Research of state of modern protection technologies of electronic transactions

Authors

DOI:

https://doi.org/10.15587/2312-8372.2015.41739

Keywords:

protection of electronic transactions in payment systems, SET technology, 3-D Secure technology

Abstract

The article deals with modern technology to protect the electronic transactions in payment systems, in particular, solutions on the base of SET and 3-D Secure technologies.

Development of forms of electronic payments leads to an increase in fraudulent transactions. The fraudulent practices are improving all the time that requires the use of modern security protocols of electronic transactions in payment systems. Protection technology is also developing rapidly that leads to the need for further study of this issue in order to improve security protocols during internet acquiring.

The paper discusses the advantages and disadvantages of SET and 3-D Secure technologies and draw conclusions about the state of modern security protocols of electronic transaction.

Elimination of identified deficiencies increases the security of transactions during the Internet acquiring.

Author Biography

Олена Олегівна Йона, Odessa National Economic University, Preobrajenskaya St., 8, Odessa, Ukraine, 65029

Teacher, competitor

Department of Information Systems in the economy

References

  1. Yona, L. H., Yona, O. O., Tereshko, V. S. (2013). Kryptohrafichnyi zakhyst elektronnoho dokumentoobihu. Tsyfrovi tekhnolohii, 13, 142-146.
  2. Balakirskii, V. B. (1996). Bezopasnost' elektronnyh platezhei. Konfident, 5, 47-53.
  3. Gaikovich, V. Yu., Pershin, A. S. (1994). Bezopasnost' elektronnyh bankovskih sistem. M.: Edinaia Evropa, 354.
  4. Byhno, A. 3D-Secure: bezopasnye pokupki cherez Internet. Available: http://credit-card.ru/articles/security/3d-secure.php
  5. Fahretdinov, R. Analiz sredstv podtverzhdeniia bankovskih tranzaktsii. Available: http://frodex.ru/article/authentification2014
  6. 3-D Secure. Available: http://www.bankdbo.ru/3-d-secure
  7. Goncharov, V. V. (2010). Bezopasnost' i zashchita internet-platezhei. Raschety i operatsionnaia rabota v kommercheskom banke, № 4. Available: http://bankir.ru/tehnologii/s/bezopasnost-i-zaschita-internet-platejei-5899180/
  8. Yona, О. (2012). Specific factors of activation risks security of a business entity. Technology Audit And Production Reserves, 6(4(8)), 31-32. Available: http://journals.uran.ua/tarp/article/view/5645
  9. Yona, O. O. (2012). Ohliad ta systematyzatsiia typovykh modelei zahroz bezpetsi personalnykh danykh, yaki obrobliaiutsia v spetsialnykh informatsiinykh systemakh pidpryiemstv. Visnyk Skhidnoukrainskoho natsionalnoho universytetu imeni Volodymyra Dalia, 8 (179), Part 1, 110-117.
  10. Aristova, I. V., Sulatskyi, D. V. (2013). Informatsiina bezpeka liudyny yak spozhyvacha telekomunikatsiinykh posluh. K.: Red. zhurn. «Pravo Ukrainy»; Kh.: Pravo, 184.
  11. Junaid Ahmed Zubairi, Athar Mahboob. (2011). Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies. IGI Global, 336. doi:10.4018/978-1-60960-851-4
  12. Cyril Onwubiko, Thomas Owens. (2012). Situational Awareness in Computer Network Defense: Principles, Methods and Applications. IGI Global, 414. doi:10.4018/978-1-46660-104-8

Published

2015-04-02

How to Cite

Йона, О. О. (2015). Research of state of modern protection technologies of electronic transactions. Technology Audit and Production Reserves, 2(6(22), 42–44. https://doi.org/10.15587/2312-8372.2015.41739

Issue

Section

Economics and Enterprise Management: Original Research