• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Credit card security on the net.

Extracts from this document...

Introduction

Unit 2 Individual Project 1

Submitted by:

Robert C. St. Jean

April 3, 2004


Just a few years ago I would have never dreamed of purchasing anything online.  I was extremely leery of using my credit card and transmitting my precious 16 digit number through the internet.  Now I buy everything online.  I have purchased software, CDs, peripheral computer devices, books, Christmas gifts, and memberships for a variety of services.  I live on the computer; at work, at home, at school.  I purchased so many things online that I know my credit card number by heart.

I began to get odd looks from my fiancé when I rattled off my number to the pizza place over the phone.  I don’t even carry cash on me now that McDonald’s, Wendy’s and Burger King are taking Credit Cards.  I do it so often that I rarely stopped to think, “how do they know its really me?”  

I made it a point to poll 20 friends and family members about their online purchases.

...read more.

Middle

Visa and MasterCard have implemented technically different but functionally similar authentication methods.  Visa introduced 3-D Secure followed by MasterCard with Secure Payment Application or SPA.  Both methods require the customer to accompany his or her credit card information with a digital pin number.  Without the pin, the credit card number itself is rendered useless.  

Visa: Three Domain Secure (3D Secure)

Visa’s 3-D or Three Domain Secure model attempts to verify the legitimacy of three echelons involved in the transaction.  They are:

  • Issuer Domain (Cardholders and Issuing Banks)
  • Acquirer Domain (Merchants and their Banks)
  • Interoperability Domain (Link between Issuer and Acquirer)

The Cardholder simply needs an internet connection and a browser to use the system.  Every effort was made to ensure that the responsibility to the card holder was minimal.  The card issuer must maintain cardholder information using hardware and software integrated with their backend card systems.  Acquirers are required to install payment gateway and 3D Secure Merchant Plug-ins.

...read more.

Conclusion

Visa’s view was that the end user SPA applets implemented by MasterCard lengthen the registration process and may encounter compatibility issues with older browsers and operating systems.  The folly to this logic is that most internet users with older hardware and software do not heavily participate in online purchases.  

Internet users are much more informed and proficient on the web than they were just a few years ago.  Downloading the applets happens almost instantaneously on broadband connections and shortens the transaction by automatically filling required fields from previous purchases.  The advantages far outweigh the possible disadvantages.  In the end, the MasterCard system is not only more secure, but it’s faster and more efficient.


Works Cited

Clara Centeno: Building Security and Consumer Trust in Internet Payments: The Potential of Soft Measures, April 2002

http://ecommerce.ncsu.edu/ISEC/papers/05_peters_emerging.pdf

Mark E. Peters: Emerging e-Commerce, Debit and Credit Card Protocols, March 2002

http://ecommerce.ncsu.edu/ISEC/papers/05_peters_emerging.pdf

Gpayments: Visa 3D Secure Vs. MasterCard Secure Payment Application: A Comparison of Online Authentication Standards, March 2002

http://www.gpayments.com/pdfs/GPayments_3-D_vs_SPA_Whitepaper.pdf

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    projects can be supported through their use today when applied to various diverse organisations. Practitioner's selected methods then their views of these methods were further discussed. Studies were conducted to identify the above issues, which were then presented and analysed.

  2. Development of an Online Lecturer Assessment System

    * Methods of authentication and how to implement them. TECNOLOGIES TO BE USED * ORACLE 10g (Database). * JDeveloper (Oracle HTTP Server, OC4J (Oracle container for java), Oracle Business Rules, Top Link, and Application Server Control). * Microsoft World * Microsoft Project Project Tutor: Nigel Kermode Appendix II System Interfaces

  1. Develop a Puzzle Website for users of three different age groups, Kids, Teenagers and ...

    logos and other information and finally if it is easy to locate and retrieve required information at the site. The specific criteria we actually tested for was navigation ease, match between system and the real world, user control and freedom, consistency and standards, error prevention, aesthetics, understandable error messages, help documentation, response times, browser compatibility and general functionality.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    video frame */ FVID_exchange(hGioVpbeVid0, &frameBuffPtr); flag = 0; } } /* * ======== read_JP1 ======== * Read the PAL/NTSC jumper. * * Retry, as I2C sometimes fails: */ static int read_JP1(void) { int jp1 = -1; while (jp1 == -1)

  1. A bucketing framework for Database security

    Please refer to appendix A.2 page 9 for more information about its installation. 3.2 Model of a database 3.2.1 Class Diagram Please to facilitate your understanding refer to figure 14 (page 3) which represent a degraded class diagram of our 2 If you like object-oriented programming, you may find some beauty in our code, well at least we do.

  2. Investigating the viability of e-commerce in an organization

    The company has business clients to which goods produced are sold to on wholesale basis. Other groups of clients consist of single unit purchasers and retailers who place orders with the company for products they are interested in. Since its establishment in the early 70's, the company has managed to

  1. Data Warehouse Security

    higher corporate levels to be able to view the data as a whole. Higher levels of Government have recognized the need for privacy, and hence privacy laws govern the use of personal information within a data warehouse. It is the company's responsibility to obey the law, especially to those companies who sell data to clients.

  2. Implementation of Path Finding Techniques in Homeland Security Robots

    for changes in the environment at every simulation time step and recalculating paths if there is a change in the environment. Ad-hoc sensor networks are used in homeland security. Ad-hoc sensor networks have been modelled using the patch class in Breve and the path finding techniques have been used in this environment.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work