A Resourceful Approach in Security Testing to Protect Electronic Payment System Against Unforeseen Attack

Author(s):  
Rajat Kumar Behera ◽  
Abhaya Kumar Sahoo ◽  
Ajay Jena

This article describes how electronic payments are financial transactions made over the internet for goods or services. In the digital era, the e-commerce industry has gone beyond the traditional in-store service due to the wide spread of internet-based shopping. Developed countries are greatly relying on e-commerce business and a sizable number of countries have shown concern in regard to the online payment cards such as credit cards, debit cards, e-cash, e-cheques, e-wallets and smart card security. The main downsides are concerns over privacy or a malicious attack and hence safeguard mechanisms are required to protect personal information from falling into the hands of intruders. Before commercializing electronic payment systems (EPS), security tests play a significant role in the software development life cycle to check whether the system is secure and it is safe to use. A resourceful approach covering security policies, secure coding, security attack prevention methodology, security testing tool, security testing metrics, security test case prioritization techniques and a model for effective project management methodology are presented in this article. Early detection and resolution of security weaknesses can be achieved with the authors' proposed approach and would certainly reduce the time, effort and cost of a project. The proposed approach is likely the best-fit implementation of the payment industry, covering channels like B2C (Business to Consumer), C2C (Consumer to Consumer), C2B (Consumer to Business), B2B (Business to Business), People to People (P2P), G2C (Government to Citizen) and C2G (Citizen to Government).

2017 ◽  
Vol 8 (3) ◽  
pp. 24-48
Author(s):  
Rajat Kumar Behera ◽  
Abhaya Kumar Sahoo ◽  
Ajay Jena

This article describes how electronic payments are financial transactions made over the internet for goods or services. In the digital era, the e-commerce industry has gone beyond the traditional in-store service due to the wide spread of internet-based shopping. Developed countries are greatly relying on e-commerce business and a sizable number of countries have shown concern in regard to the online payment cards such as credit cards, debit cards, e-cash, e-cheques, e-wallets and smart card security. The main downsides are concerns over privacy or a malicious attack and hence safeguard mechanisms are required to protect personal information from falling into the hands of intruders. Before commercializing electronic payment systems (EPS), security tests play a significant role in the software development life cycle to check whether the system is secure and it is safe to use. A resourceful approach covering security policies, secure coding, security attack prevention methodology, security testing tool, security testing metrics, security test case prioritization techniques and a model for effective project management methodology are presented in this article. Early detection and resolution of security weaknesses can be achieved with the authors' proposed approach and would certainly reduce the time, effort and cost of a project. The proposed approach is likely the best-fit implementation of the payment industry, covering channels like B2C (Business to Consumer), C2C (Consumer to Consumer), C2B (Consumer to Business), B2B (Business to Business), People to People (P2P), G2C (Government to Citizen) and C2G (Citizen to Government).


Accounting ◽  
2021 ◽  
pp. 409-414 ◽  
Author(s):  
Abdullah Aldaas

This study focuses on the relationship between economic growth and electronic payment systems based on a sample of countries from across the globe. The study is relevant considering the importance of payment systems in financial transactions and also because, being an evolving area, it is not much studied in literature. The study initially refers to the concept, types and other features of electronic payment systems and later on analyses the macroeconomic data from countries across the globe. No concrete evidence is found supporting or rejecting the relationship between electronic payment systems and economic growth which can be inferred as country specific issue.


