The document discusses PCI-DSS requirements related to India. It provides background on PCI-DSS, noting it was developed by major credit card companies to help organizations secure card data and transactions. India has a large card payment market that is growing, but it also has a high level of credit card fraud and security incidents. As a result, compliance with PCI-DSS standards is important for organizations in India that process card payments to enhance security and prevent fraud.
MTBiz is for you if you are looking for contemporary information on business, economy and especially on banking industry of Bangladesh. You would also find periodical information on Global Economy and Commodity Markets.
Internet threats and its effect on E-commerceVipin Subhash
This is a highlight how internet threats are impacting the digital economy and how a new industry came to light and provided jobs to millions of people.
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
ThreatMetrix® is the market-leading cloud solution for authenticating digital personas and transactions on the Internet.
ThreatMetrix analyzes more than 15 billion transactions annually, from 30,000 websites across 4,000 companies globally through the Digital Identity Network. ThreatMetrix secures businesses and end users against account takeover, payment fraud and fraudulent account registrations resulting from malware and data breaches. Key benefits include an improved customer experience, reduced friction, revenue gain, and lower fraud and operational costs.
The recent batch of mega retailers that have been compromised, including Target, Neiman Marcus and Michaels, has revealed just how vulnerable payment systems are. Even with sophisticated tools, strong security policies, updated regulatory requirements such as PCI v3 and other measures to mitigate these attacks, hackers are still able to compromise the systems by taking advantage of inherent vulnerabilities in payment systems.
In this webcast, payment systems expert Slava Gomzin, author of Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, will show us how retailers such as Target were compromised, what went wrong, failures in PCI to address all vulnerabilities and how these types of breaches can be prevented in the future.
Webcast participants will also receive a free sample chapter of Slava’s book on “Payment Application Architecture,” which provides a detailed overview of how payment systems work, protocols and their weaknesses.
MTBiz is for you if you are looking for contemporary information on business, economy and especially on banking industry of Bangladesh. You would also find periodical information on Global Economy and Commodity Markets.
Internet threats and its effect on E-commerceVipin Subhash
This is a highlight how internet threats are impacting the digital economy and how a new industry came to light and provided jobs to millions of people.
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
ThreatMetrix® is the market-leading cloud solution for authenticating digital personas and transactions on the Internet.
ThreatMetrix analyzes more than 15 billion transactions annually, from 30,000 websites across 4,000 companies globally through the Digital Identity Network. ThreatMetrix secures businesses and end users against account takeover, payment fraud and fraudulent account registrations resulting from malware and data breaches. Key benefits include an improved customer experience, reduced friction, revenue gain, and lower fraud and operational costs.
The recent batch of mega retailers that have been compromised, including Target, Neiman Marcus and Michaels, has revealed just how vulnerable payment systems are. Even with sophisticated tools, strong security policies, updated regulatory requirements such as PCI v3 and other measures to mitigate these attacks, hackers are still able to compromise the systems by taking advantage of inherent vulnerabilities in payment systems.
In this webcast, payment systems expert Slava Gomzin, author of Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, will show us how retailers such as Target were compromised, what went wrong, failures in PCI to address all vulnerabilities and how these types of breaches can be prevented in the future.
Webcast participants will also receive a free sample chapter of Slava’s book on “Payment Application Architecture,” which provides a detailed overview of how payment systems work, protocols and their weaknesses.
Digital Identities within the ThreatMetrix Digital Identity Network show a pattern of trusted behavior by incorporating anonymized non-regulated personal information such as user name, password and email address with device identifiers, connection and location characteristics. At the same time ThreatMetrix profiles all devices accessing a website (desktops, laptops, smartphones, or tablets), to identify the presence of malware or other anomalies that might indicate a high-risk transaction. High risk anomalies can be easily identified and flagged for review or automatic rejection. Businesses can confidently detect transactions, including:
Payments From Legitimate Users – Confidently approve transactions from legitimate, trusted users; streamlining their online experience and reducing unnecessary friction.
Transactions From Cybercriminals – Reject transactions from known fraudsters, or bots carrying out credit card testing. Detect multiple identities using a single device, mismatches between identity and location, devices disguising their true locations, and other indicators of identity theft.
MITM or MITB Malware – Avoid accepting transactions from devices compromised by malware. Use page fingerprinting to detect compromised sessions that may be redirecting or altering transaction information in flight.
Faster payments mean higher risk for fraud, especially through Business Email Compromise (BEC). Learn how to prevent fraudulent Wire transfers from identification to intervention.
