Skip to main content

Security problems and solutions

Credit card security relies on the physical security of the plastic card as well as the privacy of the credit card number. Therefore, whenever a person other than the card owner has access to the card or its number, security is potentially compromised. Once, merchants would often accept credit card numbers without additional verification for mail order purchases. It's now common practice to only ship to confirmed addresses as a security measure to minimise fraudulent purchases. Some merchants will accept a credit card number for in-store purchases, whereupon access to the number allows easy fraud, but many require the card itself to be present, and require a signature. A lost or stolen card can be cancelled, and if this is done quickly, will greatly limit the fraud that can take place in this way. For internet purchases, there is sometimes the same level of security as for mail order (number only) hence requiring only that the fraudster take care about collecting the goods, but often there are additional measures. European banks can require a cardholder's security PIN be entered for in-person purchases with the card.

The PCI DSS is the security standard issued by The PCI SSC (Payment Card Industry Security Standards Council). This data security standard is used by acquiring banks to impose cardholder data security measures upon their merchants.

A smart card, combining credit card and debit card properties. The 3 by 5 mm security chip embedded in the card is shown enlarged in the inset. The contact pads on the card enable electronic access to the chip.

The low security of the credit card system presents countless opportunities for fraud.[according to whom?] This opportunity has created a huge[specify] black market in stolen credit card numbers, which are generally used quickly before the cards are reported stolen.[citation needed]

The goal of the credit card companies is not to eliminate fraud, but to "reduce it to manageable levels".[11] This implies that high-cost low-return fraud prevention measures will not be used if their cost exceeds the potential gains from fraud reduction - as would be expected from organisations whose goal is profit maximisation.

Most internet fraud is friendly fraud[citation needed]. The rest is done through the use of stolen credit card information which is obtained in many ways, the simplest being copying information from retailers, either online or offline. Despite efforts to improve security for remote purchases using credit cards, systems with security holes are usually the result of poor implementations of card acquisition by merchants. For example, a website that uses SSL to encrypt card numbers from a client may simply email the number from the webserver to someone who manually processes the card details at a card terminal. Naturally, anywhere card details become human-readable before being processed at the acquiring bank, a security risk is created. However, many banks offer systems where encrypted card details captured on a merchant's web server can be sent directly to the payment processor.

Controlled Payment Numbers which are used by various banks such as Citibank (Virtual Account Numbers), Discover (Secure Online Account Numbers, Bank of America (Shop Safe), 5 banks using eCarte Bleue and CMB's Virtualis in France, and Swedbank of Sweden's eKort product are another option for protecting one's credit card number. These are generally one-time use numbers that front one's actual account (debit/credit) number, and are generated as one shops on-line. They can be valid for a relatively short time, for the actual amount of the purchase, or for a price limit set by the user. Their use can be limited to one merchant if one chooses. The effect of this is the users real account details are not exposed to the merchant and its employees. If the number the merchant has on their database is compromised, it would be useless to a thief after the first transaction and will be rejected if an attempt is made to use it again.

The same system of controls can be used on standard real plastic as well. For example if a consumer has a chip and pin (EMV) enabled card they can limit that card so that it be used only at point of sale locations (i.e restricted from being used on-line) and only in a given territory (i.e only for use in Canada). This technology provides the option for banks to support many other controls too that can be turned on and off and varied by the credit card owner in real time as circumstances change (i.e, they can change temporal, numerical, geographical and many other parameters on their primary and subsidiary cards). Apart from the obvious benefits of such controls: from a security perspective this means that a customer can have a chip and pin card secured for the real world, and limited for use in the home country assuming it is totally chip and pin. In this eventuality a thief stealing the details will be prevented from using these overseas in non chip and pin (EMV) countries. Similarly the real card can be restricted from use on-line so that stolen details will be declined if this tried. Then when card users shop online they can use virtual account numbers. In both circumstances an alert system can be built in notifying a user that a fraudulent attempt has been made which breaches their parameters, and can provide data on this in real time. This is the optimal method of security for credit cards, as it provides very high levels of security, control and awareness in the real and virtual world. Furthermore it requires no changes for merchants at all and is attractive to users, merchants and banks, as it not only detects fraud but prevents it.[citation needed]

