Đang chuẩn bị liên kết để tải về tài liệu:
Chapter 8: Electronic Payment Systems and Security

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Describe the typical security schemes used to meet the security requirements. | Chapter 8 Electronic Payment Systems and Security 1 Learning Objectives Describe typical electronic payment systems for EC Identify the security requirements for safe electronic payments Describe the typical security schemes used to meet the security requirements Identify the players and procedures of the electronic credit card system on the Internet Discuss the relationship between SSL and SET protocols Discuss the relationship between electronic fund transfer and debit card Describe the characteristics of a stored value card Classify and describe the types of IC cards used for payments Discuss the characteristics of electronic check systems Learning Objectives (cont.) SSL Vs. SET: Who Will Win? A part of SSL (Secure Socket Layer) is available on customers’ browsers it is basically an encryption mechanism for order taking, queries and other applications it does not protect against all security hazards it is mature, simple, and widely use SET ( Secure Electronic Transaction) is a very | Chapter 8 Electronic Payment Systems and Security 1 Learning Objectives Describe typical electronic payment systems for EC Identify the security requirements for safe electronic payments Describe the typical security schemes used to meet the security requirements Identify the players and procedures of the electronic credit card system on the Internet Discuss the relationship between SSL and SET protocols Discuss the relationship between electronic fund transfer and debit card Describe the characteristics of a stored value card Classify and describe the types of IC cards used for payments Discuss the characteristics of electronic check systems Learning Objectives (cont.) SSL Vs. SET: Who Will Win? A part of SSL (Secure Socket Layer) is available on customers’ browsers it is basically an encryption mechanism for order taking, queries and other applications it does not protect against all security hazards it is mature, simple, and widely use SET ( Secure Electronic Transaction) is a very comprehensive security protocol it provides for privacy, authenticity, integrity, and, or repudiation it is used very infrequently due to its complexity and the need for a special card reader by the user it may be abandoned if it is not simplified/improved Payments, Protocols and Related Issues SET Protocol is for Credit Card Payments Electronic Cash and Micropayments Electronic Fund Transfer on the Internet Stored Value Cards and Electronic Cash Electronic Check Systems Security requirements Payments, Protocols and Related Issues (cont.) Authentication: A way to verify the buyer’s identity before payments are made Integrity: Ensuring that information will not be accidentally or maliciously altered or destroyed, usually during transmission Encryption: A process of making messages indecipherable except by those who have an authorized decryption key Non-repudiation: Merchants need protection against the customer’s unjustifiable denial of placed orders, and customers need protection .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.