Only real-time fraud detection solutions can prevent Peer-to-Peer fraud. Aite Group and Guardian Analytics show you what to be concerned about and how to detect in real-time evolving attacks from fraudsters.
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...ijtsrd
Credit and Debit cards have become the choice mode of payment online as a result of the proliferation of electronic transactions and advancement in Information and Communication Technology ICT . Because of the increased use of credit cards for payment online, the number of fraud cases associated with it has also increased scammers and fraudsters are stealing credit card information of victims online and thereby stealing their monies. There is the need therefore to stop or abate these frauds using very powerful fraud detection system that detects patterns of credit card frauds in order to prevent it from occurring. In this paper we x rayed the concept of credit card frauds and how they are carried out by fraudsters. Python 3.7.6 programming language, Jupyter Notebook 6.0.3 and Anaconda Navigator 1.9.12 were used as experimental test bed. Also, we implemented two different supervised machine learning algorithms on an imbalanced dataset such as Decision Tree and Random forest techniques. A comparative analysis of the credit card detection capabilities of these machine learning algorithms were carried out to ascertain the best detection algorithm using different performance evaluation metrics such as accuracy, precision, recall, f1 score, confusion matrix. Experimental results showed that Random Forest outperformed Decision Tree algorithm slightly in performance metrics used for performance evaluation. Obodoeze Fidelis C. | Oliver Ifeoma Catherine | Onyemachi George Olisamaka | Udeh Ifeanyi Frank Gideon | Obiokafor, Ifeyinwa Nkemdilim "Credit Cards Frauds and Cybersecurity Threats: Machine Learning Detection Algorithms as Countermeasures" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52440.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/52440/credit-cards-frauds-and-cybersecurity-threats-machine-learning-detection-algorithms-as-countermeasures/obodoeze-fidelis-c
Digital Identities within the ThreatMetrix Digital Identity Network show a pattern of trusted behavior by incorporating anonymized non-regulated personal information such as user name, password and email address with device identifiers, connection and location characteristics. At the same time ThreatMetrix profiles all devices accessing a website (desktops, laptops, smartphones, or tablets), to identify the presence of malware or other anomalies that might indicate a high-risk transaction. High risk anomalies can be easily identified and flagged for review or automatic rejection. Businesses can confidently detect transactions, including:
Payments From Legitimate Users – Confidently approve transactions from legitimate, trusted users; streamlining their online experience and reducing unnecessary friction.
Transactions From Cybercriminals – Reject transactions from known fraudsters, or bots carrying out credit card testing. Detect multiple identities using a single device, mismatches between identity and location, devices disguising their true locations, and other indicators of identity theft.
MITM or MITB Malware – Avoid accepting transactions from devices compromised by malware. Use page fingerprinting to detect compromised sessions that may be redirecting or altering transaction information in flight.
Faster payments mean higher risk for fraud, especially through Business Email Compromise (BEC). Learn how to prevent fraudulent Wire transfers from identification to intervention.
Only real-time fraud detection solutions can prevent Peer-to-Peer fraud. Aite Group and Guardian Analytics show you what to be concerned about and how to detect in real-time evolving attacks from fraudsters.
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...ijtsrd
Credit and Debit cards have become the choice mode of payment online as a result of the proliferation of electronic transactions and advancement in Information and Communication Technology ICT . Because of the increased use of credit cards for payment online, the number of fraud cases associated with it has also increased scammers and fraudsters are stealing credit card information of victims online and thereby stealing their monies. There is the need therefore to stop or abate these frauds using very powerful fraud detection system that detects patterns of credit card frauds in order to prevent it from occurring. In this paper we x rayed the concept of credit card frauds and how they are carried out by fraudsters. Python 3.7.6 programming language, Jupyter Notebook 6.0.3 and Anaconda Navigator 1.9.12 were used as experimental test bed. Also, we implemented two different supervised machine learning algorithms on an imbalanced dataset such as Decision Tree and Random forest techniques. A comparative analysis of the credit card detection capabilities of these machine learning algorithms were carried out to ascertain the best detection algorithm using different performance evaluation metrics such as accuracy, precision, recall, f1 score, confusion matrix. Experimental results showed that Random Forest outperformed Decision Tree algorithm slightly in performance metrics used for performance evaluation. Obodoeze Fidelis C. | Oliver Ifeoma Catherine | Onyemachi George Olisamaka | Udeh Ifeanyi Frank Gideon | Obiokafor, Ifeyinwa Nkemdilim "Credit Cards Frauds and Cybersecurity Threats: Machine Learning Detection Algorithms as Countermeasures" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52440.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/52440/credit-cards-frauds-and-cybersecurity-threats-machine-learning-detection-algorithms-as-countermeasures/obodoeze-fidelis-c
With recent developments in technology and increasing volumes of data now being stored and used, organizations are under intense pressure to secure sensitive data from all types of external and internal threats. The biggest challenge lies in being aware of the location and growth of basic information, and the usage of their critical data assets.