The Federal Bureau of Investigation and U.S. Postal Inspection Service are responsible for prosecuting criminals who engage in credit card fraud in the United States, but they do not have the resources to pursue all criminals. In general, federal officials only prosecute cases exceeding US $5,000 in value. Three improvements to card security have been introduced to the more common credit card networks but none has proven to help reduce credit card fraud so far. First, the on-line verification system used by merchants is being enhanced to require a 4 digit Personal Identification Number (PIN) known only to the card holder. Second, the cards themselves are being replaced with similar-looking tamper-resistant smart cards which are intended to make forgery more difficult. The majority of smart card (IC card) based credit cards comply with the EMV (Europay MasterCard Visa) standard. Third, an additional 3 or 4 digit Card Security Code (CSC) is now present on the back of most cards, for use in "card not present" transactions. Stakeholders at all levels in electronic payment have recognized the need to develop consistent global standards for security that account for and integrate both current and emerging security technologies. They have begun to address these needs through organizations such as PCI DSS and the Secure POS Vendor Alliance.[12]

Comments

Popular posts from this blog

Raani majhya malyamadhi

Song: Raani majhya malyamadhi MusicBy-Dr. Salil Kulkarni, Lyrics-Sandip Khare, Sung By-Avdhut Gupte Dhipadi dhipang dhichibaadi dipang Dhipadi dhipang dhichibaadi dipang kaali maati nila paani hirawa shiwaar taajyaa taajyaa malavyacha bhueela ya bhaar jwanichya ya malya mandhi piraticha paani bhaghayala kautik aala nahi koni malyala ya malyewali bhetalich naay aga raani mazhya malyamandhi ghusashil kay? dhipadi dhipang dhichibaadi dipang dhipadi dhipang dhichibaadi dipang kaakadicha bandhaa tuzha, mirachicha tora mulyawani kadhu tari , rang gora gora corus:tuzha mirchicha tora, tuzha rang gora gora corus:tuzha mirchicha tora, tuzha rang gora gora kaakadicha bandhaa tuzha, mirachicha tora mulyawani kadhu tari , rang gora gora limbawani kanti tuzhi, bitawani ooth tamatyache gaal tuzhe, bhendiwani bot kaalajat mandayee tu mandashil kay? an raani mazhya malyamandhi ghusashil kay? dhipadi dhipang dhichibaadi dipang dhipadi dhipang dhichibaadi dipang Nako dau bhajiwalya fukacha rubaab b

sarika...

kadhi ti reading hall madhe diste..pustaka bajulach rahtat, aani tichya gappa kujbujat suru hotat...bolna band zala ki mag notebook ughdun librarian cha cartoon kadhat baste..te kuni pahila..ki mag ekach khaskhas pikte..sarva hall tikde mana valvun pahu lagto...tichya chehryavar khullela hasya..janu jag jinklyacha samadhan...! pariksheche diwas aale ki reading halls gachha bharun jatat..ti ekhadya corridor madhe pustak gheun firat rahte... haluvar pawla takat, eka hatane satat kesanna kurvalat nazar pustakat thevun abhyas karte..madhech kunitari yeta...'hi' bolta..ti fakta ek smile dete an punha vachu lagte.... chemistrychya lecturela ti bhan harpun professorcha bolna eikat rahte. ek haat kanavar..gambhir mudra..dole blackboardvar..aajubajuche chakit houn pahtat..hi aaj serious kashi..? sir achanak ticha naav pukartat..ti tashich...! tichi maitrin haluch tichya kanatla headphone kadhte aani ti bhanavar yete..sir punha naav pukartat an ti dhadpadat ubhi rahte... "91 marks..

आई तुझ्या कुशीत, पून्हा यावेसे वाटत

आई तुझ्या कुशीत, पून्हा यावेसे वाटते निर्दयी या जगापासुन, दुर जावेसे वाटते ॥ कोणी न येथे कुणाचा, सारीच नाती खोटी तुझ्याशीच फक्त आता, नाते जपावेसे वाटते ॥ कोळून प्यायलो मी, सुख दुःख सारे माते तुझ्या विरहास, न प्यावेसे वाटते ॥ कित्येक रात्री, ऐश्वर्यात लोळलो मी अखेरच्या क्षणाला, तुझ्या कुशीत निजावेसे वाटते ॥ दगडातला तो देवही,आता नवसाविना पावेना निस्वार्थ हृदय माऊली, तुलाच पूजावेसे वाटते ॥ असेन जर मजला, मानव जन्म कधी आई तुझ्याच पोटी, पून्हा जन्मावेसे वाटते ॥