SlideShare a Scribd company logo
An Undergraduate Independent Study
Online transactions security
Introduction
Importance
Presentation Content
Future directions
Conclusion
2
Online transactions security
 What is an online transaction?
 Risks involved
 Challenge of providing security
3
Online transactions security
Online stores and Sales increasing
 Huge money flow
 Vital part of the world economy
 Maintain consumer trust
4
Online transactions security
 The 3-D Secure protocol (3DS)
 Extended Validation
 SiteKey
 SafePass
 TLS - OBC
5
Online transactions security
 Developed by Visa as Verified by Visa, Licensed by
MasterCard and American Express
 XML-based protocol
 In 3-D Secure 3-D stands for three domains
Acquirer Domain (bank who received the money).
Issuer Domain (bank who issued the card).
Interoperability Domain (Infrastructure supported for the 3-
DS)
6
Online transactions security
How it works…
7
Online transactions security
Phishing sites were black listed but no one can make a
prefect black list.
Extended Validation was Invented by CA/Browser
forum and Supported by all major browsers.
Used to identify the correct web domain by positive
safety indicators.
90% of the average users have no idea of how to use
Extended Validation
8
Online transactions security 9
Online transactions security
 Use by Bank of America
 SiteKey is a Image that Helps customers to verify
this is the real web site before proceed with the
transaction.
 SafePass feature lets customer to authorize
transactions using 6-digit Passcodes. Only used in
“Bigger” transactions.
10
Online transactions security 11
Online transactions security
 Transport Layer Security – Origin Bound Certificates
 Modified version of old TLS client certificates
 Origin-Bound Certificates are self-signed, browsers use
them to implement TLS Client Authentication.
 The initial user-authentication phase is largely
considered.
 Stand Strong against Man in the Middle (MITM) attacks.
12
Online transactions security 13
Online transactions security
Researches are expected to be done more for
commercial usages rather than for educational and
knowledge graining purposes.
Main challenge here is to develop the average user
awareness.
To be meaningful Research outcomes should be fair
trade offs between user friendliness and security
tightness.
14
Online transactions security 15

More Related Content

Viewers also liked

Why cycling to work might be a good idea to everyone
Why cycling to work might be a good idea to everyoneWhy cycling to work might be a good idea to everyone
Why cycling to work might be a good idea to everyoneJustinishere
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsDaveEdwards12
 
Onlinetransaction
OnlinetransactionOnlinetransaction
Onlinetransactionarikazukito
 
No Free Lunch: Transactions in Online Games
No Free Lunch: Transactions in Online GamesNo Free Lunch: Transactions in Online Games
No Free Lunch: Transactions in Online GamesJames Gwertzman
 
The Selfie Phenomenon Around the Globe
The Selfie Phenomenon Around the  GlobeThe Selfie Phenomenon Around the  Globe
The Selfie Phenomenon Around the Globemaditabalnco
 
Sociological Impact of Selfies
Sociological Impact of SelfiesSociological Impact of Selfies
Sociological Impact of SelfiesSylvester Chiang
 
Online Payment Transactions
Online Payment TransactionsOnline Payment Transactions
Online Payment Transactionspcomo2009
 
Consumers, rights and responsibilites ppt
Consumers, rights and responsibilites pptConsumers, rights and responsibilites ppt
Consumers, rights and responsibilites pptSuaj
 
Kerala ppt
Kerala pptKerala ppt
Kerala pptTeacher
 
Mars orbiter mission (Mangalyaan)The govt. of INDIA
Mars orbiter mission (Mangalyaan)The govt. of INDIAMars orbiter mission (Mangalyaan)The govt. of INDIA
Mars orbiter mission (Mangalyaan)The govt. of INDIAArchit Jindal
 
abortion ppt
abortion pptabortion ppt
abortion pptAmeenah
 
Internet Banking
Internet BankingInternet Banking
Internet Bankingsnehateddy
 
The Three Lies About Your Age
The Three Lies About Your AgeThe Three Lies About Your Age
The Three Lies About Your AgeSean Si
 
Love Presentation
Love PresentationLove Presentation
Love Presentationronkelley
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)a16z
 

Viewers also liked (20)

Why cycling to work might be a good idea to everyone
Why cycling to work might be a good idea to everyoneWhy cycling to work might be a good idea to everyone
Why cycling to work might be a good idea to everyone
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactions
 
Onlinetransaction
OnlinetransactionOnlinetransaction
Onlinetransaction
 
No Free Lunch: Transactions in Online Games
No Free Lunch: Transactions in Online GamesNo Free Lunch: Transactions in Online Games
No Free Lunch: Transactions in Online Games
 