The start of 2024 prompts questions about the financial services industry’s future amid rapid technological advancements.
Persistent concerns about high-interest rates and inflation linger, emphasizing the need to stay updated on banking and capital markets trends for real-time adaptation.
https://www.veritis.com/infographics/top-6-biggest-future-trends-in-the-financial-sector/
How AI is impacting digital identity security.pdfVLink Inc
AI is revolutionizing digital identity security by enhancing authentication methods, detecting anomalies, and preventing fraud with its ability to analyze vast data sets and recognize patterns accurately.
Website : https://vlinkinc-my.sharepoint.com/:w:/g/personal/vipul_bhardwaj_vlinkinfo_com/EaQPA2UFPuxKomhOXisVC40Bmj4Jvbu6Zx5XRvmCfNJMSQ?e=cjJXCt
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
With recent developments in technology and increasing volumes of data now being stored and used, organizations are under intense pressure to secure sensitive data from all types of external and internal threats. The biggest challenge lies in being aware of the location and growth of basic information, and the usage of their critical data assets.
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersCognizant
Our latest research reveals that merchants and card issuers should take a layered approach to mitigating risk, by working with consumers to improve fraud detection and prevention.
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
The landscape of threats to sensitive data is changing. New technologies bring with them new vulnerabilities, and organizations like Target are failing to adapt to the shifts around them.
What’s needed is an approach equal to the persistent, advanced attacks companies face every day. The sooner we start adopting the same proactive thinking hackers are using to get at our data, the better we will be able to protect it.
In this webinar, Protegrity CTO and data security thought leader Ulf Mattsson integrates new information from the Verizon 2014 Data Breach Investigation Report (DBIR) into his analysis on what is driving data breaches today, and how we can prevent them in the future.
KEY TOPICS INCLUDE:
• The changing threat landscape
• The effects of new technologies on breaches
• Analysis of recent breaches, including Target
• Compliance vs. security
• The importance of shifting from reactive to proactive thinking
• Preparing for future attacks with new technology & techniques
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Cardnickysharmasucks
The unveiling of the IndusInd Bank Poonawalla Fincorp eLITE RuPay Platinum Credit Card marks a notable milestone in the Indian financial landscape, showcasing a successful partnership between two leading institutions, Poonawalla Fincorp and IndusInd Bank. This co-branded credit card not only offers users a plethora of benefits but also reflects a commitment to innovation and adaptation. With a focus on providing value-driven and customer-centric solutions, this launch represents more than just a new product—it signifies a step towards redefining the banking experience for millions. Promising convenience, rewards, and a touch of luxury in everyday financial transactions, this collaboration aims to cater to the evolving needs of customers and set new standards in the industry.
Even tho Pi network is not listed on any exchange yet.
Buying/Selling or investing in pi network coins is highly possible through the help of vendors. You can buy from vendors[ buy directly from the pi network miners and resell it]. I will leave the telegram contact of my personal vendor.
@Pi_vendor_247
how to swap pi coins to foreign currency withdrawable.DOT TECH
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the contact information for my personal pi vendor.
Telegram: @Pi_vendor_247
how can I sell pi coins after successfully completing KYCDOT TECH
Pi coins is not launched yet in any exchange 💱 this means it's not swappable, the current pi displaying on coin market cap is the iou version of pi. And you can learn all about that on my previous post.
RIGHT NOW THE ONLY WAY you can sell pi coins is through verified pi merchants. A pi merchant is someone who buys pi coins and resell them to exchanges and crypto whales. Looking forward to hold massive quantities of pi coins before the mainnet launch.
This is because pi network is not doing any pre-sale or ico offerings, the only way to get my coins is from buying from miners. So a merchant facilitates the transactions between the miners and these exchanges holding pi.
I and my friends has sold more than 6000 pi coins successfully with this method. I will be happy to share the contact of my personal pi merchant. The one i trade with, if you have your own merchant you can trade with them. For those who are new.
Message: @Pi_vendor_247 on telegram.
