Saman Jain C 228 WA No. - 4 Ecom
Saman Jain C 228 WA No. - 4 Ecom
Saman Jain C 228 WA No. - 4 Ecom
Div: C
Roll No.:228
Assignment No.: 4
For decades, when people mentioned credit cards, they meant one thing:
a plastic card with raised numbers on the front and a black magnetic
strip on the back. But with increasing fraud concerns and exploding
technological capabilities, a host of new payment cards are now filling
wallets around the globe.
Here is a quick rundown of the dominant card technology available
today.
Magnetic Strip
The trusty old magnetic strip, or “mag stripe,” cards have been in use as
a payment method for more than three decades. Within just a few years
of their introduction, they became nearly ubiquitous.With these
traditional cards, a magnetized metallic strip carries the information
needed for a payment transaction encoded on three “tracks” embedded
in the strip.When a customer swipes the card to make a payment, the
card reader extracts the account number, the expiration date and other
information needed to communicate with the account holder’s bank and
speeds it onto a high-speed payment network.
Chip Cards
Contactless Cards
The Future
Some analysts are even predicting that the future of electronic payments
may ditch the cards entirely. These types of transactions might rely on
mobile phones that use wireless transmitters for contactless transactions
or even biometric sensors identifying customers by their fingerprint or
retina scan.
The most advanced ideas of a mobile-based payment system are known
as mobile wallets. With a mobile wallet, consumers can load multiple
cards into one device and choose the preferred payment method for each
transaction, all without carrying an actual wallet of cards.
There are five general types of payment systems and each of them has its
own unique characteristics. They can all be used to make payments
around the world.
The first payment system that is most common is cash. Cash can be
defined as legal tender that has been defined by a national authority and
represents certain value. The number of transactions made with cash is
the biggest. Why does cash still remain that popular nowadays? Cash
requires no authentication; it is portable and also provides the instant
power to purchase for those who have it on them.
Using cash as a payment system – advantages:
Cash is instantly convertible into different forms of value and does not
need any intermediation. With cash you can easily make small payments
also called micro payments. Moreover, there is no financial risk for the
seller. Another advantage for the merchant is that the sale cannot be
repudiated. In order to complete a sale using cash you do not need to use
any special hardware that might be very expensive.
There is certain financial risk for the consumer when carrying cash for
making purchases because it can get stolen or even lost. Cash does not
provide float time for consumers. This means that there is no actual time
between the making of the purchase by the consumer and the payment.
Cash purchases are irreversible and final unless the merchant has some
return policy. Unauthorized use cannot be prevented in any way.
The evolving linguistic meanings reflect the early history of the growing
cash economy, and the evolution of commercial trade. Nowadays what
"price" means is obvious and self-evident, and it is assumed that prices
are all one of a kind. That is because money has become used for nearly
all transactions. But in fact there are many different kinds of prices,
some of which are actually charged, and some of which are only
'notional prices'. Although a particular price may not refer to any real
transaction, it can nevertheless influence economic behavior, because
people have become so used to valuing and calculating exchange-value
in terms of prices, using money (see real prices and ideal prices).
2. Poor Patching
Patching is a critical activity for any progressive, security-conscious
organization. Unfortunately, patching demands must be addressed on
operating systems, applications and network infrastructure, making it a
bit of a hindrance in some minds.
It’s important to patch often and completely. Back in 2014, about half of
all exploits went from the publishing of the vulnerability to being hacked
in less than a month. Last year, 99.99 percent of vulnerabilities
compromised were done so more than one year after they were
identified.. You must patch frequently and patch often.
3. Application/Middleware Vulnerabilities
Breaching the perimeter is no longer the preferred attack vector.
Attackers are now taking advantage of the proliferation of applications
across the typical enterprise. Most vendors will do the right thing with
vulnerabilities and patches, but you must remain vigilant.
Establish an application security program to address this need. Scan
internal apps and do frequent code reviews. Keep your security program
up to date by always installing the latest versions of all security
solutions.
4. Service Providers
Third parties have become a large part of many infrastructures owing to
their cost-savings, expertise and capabilities. Many are trusted with
sensitive info, making them a very tight extension of your organization.
Sadly, the Ponemon Institute states that third-party organizations
accounted for (or were involved in) 42 percent of all data breaches.
Be strict in your third-party service provider evaluations. Ensure they
have a solid track record of security.
8. Over-trusting Encryption
Encryption is a great thing, but it’s not everything. Encryption of data is
only as safe as the encryption type you use and how the keys are
managed. Payment Card Industry (PCI) compliance does not allow
encryption to take data out of PCI scope.
Simply put, encryption should be employed as part of a total solution,
not as the only solution.