SlideShare a Scribd company logo
Global point of view
For nearly 50 years MasterCard has been safeguarding the way you pay.
We have been innovating solutions driven by data and insights
to increase the safety and security of electronic payments.
SAFE AND SECURE PAYMENTS:
THE MASTERCARD APPROACH
1
1. It is important to keep in mind that fraud is separate from the compromise (i.e., exposure) of payment account information. Due to a variety of security
measures implemented by the industry and MasterCard, only a fraction of compromises result in fraud, especially if the transaction requires
authentication (i.e., verification).
2. As an example, all card transactions in the US are protected by our zero liability promise, eliminating financial exposure to the consumer in the event of
fraud. MasterCard is working to extend this promise to other markets / regions.
Our safety and security guarantee:
we want to give consumers the peace of mind to pay with confidence, and our goal is to build a
world beyond cash where every person, every payment and every device is protected.
Consumers need a safe and simple experience when making a payment, wherever they are
in the world and whether they tap, click or swipe. MasterCard is investing time and money to
continuously enhance the technology to detect and prevent fraud so that consumers can be
confident that their money is safe.
In the rare event that fraud1
does occur, we ensure consumer peace of mind by limiting or
eliminating cardholder liability2
.
Executive summary
MasterCard is the leading technology company delivering electronic payments and the leader in
safety and security
•	 Technology and payment methods are changing every day – payments are becoming faster,
smarter and more sophisticated.
•	 Cards remain one of the safest ways to pay, with only 6 cents for every $100 spent on major
global cards lost to fraud. MasterCard’s safety and security measures have already reduced
this number to 5 cents.
•	 We are investing in innovative payment and security solutions so consumers have a safe,
secure and convenient payment experience.
Safety and security is our number one priority. MasterCard guarantees safety and security with
smart technology to ensure we are always one step ahead of fraudsters
1. We are making sure consumers are protected from fraud before it even occurs
2. There is no silver bullet to fight fraud, and MasterCard has implemented multiple layers of
protection to significantly reduce the risk of fraud:
•	 Unobtrusive network-wide tools help merchants and issuers identify and prevent fraud;
•	 New solutions and products in the consumer’s hand empower their transactions with the
latest safety and security measures;
•	 Consumers are protected by limited / zero consumer liability guarantees for fraud, with
efforts underway to expand this protection by working with local regulators, banks, and
merchants;
•	 MasterCard led the initiatives on EMV (with chip-embedded cards its most visible
hallmark) and SecureCode technology to dramatically reduce fraud;
•	 Our network screens 1.8bn transactions every month to help detect and eliminate
suspect and fraudulent activity;
•	 We are already delivering data and insights to drive increased security across any device
anywhere;
•	 We are testing voice, finger print and facial recognition identification innovations to keep
payments safe.
2
Key messages by constituent
Our overall message is: “We want to build a world beyond cashwhere every person,
every payment, and every device is protected”.
CONSUMERS
are ensured peace of
mind against fraud
ISSUERS
are given
sophisticated
tools to improve
their approval
and fraud
detection
capabilities
MERCHANTS
are provided a
rich ecosystem
that rewards
their efforts to
prevent fraud
by providing
shifts in liability
Mastercard’s multi-layer protection
As payment methods and devices change and become commonplace in every aspect of our lives
– whether stopping by a retail store in person or shopping online from a computer or a mobile
device – MasterCard’s efforts have also evolved and adapted to ensure
the safety of electronic payments wherever and whenever they occur.
Overall, authentication is the critical element of preventing fraud in
both physical (Card Present) and non-physical (Card Not Present)
environments and helps determine whether:
1. The card / payment device is genuine (card / device verification), and
2. The person initiating the transaction is the authorized user
(cardholder verification).
While there is no silver bullet to completely stop fraud, applying a
multi-layer approach that is coordinated across the industry helps
reduce the risk of fraud significantly. EMV, SecureCode+, MasterCard
Digital Enablement Service (MDES) and tokenization, as well as Risk