I wouldn't advise you selling all percentage of the pi coins. Leave at least a before so its a win win during open mainnet. Have a nice day pioneers ♥️
#kyc #mainnet #picoins #pi #sellpi #piwallet
#pinetwork
how to sell pi coins in all Africa Countries.DOT TECH
Yes. You can sell your pi network for other cryptocurrencies like Bitcoin, usdt , Ethereum and other currencies And this is done easily with the help from a pi merchant.
What is a pi merchant ?
Since pi is not launched yet in any exchange. The only way you can sell right now is through merchants.
A verified Pi merchant is someone who buys pi network coins from miners and resell them to investors looking forward to hold massive quantities of pi coins before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...Quotidiano Piemontese
Turin Startup Ecosystem 2024
Una ricerca de il Club degli Investitori, in collaborazione con ToTeM Torino Tech Map e con il supporto della ESCP Business School e di Growth Capital
Resume
• Real GDP growth slowed down due to problems with access to electricity caused by the destruction of manoeuvrable electricity generation by Russian drones and missiles.
• Exports and imports continued growing due to better logistics through the Ukrainian sea corridor and road. Polish farmers and drivers stopped blocking borders at the end of April.
• In April, both the Tax and Customs Services over-executed the revenue plan. Moreover, the NBU transferred twice the planned profit to the budget.
• The European side approved the Ukraine Plan, which the government adopted to determine indicators for the Ukraine Facility. That approval will allow Ukraine to receive a EUR 1.9 bn loan from the EU in May. At the same time, the EU provided Ukraine with a EUR 1.5 bn loan in April, as the government fulfilled five indicators under the Ukraine Plan.
• The USA has finally approved an aid package for Ukraine, which includes USD 7.8 bn of budget support; however, the conditions and timing of the assistance are still unknown.
• As in March, annual consumer inflation amounted to 3.2% yoy in April.
• At the April monetary policy meeting, the NBU again reduced the key policy rate from 14.5% to 13.5% per annum.
• Over the past four weeks, the hryvnia exchange rate has stabilized in the UAH 39-40 per USD range.
If you are looking for a pi coin investor. Then look no further because I have the right one he is a pi vendor (he buy and resell to whales in China). I met him on a crypto conference and ever since I and my friends have sold more than 10k pi coins to him And he bought all and still want more. I will drop his telegram handle below just send him a message.
@Pi_vendor_247
how to sell pi coins on Bitmart crypto exchangeDOT TECH
Yes. Pi network coins can be exchanged but not on bitmart exchange. Because pi network is still in the enclosed mainnet. The only way pioneers are able to trade pi coins is by reselling the pi coins to pi verified merchants.
A verified merchant is someone who buys pi network coins and resell it to exchanges looking forward to hold till mainnet launch.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
Introduction to Indian Financial System ()Avanish Goel
The financial system of a country is an important tool for economic development of the country, as it helps in creation of wealth by linking savings with investments.
It facilitates the flow of funds form the households (savers) to business firms (investors) to aid in wealth creation and development of both the parties
how to sell pi coins in South Korea profitably.DOT TECH
Yes. You can sell your pi network coins in South Korea or any other country, by finding a verified pi merchant
What is a verified pi merchant?
Since pi network is not launched yet on any exchange, the only way you can sell pi coins is by selling to a verified pi merchant, and this is because pi network is not launched yet on any exchange and no pre-sale or ico offerings Is done on pi.
Since there is no pre-sale, the only way exchanges can get pi is by buying from miners. So a pi merchant facilitates these transactions by acting as a bridge for both transactions.
How can i find a pi vendor/merchant?
Well for those who haven't traded with a pi merchant or who don't already have one. I will leave the telegram id of my personal pi merchant who i trade pi with.
Tele gram: @Pi_vendor_247
#pi #sell #nigeria #pinetwork #picoins #sellpi #Nigerian #tradepi #pinetworkcoins #sellmypi
Latino Buying Power - May 2024 Presentation for Latino CaucusDanay Escanaverino
Unlock the potential of Latino Buying Power with this in-depth SlideShare presentation. Explore how the Latino consumer market is transforming the American economy, driven by their significant buying power, entrepreneurial contributions, and growing influence across various sectors.
**Key Sections Covered:**
1. **Economic Impact:** Understand the profound economic impact of Latino consumers on the U.S. economy. Discover how their increasing purchasing power is fueling growth in key industries and contributing to national economic prosperity.