2021 ◽  
Vol 10 (44) ◽  
pp. 261-269
Author(s):  
Roman Volodymyrovych Shapoval ◽  
Ruslan Orlovskyi ◽  
Maksym Sykal ◽  
Stanislav Zlyvko

Legal, organizational and technical issues of the current state of crime prevention in the field of electronic payment systems in different countries and in Ukraine are considered. The following methods were used in the article: dialectical, documentary analysis, analytical analysis of documents and observations. Identified and analyzed current trends and risks associated with the use of electronic payment systems by legal entities. Electronic payments have been found to be a progressive and convenient innovation on the one hand, which has greatly accelerated the ability of individuals to engage in day-to-day market relations, and on the other, to be unlawfully encroached upon and systematically improved by criminals. Based on this, emphasis is placed on the urgent need for proper protection of payment systems. It is noted that examples of global counteraction to crimes and various offenses committed in the field of electronic payments are developed countries such as the United States, Great Britain, Canada, Singapore, as well as the European Union, especially France and Germany. As a result of the study, it has been noted that the above countries have all the opportunities to provide Ukraine and its citizens, as well as government officials with the necessary guidelines, technical and legal assistance to create an effective mechanism to combat offenses in the use of electronic payment systems.


2019 ◽  
Vol 16 (11) ◽  
pp. 4826-4838
Author(s):  
Mostafa A. Ali ◽  
Nazimah Hussin ◽  
Ibtihal A. Abed

In this paper, the major aim is to investigate the heightened awareness regarding various electronic payment systems-related concepts in terms of their advantages, problems, and security issues. The payment processing system providers use software as a service (SaaS) model and with this model, they form a single payment channel to numerous payment methods for their clients. Users often give away their personal information such as names, card details, and so on whenever they go online to make any firm of payment. An online payment system is referred to a system that facilitates electronic money exchange. This form of payment typically involves the deployment of the Internet, computer networks, and other digital stored value systems. Collecting any form of payment over the internet implies that the user has accepted an online payment and must have shared some confidential information with the service provider. This paper embarks on a thorough review of all aspects of online/electronic payment with emphasis on the analysis of numerous studies on electronic payment systems. The latest studies have been explored to gain insight on the electronic payments systems.


2020 ◽  
Vol 9 ◽  
Author(s):  
M.B Saikrishna

Today E- payments are growing at the highest rate. Having a card has become the need of every person. Nowadays everybody wants to use these services. Technology has arguably made our lives easier. One of the technological innovations in banking,  finance, and commerce is electronic payments. Electronic payments reference to the technological breakthrough that enables us to perform financial transactions electronically. Thus avoiding long lines and other hassles. Electronic payment: current scenario and scope for improvement.


2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.


Koneksi ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. 328
Author(s):  
Jovita Clarissa ◽  
H.H. Daniel Tamburian

Humans are social beings who need other individuals to group. In interacting with others, individuals will convey information and usually begin with an introduction relates to self disclosure, which is the type of individual communication disclosing information about himself is commonly concealed. Social media is a medium on the Internet that allows users to represent themselves, share, communicate with others and create virtual social ties. This research was intended to examine Instagram and Self Disclosure in an interpersonal communication perspective on the Santo Kristoforus II high school students to find out the activities of students on Instagram social media. Research based on Self-Disclosure theory, communication theory in the Digital Era, social media, and Instagram. Research uses a qualitative approach with case study methods. The results is that the self disclosure conducted by the informant is about daily activities, and the self disclosure is on Instagram involving several Self-Disclosure processes. In the process of Self-Disclosure, informants usually provide personal information such as feelings, thoughts and experiences, and they are also careful enough in uploading information to social mediaManusia disebut makhluk yang memerlukan seseorang untuk saling berhubungan timbal balik. Dalam berinteraksi dengan orang lain, individu akan menyampaikan berbagai informasi dan biasanya diawali dengan perkenalan mengenai dirinya, hal tersebut berkaitan dengan self disclosure, yakni jenis komunikasi individu mengungkapkan informasi tentang dirinya sendiri yang biasa disembunyikan. Media sosial saat ini digunakan penggunanya untuk berkomunikasi, membentuk relasi dengan orang lain secara virtual. Sehingga penelitian ini dimaksudkan untuk meneliti Instagram dan Self Disclosure dalam Perspektif Komunikasi Antarpribadi terhadap Siswa-Siswi SMA Santo Kristoforus II untuk mengetahui aktivitas siswa-siswi di media sosial Instagram. Penelitian berlandaskan teori Self-Disclosure, Teori Komunikasi di Era Digital, Media Sosial, dan Instagram. Penelitian menggunakan pendekatan kualitatif dengan metode studi kasus. Hasil penelitian menunjukkan bahwa pengungkapan diri yang dilakukan oleh informan berisi tentang aktivitas sehari-hari yang dilakukan, dan pengungkapan diri tersebut dilakukan dalam media sosial Instagram yang melibatkan beberapa proses pengungkapan diri. Dalam proses pengungkapan diri, informan biasanya memberikan informasi pribadi seperti perasaan, pikiran dan pengalaman. Dengan banyaknya informasi yang diberikan, tidak menutup kemungkinan mereka juga cukup berhati-hati dalam mengunggah informasi ke media sosial


Author(s):  
Bhawna Mukaria

In present era, it is impossible to imagine modern bank transactions, commercial transactions and other payments without using the plastic cards. Plastic currency is now gradually becoming a necessity across the globe as more and more developed countries are opting for plastic compared to paper as there are several inherent advantages. The growing involvement of smart phones has made technology applications much more accessible to users. The Government also move forward for a “Digital India” and its focus on growing electronic payments is significant drivers of growth in replacing physical payments with technologybacked solutions. India is at the stage of an amazing shift towards electronic money from traditional cash. For instance the Pradhan Mantri Jan Dhan Yojana (PMJDY), is slowly building recognition among people to move from paper to electronic money. The PMJDY alone has seeded over 150 million Rupay cards in the last year, in addition to the 400 million debit cards already in circulation. There is still emergence for significant increase in the usage of debit cards in the years to come as card. This paper focus on the challenges and future prospects of plastic money in India.


Author(s):  
A. A. Goncharov ◽  
◽  
A. I. Boyko ◽  

The relevance of scientific research is caused primarily by the general transition of the society to the funds’ transfer network. Physical money is replaced by virtual one, the access to which is granted remotely. Therefore, in some situations, a lawbreaker can gain possession of non-cash resources far easier than stealing the cash of a possible victim. For the past two decades, lawbreakers successfully apply lots of ways allowing a lawbreaker both to possess personal information of another person – bank cardholder and, subsequently, to steal money from a holder’s account. The paper determines the objective signs of a crime against property and the list of attributes typical for stealing money funds from a bank card. The authors distinguish the objective signs of two bodies of a crime, which can fall within the definition of embezzlement from a bank card: a theft from a bank account, and fraud using electronic payment facilities. The authors conclude that the embezzlement from a bank card throw the commission of fraudulent acts is possible only when interacting with a third party. The actual presence of another person (a victim or an employee of credit, bank, commercial, or other organization) and the interaction of a criminal with this person is a prerequisite for classifying a crime as a fraud. Any actions aimed at the unlawful seizure of non-cash monetary assets and not accompanied by direct contact with a third party should be classified as theft.


Author(s):  
William Bülow ◽  
Misse Wester

As information technology is becoming an integral part of modern society, there is a growing concern that too much data containing personal information is stored by different actors in society and that this could potentially be harmful for the individual. The aim of this contribution is to show how the extended use of ICT can affect the individual’s right to privacy and how the public perceives risks to privacy. Three points are raised in this chapter: first, if privacy is important from a philosophical perspective, how is this demonstrated by empirical evidence? Do individuals trust the different actors that control their personal information, and is there a consensus that privacy can and should be compromised in order to reach another value? Second, if compromises in privacy are warranted by increased safety, is this increased security supported by empirical evidence? Third, the authors will argue that privacy can indeed be a means to increase the safety of citizens and that the moral burden of ensuring and protecting privacy is a matter for policy makers, not individuals. In conclusion, the authors suggest that more nuanced discussion on the concepts of privacy and safety should be acknowledged and the importance of privacy must be seen as an important objective in the development and structure of ICT uses.


Sign in / Sign up

Export Citation Format

Share Document