Based Decisioning, are only a few examples of MasterCard’s broader
efforts to fight the persistent threat of fraud, be it with card present or
card not present payments.
SecureCode+
Risk Based Decisioning (RBD)
Expert Monitoring Solutions
(EMS)
Fraud Rules Manager
(FRM)
EMV
MULTI-LAYER PROTECTION
MDES and tokenization
3
MasterCard leverages the power of its network to monitor transactions across the globe and
identify fraud. EMS (EXPERT MONITORING SOLUTIONS) and FRM (FRAUD RULES MANAGER)
are at the core of MasterCard’s anti-fraud efforts, underpinning our ability to detect suspicious
activity and transactions and provide issuers with the tools to supplement their own fraud
systems and processes.
MasterCard company DataCash also offers
GateKeeper:2.0, an advanced fraud and
risk management solution, for merchants to
keep chargebacks to a minimum whilst protecting genuine customers. The solution uses layers
of sophisticated technologies, such as expertly crafted rules, Shared databases, Device ID, etc,
to precisely identify a transaction’s level of risk. High risk transactions are automatically rejected
whilst low risk transactions are accepted. A small number of transactions that are not clearly
fraudulent or genuine can be manually reviewed via an intuitive user interface which enables
further analysis for a more informed decision. The solution is differentiated by a team of experts
that have vast experience of fraud trends across multiple industries and achieves industry leading
results.
MasterCard – in partnership with Visa, American Express, JCB, and China UnionPay –
developed and implemented the EMV specification, with the chip payment method its most
visible hallmark. MasterCard has introduced the M/Chip and M/Chip Advance payment
applications to secure our payments globally. The embedded chip on the plastic card along with
the MasterCard payment application is significantly more secure than magnetic stripe cards and
its introduction has reduced counterfeit fraud by 60-80%.
In Canada, where Chip and PIN is commonplace
(90%+ penetration), fraud declined 73% over 4 years, falling from $142 million
in 2009 to only $39 million by 2012 (2.0 bps of domestic debit card volume).
MasterCard continues to push for global adoption of EMV and has led efforts to encourage a
fraud liability shift by late 2015 in the US, the last major market to withhold from widespread
acceptance.
We process over 1,100 transactions every second – about 108 transactions in the blink of an eye.
We screen 1.8bn transactions every month in real time to help detect and eliminate fraud.
2.0
3.8
6.8
8.3
6.2
6.8
6.3
0
1
2
3
4
5
6
7
8
9
CAD $100
CAD $200
CAD $150
CAD $50
Fraud losses (in CAD $mm) Fraud as bps of spend
2012
$70
2011
$119
2009
$39
2010
$107
2006
$95
$142
2008
$105
2007
Fraud losses (CAD $mm) Fraud as bps of spend
EMV piloted in Canada
EMV launched – liability shift
and implementation
EMV
Timeline
73% drop in
fraud dollars
4
MASTERCARD DIGITAL ENABLEMENT SERVICE (MDES) will introduce a new secure platform for
payments via mobile devices, including both Card Present and Card Not Present environments by
late 2014. MDES substitutes the real card number with a “token” account number. This token is
“translated” back to the real account number by MasterCard at the time of purchase, so the issuer
can match up the transaction with the correct account. If compromised, tokens cannot be used by
fraudsters to facilitate fraud. As an added benefit, the merchant only receives the token and never
sees real account data, removing a further point of weakness for fraudsters to target.
In 2013, MasterCard launched SECURECODE+, the latest upgrade to
its SecureCode technology, which allows merchants to add another layer
of security for online transactions by asking the consumer to enter a
password using SecureCode+. The SecureCode+ password is only known
by the account owner and the merchant can choose which transactions
are required to use it.Merchants do not have to use SecureCode+ if they trust the transaction and can
dial their authentication needs up or down depending on the desire for further verification.
SecureCode+ can also provide a liability shift for merchants: The more a merchant attempts to protect
the end consumer through authentication, the more they benefit from protection against fraud.
In 2013, SecureCode authenticated 1.4 billion transactions globally, reporting 28% growth in a single
year. By dollar volume, SecureCode ensured the safety of about 29% of all online spend around the world.
RISK BASED DECISIONING will add a third layer of security in the CNP space. Its basic premise is to
use a consumer email address, device information, and account number to develop a unique online
“persona.” Based on this digital footprint, we can seamlessly authenticate consumers with no effort
on their part. Over time, this unique persona will be given a reputation score which can be used by
merchants and issuers with their payment approval process.
As an example, returning consumers with a high reputation score can proceed through checkout
without ever having to authenticate, resulting in a faster sale with higher likelihood of satisfaction
and fewer abandoned purchases.
Our top priority:
safety and security for consumers
In the event fraud occurs, we ensure the consumer is partly or wholly shielded from financial
liability or loss resulting from fraud. Consumer liability is generally determined by local regulatory
conditions, and MasterCard is working with governments around the world to ensure our rules
are one step ahead when it comes to protecting consumers. From a merchant and issuer
perspective, the rules for determining fraud liability are complex and varied, but are aligned to
reward the party that exerts the most effort to secure the transaction.
OUR PROMISE TO PROTECT THE CONSUMER FROM FRAUD WILL REMAIN OUR UTMOST
PRIORITY.
MasterCard leverages our brand, reputation, and franchise to shield consumers from fraud.
Our efforts have already reduced cardholder liability around the world, and in the US we have
managed to establish a zero liability guarantee. We aim to expand this zero liability guarantee to our
cardholders globally and continue to work with local regulators, banks and merchants around the world to
protect the consumer.
5
APPENDIX
FRAUD 101
Fraud is the financial loss associated with unauthorized use of an account, whether it is using
those credentials to buy merchandise, transfer funds, withdraw money, or receive some other
financial benefit.
Consumers place safety and security as their first and foremost practical and emotional need
for their payments. Credit and debit cards have gained prominence and ubiquity as financial
instruments due to their ability to satisfy these needs.
In 2012, it was estimated that US credit and debit cards experienced approximately
6 bps of fraud, and MasterCard leads the industry with an even lower figure (5 bps).
THE COST OF FRAUD
Fraud cost the global card industry more than USD $11 billion in 2012.
Despite making up less than a quarter (24%) of the world’s payments volume,
the United States constitutes almost half (47%) of all fraud losses, losing $5.3 billion to criminals.
The fast-growing online retail space is a particular challenge.
Despite being screened and declined almost 6x as often as Card Present (CP),
Card Not Present (CNP) fraud is 3x higher.
Source: MasterCard data warehouse, 2013
Source: Nilson Report 2013, MasterCard data warehouse; last 12 months figure is through 3Q 2013. All cards (global) figure includes MasterCard, Visa,
American Express, China Union Pay, Diners Club, and JCB.
Card Not
Present
comprises
45% of global fraud,
but only 8% of global
spend
The US
comprises 45%
of global fraud,
but only 24% of global
spend
Card Not
Present
fraud is still
3x
greater than Card
Present, despite
being declined
6x more often Card
Present (CP)
Card Not
Present (CNP)
Card
Present (CP)
Card Not
Present (CNP)
6x
3x
Decline rate
by transactions
Fraud rate
by dollars
5.05.3
6.1
MasterCard,
global (2012)
All brands,
global (2012)
MasterCard,
global (last
12 months)
In 2012, MasterCard
experienced 14% less gross
fraud than the global average
This figure is even lower in
the last 12 months
63%
37%
Issuer fraud cost
Merchant fraud cost
$7.1
billion
$4.2
billion
Global fraud
cost 2012
$11.3 billion
Card Not
Present
comprises
45% of global fraud,
but only 8% of global
spend
The US
comprises 45%
of global fraud,
but only 24% of global
spend
Card Not
Present
fraud is still
3x
greater than Card
Present, despite
being declined
6x more often Card
Present (CP)
Card Not
Present (CNP)
Card
Present (CP)
Card Not
Present (CNP)
6x
3x
Decline rate
by transactions
Fraud rate
by dollars
5.0
5.3
6.1
MasterCard,
global (2012)
All brands,
global (2012)
MasterCard,
global (last
12 months)
In 2012, MasterCard
experienced 14% less gross
fraud than the global average
This figure is even lower in
the last 12 months
63%
37%
Issuer fraud cost
Merchant fraud cost
$7.1
billion
$4.2
billion
Global fraud
cost 2012
$11.3 billion
6
ILLUSTRATIVE OVERVIEW OF CARD FRAUD PROCESS
For card fraud to occur, the perpetrator must successfully navigate a few major
barriers:
1. Payment account information is lost, stolen, or otherwise compromised and
2. The issuer authorizes the transaction as a legitimate purchase.
3. In some cases, the perpetrator may also be required to authenticate (i.e., prove they are
the legitimate cardholder).
In other words, the perpetrator must find a way to obtain account data and then successfully
imitate the legitimate user’s typical purchase behavior when attempting to consummate a
fraudulent transaction.
The authorization and authentication steps are unique to cards and, as a result, only a small
percentage of compromises of account data lead to fraud.
Compromise /
expose account
data to perpetrate
fraud
Authenticate as the real
cardholder by imitating
key security elements
Fraud results if perpetrators
successfully navigate these
safeguards, but in certain cases
the cardholder is protected by
our zero liability promise
Data breach
1
3
4
Receive
authorization
from issuer to
approve purchase
2
Phishing
Trick consumer into
revealing personal info
Skimming
Copy static card data
during a transaction
Account
takeover
Stolen data used
to takeover or
create accounts
Example compromise techniques
Data breach
Hack systems that
handle account data
Fraud /
financial
loss
MasterCard’s network-wide
monitoring tools aid issuer
decisioning (EMS and FRM)
Issuers rely on their own fraud
detection system when deciding to
approve / decline transactions
Authentication reduces fraud
– e.g., entering a PIN –
Example fraud types
Counterfeit
Clone cards
and use at
POS
Lost and
stolen
Theft of
legitimate
card
Card not
present
Fraud
perpetrated
without card
but is often not
required by issuers or
merchants to ensure
faster speed to pay
7
Informations is used to make
online purchases or cline
cards. With SecureCode+,
however, accounts are
protected by the consumer's
secure password.
Fraud protection in practice: two case studies
To illustrate the points discussed in this paper, we present two sample case studies: (1) a
phishing attack to expose data which is later used to make purchases online and (2) the theft of
data from a payment system to sell account information and produce counterfeit cards.
FRAUD CASE STUDY #1:
PHISHING COMPROMISE, CARD NOT PRESENT PROTECTIONS
While not technically sophisticated, phishing compromises are difficult to protect against given
the consumer is often the party disclosing account information. Nonetheless, innovations such as
SecureCode+ will make it much harder for fraudsters to perpetrate their activities online.
Consumers receives email
purporting to be from
a trusted source (e.g.,
friend, reputable company
etc.)asking consumer to
click on the link.
Clicking the link installs
malware or uses social
engeneering to trick
consumer into revealing
card account data.
1 2 3
8
FRAUD CASE STUDY #2:
DATA BREACH COMPROMISE, CARD PRESENT PROTECTIONS
Administrative
credentials
compromised
ILLUSTRATIVE
EXAMPLE
Malware
installed on
POS terminals
Card account
data captured
Data used to
attempt fraud
Data compromise activities
 Perpetrators access retailer’s
system through compromised
admin credentials (e.g. obtained
through brute force, phishing, etc.)
 Terminals only capture the data
required to process a transaction
– E.g. without CVC2, online/CNP fraud
is difficult to commit
 Malware installed in the POS
environment to capture card date ;
when swiped, card shares data with
the POS
 Issuers, acquirers, and merchants can
monitor for suspicious activity
 However, data is stored or
transmitted in clear text in the POS
environment, and in some cases is
encrypted too late in the process
 MasterCard can inform issuers if point of
compromise is known ; issuers can
decide which accounts to close and
reissue vs. keep open and monitor
 Data is now vulnerable to capture
by the malware
 In the event of fraud, consumers are
covered in part or in full depending on
local market rules and regulations
 Account data sold through online
black markets or directly used to
attempt fraudulent purchases
 If EMV had been present, cloning the
chip would be extremely difficult and its
use of a dynamic secure feature would
make it nearly impossible to “replay”
transactions
Fraud protection
While targeting a retailer’s systems can yield millions of accounts, protections put in place by
the card industry and MasterCard can effectively close down more than 90% of attempts at
fraud, with even lower actual financial loss. The EMV chip and its dynamic capabilities would
have made it harder for fraudsters to clone cards. In addition, new developments such as MDES
and tokenization would have yielded tokens instead of real account numbers, further protecting
consumers and merchants from fraudsters.
However, while direct fraud costs may be relatively low, the full effects of the compromise are very
serious, including the loss of confidence in the payments ecosystem, lost sales at the retailer,
negative impacts on brand and reputation,
and so on. While infrequent, a single major event can cost a retailer upward of
$100 million in direct losses, not including other negative effects such as a drop in market
capitalization / stock prices.
©2014 MasterCard. Proprietary and Confidential. All rights reserved.

More Related Content

What's hot

Digits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cDigits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8c
Etheralabs
 
Visa master card contactless payment in china_v1
Visa master card contactless payment in china_v1Visa master card contactless payment in china_v1
Visa master card contactless payment in china_v1
Kelvin Tai
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-securityKerri Lorch
 
How to Start Payment Gateway Business in India
How to Start Payment Gateway Business in IndiaHow to Start Payment Gateway Business in India
How to Start Payment Gateway Business in India
MyOnlineCA.in
 
Mobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementMobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk Management
Geo Coelho
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummiesBACKSEATRIDER
 
The Multichannel Issues and Opportunities of EMV 2.0
The Multichannel Issues and Opportunities of EMV 2.0The Multichannel Issues and Opportunities of EMV 2.0
The Multichannel Issues and Opportunities of EMV 2.0
Smart Payment Association
 
Retail fraud case study
Retail fraud case studyRetail fraud case study
Retail fraud case study
Warren R. Love
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Cognizant
 
EMV - Is your business ready?
EMV - Is your business ready?EMV - Is your business ready?
EMV - Is your business ready?
Shannon Walcott
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
TransUnion
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process
- Mark - Fullbright
 
Secure PIN Management How to Issue and Change PINs Securely over the Web
Secure PIN Management How to Issue and Change PINs Securely over the WebSecure PIN Management How to Issue and Change PINs Securely over the Web
Secure PIN Management How to Issue and Change PINs Securely over the Web
SafeNet
 
Unleashing The Power of Smart Payment - Contactless
Unleashing The Power of Smart Payment  - ContactlessUnleashing The Power of Smart Payment  - Contactless
Unleashing The Power of Smart Payment - Contactless
Smart Payment Association
 
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorldAdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
Nigel Mark Dias
 
Mobile wallet presentation
Mobile wallet presentationMobile wallet presentation
Mobile wallet presentationJoseph Frisz
 
Mobile Wallet security
Mobile Wallet securityMobile Wallet security
Mobile Wallet security
Suraj Pratap
 

What's hot (19)

Digits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cDigits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8c
 
Requirement of PCI-DSS in India.
Requirement of PCI-DSS in India.Requirement of PCI-DSS in India.
Requirement of PCI-DSS in India.
 
Visa master card contactless payment in china_v1
Visa master card contactless payment in china_v1Visa master card contactless payment in china_v1
Visa master card contactless payment in china_v1
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 
How to Start Payment Gateway Business in India
How to Start Payment Gateway Business in IndiaHow to Start Payment Gateway Business in India
How to Start Payment Gateway Business in India
 
Mobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementMobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk Management
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummies
 
The Multichannel Issues and Opportunities of EMV 2.0
The Multichannel Issues and Opportunities of EMV 2.0The Multichannel Issues and Opportunities of EMV 2.0
The Multichannel Issues and Opportunities of EMV 2.0
 
Retail fraud case study
Retail fraud case studyRetail fraud case study
Retail fraud case study
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
Atm theft
Atm theftAtm theft
Atm theft
 
EMV - Is your business ready?
EMV - Is your business ready?EMV - Is your business ready?
EMV - Is your business ready?
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process
 
Secure PIN Management How to Issue and Change PINs Securely over the Web
Secure PIN Management How to Issue and Change PINs Securely over the WebSecure PIN Management How to Issue and Change PINs Securely over the Web
Secure PIN Management How to Issue and Change PINs Securely over the Web
 
Unleashing The Power of Smart Payment - Contactless
Unleashing The Power of Smart Payment  - ContactlessUnleashing The Power of Smart Payment  - Contactless
Unleashing The Power of Smart Payment - Contactless
 
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorldAdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
 
Mobile wallet presentation
Mobile wallet presentationMobile wallet presentation
Mobile wallet presentation
 
Mobile Wallet security
Mobile Wallet securityMobile Wallet security
Mobile Wallet security
 

Similar to White paper-safe-secure-payments-master card-approach-usa

Small_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSmall_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSteve Abrams
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
ITIO Innovex
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheyPeter Tran
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
Anil Jain
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
darrengracia
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
Merchantech - Payment Processing Services
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In EcommerceLarry_Moffatt
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
Mohd. Ahmad Siddiqi
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
IRJET Journal
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011jhatch9418
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
Vlad Petre
 
