Question

In: Computer Science

Two security methods are used in the Purchase Request message to protect it from potential passive...

Two security methods are used in the Purchase Request message to protect it from potential passive and active attacks from a Merchant. Name the security methods and describe how they specifically protect the Purchase Request message from the relevant attacks.

Solutions

Expert Solution

Two security methods are used in the Purchase Request message to protect it from potential passive and active attacks from a Merchant are:

1.SET

2.Credit Card Encryption mechanism

The process of purchase request generation requires three inputs:

1.Payment Information (PI)

2.Dual Signature

3.Order Information Message Digest (OIMD)

1.Secure Electronic Transaction :

SET is a system which ensures security and integrity of electronic transactions done using credit cards in a scenario. SET is not some system that enables payment but it is a security protocol applied on those payments. It uses different encryption and hashing techniques to secure payments over internet done through credit cards

SET protocol restricts revealing of credit card details to merchants thus keeping hackers and thieves at bay.

2.Credit Card Encryption:

Credit card encryption is a security measure used to reduce the likelihood of credit or debit card information being stolen.

It makes it impossible to access the purchase request and credit card information without the corresponding encryption key that lets the merchant and financial institution conduct their transactions.

Card issuers use many methods to encrypt credit cards including magnetic strips,PIN numbers,electronic chips and CVV.


Related Solutions

How to record a purchase of a passive equity security in the 2nd quarter that pays...
How to record a purchase of a passive equity security in the 2nd quarter that pays dividends in quarter 4?
Suppose we want to transmit the message 10011010 and protect it from errors using the CRC...
Suppose we want to transmit the message 10011010 and protect it from errors using the CRC polynomial x2+1. (8 points) Encode the data bit sequence using the generator polynomial and give the code word. (8 points) Using this polynomial, can all single-bit errors be detected? If not, give an example scenario of errors that goes undetected.
Name and describe all the methods used by the skin to protect the body against pathogens.
Name and describe all the methods used by the skin to protect the body against pathogens.
a) Examine the three elements of Cyber Security that are generally used to protect computer networks and systems.
a) Examine the three elements of Cyber Security that are generally used to protect computer networks and systems.  b) An ethical dilemma is a situation a person faces in which a decision must be made about appropriate behavior. Discuss any five key professional ethical values to be considered when faced with ethical dilemma at the work place. c) Jeremy Bentham (1748-1832) once said “The greatest goal is to achieve the greatest happiness for as many people as possible.” Clearly explain what he...
Assume all methods in the Stack class are available to you, request from the user a...
Assume all methods in the Stack class are available to you, request from the user a set of numbers (terminated by -1) and print them in reverse order . write code in java.
Smudge pots are sometimes used to protect orchards from frost. Two types of smudge pots are...
Smudge pots are sometimes used to protect orchards from frost. Two types of smudge pots are to be compared to determine which has the longest average burn time. Ten pots of each type are randomly selected for the study. These twenty pots will be lit and the burn time for each recorded. What is the appropriate type of analysis? a. One sample t test of significance on μ . b. Matched pairs t test of significance on μ . d...
A cyber security engineer is installing a WAF to protect the company's website from malicious web...
A cyber security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective? A. A reverse proxy B. A decryption certificate C. A split-tunnel VPN D. Load-balanced servers     A cyber security consultant was asked to revise the security baselines that are utilized by a large organization. Although the company provides different platforms for its staff, including desktops, laptops, and mobile devices, the...
Selection methods used for international assignments are probably not much different from the methods used in...
Selection methods used for international assignments are probably not much different from the methods used in domestic staffing decisions. However, culture has an impact in terms of how these procedures are applied and in the focus of each procedure.   True False Think and act globally means that a global enterprise must think about and prepare for a presence in a favored few select markets, not just its home region. True False Repatriating refers to the _________ of bringing the international...
A market research firm used a sample of individuals to rate the purchase potential of a...
A market research firm used a sample of individuals to rate the purchase potential of a particular product before and after the individuals saw a new television commercial about the product. The purchase potential ratings were based on a 0 to 10 scale, with higher values indicating a higher purchase potential. Test whether the commercial improved the mean purchase potential rating. at the .10 level of significance. Individual After Before Carl Hall 6 5 Malcom Armstead 6 4 Ron Baker...
Consider a 12 months two-security potential investment from the following three. The correlation coefficients between pairs...
Consider a 12 months two-security potential investment from the following three. The correlation coefficients between pairs of the stocks are as follows: Corr(A,B) = 0.85, Corr(A,C) = 0.60, Corr(A,D) = 0.45. Each stock has an expected return of 8% and a standard deviation of 20%. Your entire portfolio is now composed of stock A and you can add some of only one stock to your portfolio. Required: Identify the stock to be added to Stock A and determine the optimum...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT