Research of state of modern protection technologies of electronic transactions
DOI:
https://doi.org/10.15587/2312-8372.2015.41739Keywords:
protection of electronic transactions in payment systems, SET technology, 3-D Secure technologyAbstract
The article deals with modern technology to protect the electronic transactions in payment systems, in particular, solutions on the base of SET and 3-D Secure technologies.
Development of forms of electronic payments leads to an increase in fraudulent transactions. The fraudulent practices are improving all the time that requires the use of modern security protocols of electronic transactions in payment systems. Protection technology is also developing rapidly that leads to the need for further study of this issue in order to improve security protocols during internet acquiring.
The paper discusses the advantages and disadvantages of SET and 3-D Secure technologies and draw conclusions about the state of modern security protocols of electronic transaction.
Elimination of identified deficiencies increases the security of transactions during the Internet acquiring.
References
- Yona, L. H., Yona, O. O., Tereshko, V. S. (2013). Kryptohrafichnyi zakhyst elektronnoho dokumentoobihu. Tsyfrovi tekhnolohii, 13, 142-146.
- Balakirskii, V. B. (1996). Bezopasnost' elektronnyh platezhei. Konfident, 5, 47-53.
- Gaikovich, V. Yu., Pershin, A. S. (1994). Bezopasnost' elektronnyh bankovskih sistem. M.: Edinaia Evropa, 354.
- Byhno, A. 3D-Secure: bezopasnye pokupki cherez Internet. Available: http://credit-card.ru/articles/security/3d-secure.php
- Fahretdinov, R. Analiz sredstv podtverzhdeniia bankovskih tranzaktsii. Available: http://frodex.ru/article/authentification2014
- 3-D Secure. Available: http://www.bankdbo.ru/3-d-secure
- Goncharov, V. V. (2010). Bezopasnost' i zashchita internet-platezhei. Raschety i operatsionnaia rabota v kommercheskom banke, № 4. Available: http://bankir.ru/tehnologii/s/bezopasnost-i-zaschita-internet-platejei-5899180/
- Yona, О. (2012). Specific factors of activation risks security of a business entity. Technology Audit And Production Reserves, 6(4(8)), 31-32. Available: http://journals.uran.ua/tarp/article/view/5645
- Yona, O. O. (2012). Ohliad ta systematyzatsiia typovykh modelei zahroz bezpetsi personalnykh danykh, yaki obrobliaiutsia v spetsialnykh informatsiinykh systemakh pidpryiemstv. Visnyk Skhidnoukrainskoho natsionalnoho universytetu imeni Volodymyra Dalia, 8 (179), Part 1, 110-117.
- Aristova, I. V., Sulatskyi, D. V. (2013). Informatsiina bezpeka liudyny yak spozhyvacha telekomunikatsiinykh posluh. K.: Red. zhurn. «Pravo Ukrainy»; Kh.: Pravo, 184.
- Junaid Ahmed Zubairi, Athar Mahboob. (2011). Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies. IGI Global, 336. doi:10.4018/978-1-60960-851-4
- Cyril Onwubiko, Thomas Owens. (2012). Situational Awareness in Computer Network Defense: Principles, Methods and Applications. IGI Global, 414. doi:10.4018/978-1-46660-104-8
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Олена Олегівна Йона
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.