Moneypad
MoneypadMoneypad
Moneypad
ankur bhalla
 
Digital cash, near feild communication and ultra cash
Digital cash, near feild communication and ultra cashDigital cash, near feild communication and ultra cash
Digital cash, near feild communication and ultra cash
Rohit Singh
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment SecurityTom Cooley
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
SafeDeposit
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methodsadiabo
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
adiabo
 

Similar to White paper-safe-secure-payments-master card-approach-usa (20)

Small_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSmall_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_Payments
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
Solutionreach Webinar: Will Your Practice Be Ready for EMV by October 2015?
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
 
Moneypad
MoneypadMoneypad
Moneypad
 
Digital cash, near feild communication and ultra cash
Digital cash, near feild communication and ultra cashDigital cash, near feild communication and ultra cash
Digital cash, near feild communication and ultra cash
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
 
Moneypad
MoneypadMoneypad
Moneypad
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
 

More from CMR WORLD TECH

Cyber Security
Cyber SecurityCyber Security
Cyber Security
CMR WORLD TECH
 
Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project Presentation
CMR WORLD TECH
 
CPQ Básico
CPQ BásicoCPQ Básico
CPQ Básico
CMR WORLD TECH
 
Cpq basics bycesaribeiro
Cpq basics bycesaribeiroCpq basics bycesaribeiro
Cpq basics bycesaribeiro
CMR WORLD TECH
 
Apexbasic
ApexbasicApexbasic
Apexbasic
CMR WORLD TECH
 
Questoes processautomation
Questoes processautomationQuestoes processautomation
Questoes processautomation
CMR WORLD TECH
 
Process automationppt
Process automationpptProcess automationppt
Process automationppt
CMR WORLD TECH
 
Transcript mva.cesar
Transcript mva.cesarTranscript mva.cesar
Transcript mva.cesar
CMR WORLD TECH
 
Aws migration-whitepaper-en
Aws migration-whitepaper-enAws migration-whitepaper-en
Aws migration-whitepaper-en
CMR WORLD TECH
 
Delivery readness for pick season and higth volume
Delivery readness for pick season and higth volumeDelivery readness for pick season and higth volume
Delivery readness for pick season and higth volume
CMR WORLD TECH
 
Why digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagementWhy digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagement
CMR WORLD TECH
 
Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure
CMR WORLD TECH
 
Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance
CMR WORLD TECH
 
Hyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusHyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensus
CMR WORLD TECH
 
Master lob-e-book
Master lob-e-bookMaster lob-e-book
Master lob-e-book
CMR WORLD TECH
 
Apexand visualforcearchitecture
Apexand visualforcearchitectureApexand visualforcearchitecture
Apexand visualforcearchitecture
CMR WORLD TECH
 
Trailblazers guide-to-apps
Trailblazers guide-to-appsTrailblazers guide-to-apps
Trailblazers guide-to-apps
CMR WORLD TECH
 
Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1
CMR WORLD TECH
 
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
CMR WORLD TECH
 
Salesforce voice-and-tone
Salesforce voice-and-toneSalesforce voice-and-tone
Salesforce voice-and-tone
CMR WORLD TECH
 

More from CMR WORLD TECH (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project Presentation
 
CPQ Básico
CPQ BásicoCPQ Básico
CPQ Básico
 
Cpq basics bycesaribeiro
Cpq basics bycesaribeiroCpq basics bycesaribeiro
Cpq basics bycesaribeiro
 
Apexbasic
ApexbasicApexbasic
Apexbasic
 
Questoes processautomation
Questoes processautomationQuestoes processautomation
Questoes processautomation
 
Process automationppt
Process automationpptProcess automationppt
Process automationppt
 
Transcript mva.cesar
Transcript mva.cesarTranscript mva.cesar
Transcript mva.cesar
 
Aws migration-whitepaper-en
Aws migration-whitepaper-enAws migration-whitepaper-en
Aws migration-whitepaper-en
 
Delivery readness for pick season and higth volume
Delivery readness for pick season and higth volumeDelivery readness for pick season and higth volume
Delivery readness for pick season and higth volume
 
Why digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagementWhy digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagement
 
Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure
 
Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance
 
Hyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusHyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensus
 