2. **Buying Power:** Dive into detailed analyses of Latino buying power, including its growth trends, key drivers, and projections for the future. Learn how this influential group’s spending habits are shaping market dynamics and creating opportunities for businesses.
3. **Entrepreneurial Contributions:** Explore the entrepreneurial spirit within the Latino community. Examine how Latino-owned businesses are thriving and contributing to job creation, innovation, and economic diversification.
4. **Workforce Statistics:** Gain insights into the role of Latino workers in the American labor market. Review statistics on employment rates, occupational distribution, and the economic contributions of Latino professionals across various industries.
5. **Media Consumption:** Understand the media consumption habits of Latino audiences. Discover their preferences for digital platforms, television, radio, and social media. Learn how these consumption patterns are influencing advertising strategies and media content.
6. **Education:** Examine the educational achievements and challenges within the Latino community. Review statistics on enrollment, graduation rates, and fields of study. Understand the implications of education on economic mobility and workforce readiness.
7. **Home Ownership:** Explore trends in Latino home ownership. Understand the factors driving home buying decisions, the challenges faced by Latino homeowners, and the impact of home ownership on community stability and economic growth.
This SlideShare provides valuable insights for marketers, business owners, policymakers, and anyone interested in the economic influence of the Latino community. By understanding the various facets of Latino buying power, you can effectively engage with this dynamic and growing market segment.
Equip yourself with the knowledge to leverage Latino buying power, tap into their entrepreneurial spirit, and connect with their unique cultural and consumer preferences. Drive your business success by embracing the economic potential of Latino consumers.
**Keywords:** Latino buying power, economic impact, entrepreneurial contributions, workforce statistics, media consumption, education, home ownership, Latino market, Hispanic buying power, Latino purchasing power.
USDA Loans in California: A Comprehensive Overview.pptxmarketing367770
USDA Loans in California: A Comprehensive Overview
If you're dreaming of owning a home in California's rural or suburban areas, a USDA loan might be the perfect solution. The U.S. Department of Agriculture (USDA) offers these loans to help low-to-moderate-income individuals and families achieve homeownership.
Key Features of USDA Loans:
Zero Down Payment: USDA loans require no down payment, making homeownership more accessible.
Competitive Interest Rates: These loans often come with lower interest rates compared to conventional loans.
Flexible Credit Requirements: USDA loans have more lenient credit score requirements, helping those with less-than-perfect credit.
Guaranteed Loan Program: The USDA guarantees a portion of the loan, reducing risk for lenders and expanding borrowing options.
Eligibility Criteria:
Location: The property must be located in a USDA-designated rural or suburban area. Many areas in California qualify.
Income Limits: Applicants must meet income guidelines, which vary by region and household size.
Primary Residence: The home must be used as the borrower's primary residence.
Application Process:
Find a USDA-Approved Lender: Not all lenders offer USDA loans, so it's essential to choose one approved by the USDA.
Pre-Qualification: Determine your eligibility and the amount you can borrow.
Property Search: Look for properties in eligible rural or suburban areas.
Loan Application: Submit your application, including financial and personal information.
Processing and Approval: The lender and USDA will review your application. If approved, you can proceed to closing.
USDA loans are an excellent option for those looking to buy a home in California's rural and suburban areas. With no down payment and flexible requirements, these loans make homeownership more attainable for many families. Explore your eligibility today and take the first step toward owning your dream home.
The European Unemployment Puzzle: implications from population agingGRAPE
We study the link between the evolving age structure of the working population and unemployment. We build a large new Keynesian OLG model with a realistic age structure, labor market frictions, sticky prices, and aggregate shocks. Once calibrated to the European economy, we quantify the extent to which demographic changes over the last three decades have contributed to the decline of the unemployment rate. Our findings yield important implications for the future evolution of unemployment given the anticipated further aging of the working population in Europe. We also quantify the implications for optimal monetary policy: lowering inflation volatility becomes less costly in terms of GDP and unemployment volatility, which hints that optimal monetary policy may be more hawkish in an aging society. Finally, our results also propose a partial reversal of the European-US unemployment puzzle due to the fact that the share of young workers is expected to remain robust in the US.
2. About PCI-DSS :
The Payment Card Industry Data Security Standard
(PCI DSS) is a widely accepted set of policies and
procedures intended to optimize the security of
credit, debit and cash card transactions and protect
cardholders against misuse of their personal
information. The Payment Card Industry Security
Standards Council (PCI SSC) was launched on
September 7, 2006 to manage the ongoing evolution
of the Payment Card Industry (PCI) security
standards with focus on improving payment account
security throughout the transaction process.
