthen the registration process and may encounter compatibility issues with older browsers and operating systems.  The folly to this logic is that most internet users with older hardware and software do not heavily participate in online purchases.  

Internet users are much more informed and proficient on the web than they were just a few years ago.  Downloading the applets happens almost instantaneously on broadband connections and shortens the transaction by automatically filling required fields from previous purchases.  The advantages far outweigh the possible disadvantages.  In the end, the MasterCard system is not only more secure, but it’s faster and more efficient.


Works Cited

Clara Centeno: Building Security and Consumer Trust in Internet Payments: The Potential of Soft Measures, April 2002

http://ecommerce.ncsu.edu/ISEC/papers/05_peters_emerging.pdf

Mark E. Peters: Emerging e-Commerce, Debit and Credit Card Protocols, March 2002

http://ecommerce.ncsu.edu/ISEC/papers/05_peters_emerging.pdf

Gpayments: Visa 3D Secure Vs. MasterCard Secure Payment Application: A Comparison of Online Authentication Standards, March 2002

http://www.gpayments.com/pdfs/GPayments_3-D_vs_SPA_Whitepaper.pdf

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    this has been included within the ninth Participatory Design Conference held within 2006. Multiview has been defined as a methodology when actually this is a framework, again incorrect facts may somewhat confuse readers with little knowledge of the subject area.

  2. A bucketing framework for Database security

    our specific dataset used for our basic JUnit tests. 3.2.3 Multi-attribute The scope of our paper concerning the multi-attribute is two sensitive attributes, but our model is easily generalizable for more attributes. To deals with multi-attribute tuples, we have implemented the class IValue (cf figure 3 page 3), most of our classes became parametrized and the type of IValue used must be precise.

  1. Investigating the viability of e-commerce in an organization

    3.0 Sponsor SPONSOR DETAILS Company Name: RainbowFashion Ltd Address: Rivernew Close, Trenchtown Contact Name: Mrs Kelly Rainbow Sponsor's Signature: 4.0 Research Design and Methodology Empirical evidence for the viability of ecommerce in RainbowFashion will be gathered following qualitative research methods to determine the following; * Trends in ecommerce * Target

  2. Data Warehouse Security

    higher corporate levels to be able to view the data as a whole. Higher levels of Government have recognized the need for privacy, and hence privacy laws govern the use of personal information within a data warehouse. It is the company's responsibility to obey the law, especially to those companies who sell data to clients.

  1. Development of an Online Lecturer Assessment System

    page, the first name, last name and nationality is on order to user double check the person who is log in is him/her and the start date attribute is there in order to predict in which semester the student is in, enabling them to assess the right lecturers.

  2. Implementation of Path Finding Techniques in Homeland Security Robots

    for changes in the environment at every simulation time step and recalculating paths if there is a change in the environment. Ad-hoc sensor networks are used in homeland security. Ad-hoc sensor networks have been modelled using the patch class in Breve and the path finding techniques have been used in this environment.

  1. start an ecommerce business

    * Free Templates The main purpose of starting this business is to provide facilities of creating, designing and managing of website of our customers. Our Mission While many companies are aggressively working to develop an image of being top-notch, we have created a scalable, secure e-Business network platform, thus distinguishing ourselves from large rivals.

  2. RFID (Radio Frequency Identification Devices)-

    Unlike the barcode where identification is limited by line-of-sight, RFID technology and its reliance on radio waves does not require a line-of-sight for identification nor a straight-line alignment between the tags and readers. RFID tags are also sturdier than barcodes, allowing for use in adverse conditions, and tags can be

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work