The Selfie Phenomenon Around the Globe
The Selfie Phenomenon Around the  GlobeThe Selfie Phenomenon Around the  Globe
The Selfie Phenomenon Around the Globe
 
Online transaction
Online transactionOnline transaction
Online transaction
 
Sociological Impact of Selfies
Sociological Impact of SelfiesSociological Impact of Selfies
Sociological Impact of Selfies
 
Online Payment Transactions
Online Payment TransactionsOnline Payment Transactions
Online Payment Transactions
 
Sleep..ppt
Sleep..pptSleep..ppt
Sleep..ppt
 
Consumers, rights and responsibilites ppt
Consumers, rights and responsibilites pptConsumers, rights and responsibilites ppt
Consumers, rights and responsibilites ppt
 
Sleep
SleepSleep
Sleep
 
Kerala ppt
Kerala pptKerala ppt
Kerala ppt
 
Deliver An Amazingly Boring Presentation
Deliver An Amazingly Boring PresentationDeliver An Amazingly Boring Presentation
Deliver An Amazingly Boring Presentation
 
Philosophy of love
Philosophy of lovePhilosophy of love
Philosophy of love
 
Mars orbiter mission (Mangalyaan)The govt. of INDIA
Mars orbiter mission (Mangalyaan)The govt. of INDIAMars orbiter mission (Mangalyaan)The govt. of INDIA
Mars orbiter mission (Mangalyaan)The govt. of INDIA
 
abortion ppt
abortion pptabortion ppt
abortion ppt
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
The Three Lies About Your Age
The Three Lies About Your AgeThe Three Lies About Your Age
The Three Lies About Your Age
 
Love Presentation
Love PresentationLove Presentation
Love Presentation
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

Similar to Online transaction security (an undergraduate independent study)

All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7koolkampus
 
Building Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development ServicesBuilding Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development ServicesBlocktech brew
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...Alex Tan
 
Is Coinbase Clone Script a Safe Platform?
Is Coinbase Clone Script a Safe Platform?Is Coinbase Clone Script a Safe Platform?
Is Coinbase Clone Script a Safe Platform?oliviaxavier025
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...IJERA Editor
 
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurityComodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurityCheapSSLsecurity
 
Transactions You Can Trust_ The Most Reliable Escrow Apps for Canadians.pdf
Transactions You Can Trust_ The Most Reliable Escrow Apps for Canadians.pdfTransactions You Can Trust_ The Most Reliable Escrow Apps for Canadians.pdf
Transactions You Can Trust_ The Most Reliable Escrow Apps for Canadians.pdfSafeDeposit
 
Best practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdfBest practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdfPay10
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3Ouriel Ohayon
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...IOSR Journals
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Design and Implementation of Electronic Payment Gateway for Secure Online Pay...
Design and Implementation of Electronic Payment Gateway for Secure Online Pay...Design and Implementation of Electronic Payment Gateway for Secure Online Pay...
Design and Implementation of Electronic Payment Gateway for Secure Online Pay...ijtsrd
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Heather Vargas
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure ProtocolVlad Petre
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - finalAlex Tan
 

Similar to Online transaction security (an undergraduate independent study) (20)

All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
Building Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development ServicesBuilding Trust and Security: Crypto Exchange Development Services
Building Trust and Security: Crypto Exchange Development Services
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
 
Is Coinbase Clone Script a Safe Platform?
Is Coinbase Clone Script a Safe Platform?Is Coinbase Clone Script a Safe Platform?
Is Coinbase Clone Script a Safe Platform?
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurityComodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
 
Transactions You Can Trust_ The Most Reliable Escrow Apps for Canadians.pdf
Transactions You Can Trust_ The Most Reliable Escrow Apps for Canadians.pdfTransactions You Can Trust_ The Most Reliable Escrow Apps for Canadians.pdf
Transactions You Can Trust_ The Most Reliable Escrow Apps for Canadians.pdf
 
Best practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdfBest practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdf
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
Stop losing your NFTs - introducing ZenGo ClearSign Firewall for web3
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Design and Implementation of Electronic Payment Gateway for Secure Online Pay...
Design and Implementation of Electronic Payment Gateway for Secure Online Pay...Design and Implementation of Electronic Payment Gateway for Secure Online Pay...
Design and Implementation of Electronic Payment Gateway for Secure Online Pay...
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - final
 

Recently uploaded

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxGal Baras
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxnatyesu
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shoplaozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxlaozhuseo02
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxTristanJasperRamos
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfSiskaFitrianingrum
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptxJungkooksNonexistent
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
 

Recently uploaded (12)

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 

Online transaction security (an undergraduate independent study)