3. Key Players in PCI-DSS :
Often denoted as PCI-DSS, the Payment Card
Industry - Data Security Standard was developed by
major credit card companies as a guideline to help
organizations that process card payments combat
and prevent credit card fraud, hacking and various
security vulnerabilities as well as threats. The PCI
DSS was created jointly in 2004 by four major creditcard companies: Visa, MasterCard, Discover and
American Express.
4. Applicability of PCI :
PCI applies to ALL organizations or merchants, regardless of
size or number of transactions, that accepts, transmits or
stores any cardholder data. Said another way, if any customer
of that organization ever pays the merchant directly using a
credit card or debit card, then the PCI-DSS requirements
apply.
5. Requirements of PCI-DSS In India :
India,the second-most populous country with over
1.27 billion people, and the most populous
democracy in the world,where E-payments through
cards are extensively used for various transactions.
The transaction level of 45 million debit card
transactions for Rs 7,000 Cr in value p.m. and 19
million credit cards transactions for Rs 12,000 Cr in
value p.m. shows that the card payment industry is
no longer small as it used to be 5 years back.
Continues….
6. …….
India has emerged as the ransomware capital
of Asia Pacific with 11% of the total victims
belonging to the country. The report that was
released in October 2013, pointed out that
the internet users too adopted 'risky' habits
such as accessing bank account or shopping
online through a public or unsecure Wi-Fi or
sharing passwords that made them more
vulnerable to threats.
7. Statistic about the usage :
350
300
250
200
150
Million
100
50
0
Debit Card
(336M)
ATM's
(0.12M)
Credit Card
(19M)
POS
Terminals
(0.9M)
8. In sum, the size of the card payments market in India
is big and getting bigger day by day. As per the
Symantec Internet security, Threat Report
2013, countries leading the charts in threat
pertaining to bank cards are United States, China
and India and India accounting for 6.5% of the total
targeted attacks in 2012. In sum, the incident level is
a matter of concern for our country. Since several
countries have taken different preventive steps, we
should guard ourselves against card fraud moving in
to India & we can’t ignore the fact that “Fraudsters
are a step ahead of Market”.
9. Frauds in India & its Involvement in Global Scam :
A man allegedly involved in theft of Credit Card of
more than 30K customers of a private sector bank &
making transactions worth crores of rupees finally
landed in police net in 2013 in Delhi.
Glimpse of Card Frauds in India :SBI lodges FIR in ATM frauds case- Patna.
Teacher loses Rs 14K in ATM fraud- Ambala.
E-banking fraud: 1.2L stolen from dentist’s account- Dadar.
Honcho loses Rs 19L in cyber fraud- New Delhi.
6 arrested for online fraud- Allahabad.
Man loses his July salary to card fraud in 25 mins- Mumbai.
Debit card racket with overseas link unearthed – Madurai.
10. International Credit Card Scam :
200 Million Dollar Credit Card Scam:Five Indian-origin men were among 18 others charged for
running a whopping 200 million dollar global credit card
fraud under which they used thousands of fake identities to
dupe businesses and financial firms and wired millions of
dollars to Pakistan and India. This types of incidents
clearly depicts how Indians are actively
involved in various frauds involving
debit/credit cards. As a result there is
a high alarm in the banking, retail &
other sectors using online cards for
processing their day to day transactions.
11. Telephone Card Payment in India :
There is a risk that organizations taking customer
payment card details over the telephone may be
recording the full cardholder details to comply with
various regulatory bodies, potentially exposing
cardholder data to unnecessary risk. With 66 percent
of Indian consumers using their personal mobile
device for both work and play, this creates entirely
new security risks for enterprises as cybercriminals
have the potential to access even more valuable
information.
12. Conclusion :
Considering the rapid growth of the cards payment
markets & merchants in India, sooner we have to
adopt additional factor of authentication for card
present transactions in various terminals dealing with
debit/credit cards.
The way frauds related to credit/debit cards are
spreading across various corner in India , it becomes
imperative for organisations to covers them under
PCI-DSS.
Editor's Notes
Cardholders - persons who are authorized to use credit cards for the payment of goods and services.
Merchants - Entities which agree to accept credit cards for payment of goods and services.
Source:- Work shop on card frauds organized by NIBM, Pune.
An analysis reveals that cash withdrawal at the 1,20,000 ATMs in the country is as high as Rs.7000 Cr a day.