Master lob-e-book
Master lob-e-bookMaster lob-e-book
Master lob-e-book
 
Apexand visualforcearchitecture
Apexand visualforcearchitectureApexand visualforcearchitecture
Apexand visualforcearchitecture
 
Trailblazers guide-to-apps
Trailblazers guide-to-appsTrailblazers guide-to-apps
Trailblazers guide-to-apps
 
Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1
 
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
 
Salesforce voice-and-tone
Salesforce voice-and-toneSalesforce voice-and-tone
Salesforce voice-and-tone
 

Recently uploaded

Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
AnirbanRoy608946
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
eddie19851
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Subhajit Sahu
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 

Recently uploaded (20)

Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 

White paper-safe-secure-payments-master card-approach-usa

  • 1. Global point of view For nearly 50 years MasterCard has been safeguarding the way you pay. We have been innovating solutions driven by data and insights to increase the safety and security of electronic payments. SAFE AND SECURE PAYMENTS: THE MASTERCARD APPROACH
  • 2. 1 1. It is important to keep in mind that fraud is separate from the compromise (i.e., exposure) of payment account information. Due to a variety of security measures implemented by the industry and MasterCard, only a fraction of compromises result in fraud, especially if the transaction requires authentication (i.e., verification). 2. As an example, all card transactions in the US are protected by our zero liability promise, eliminating financial exposure to the consumer in the event of fraud. MasterCard is working to extend this promise to other markets / regions. Our safety and security guarantee: we want to give consumers the peace of mind to pay with confidence, and our goal is to build a world beyond cash where every person, every payment and every device is protected. Consumers need a safe and simple experience when making a payment, wherever they are in the world and whether they tap, click or swipe. MasterCard is investing time and money to continuously enhance the technology to detect and prevent fraud so that consumers can be confident that their money is safe. In the rare event that fraud1 does occur, we ensure consumer peace of mind by limiting or eliminating cardholder liability2 . Executive summary MasterCard is the leading technology company delivering electronic payments and the leader in safety and security • Technology and payment methods are changing every day – payments are becoming faster, smarter and more sophisticated. • Cards remain one of the safest ways to pay, with only 6 cents for every $100 spent on major global cards lost to fraud. MasterCard’s safety and security measures have already reduced this number to 5 cents. • We are investing in innovative payment and security solutions so consumers have a safe, secure and convenient payment experience. Safety and security is our number one priority. MasterCard guarantees safety and security with smart technology to ensure we are always one step ahead of fraudsters 1. We are making sure consumers are protected from fraud before it even occurs 2. There is no silver bullet to fight fraud, and MasterCard has implemented multiple layers of protection to significantly reduce the risk of fraud: • Unobtrusive network-wide tools help merchants and issuers identify and prevent fraud; • New solutions and products in the consumer’s hand empower their transactions with the latest safety and security measures; • Consumers are protected by limited / zero consumer liability guarantees for fraud, with efforts underway to expand this protection by working with local regulators, banks, and merchants; • MasterCard led the initiatives on EMV (with chip-embedded cards its most visible hallmark) and SecureCode technology to dramatically reduce fraud; • Our network screens 1.8bn transactions every month to help detect and eliminate suspect and fraudulent activity; • We are already delivering data and insights to drive increased security across any device anywhere; • We are testing voice, finger print and facial recognition identification innovations to keep payments safe.
  • 3. 2 Key messages by constituent Our overall message is: “We want to build a world beyond cashwhere every person, every payment, and every device is protected”. CONSUMERS are ensured peace of mind against fraud ISSUERS are given sophisticated tools to improve their approval and fraud detection capabilities MERCHANTS are provided a rich ecosystem that rewards their efforts to prevent fraud by providing shifts in liability Mastercard’s multi-layer protection As payment methods and devices change and become commonplace in every aspect of our lives – whether stopping by a retail store in person or shopping online from a computer or a mobile device – MasterCard’s efforts have also evolved and adapted to ensure the safety of electronic payments wherever and whenever they occur. Overall, authentication is the critical element of preventing fraud in both physical (Card Present) and non-physical (Card Not Present) environments and helps determine whether: 1. The card / payment device is genuine (card / device verification), and 2. The person initiating the transaction is the authorized user (cardholder verification). While there is no silver bullet to completely stop fraud, applying a multi-layer approach that is coordinated across the industry helps reduce the risk of fraud significantly. EMV, SecureCode+, MasterCard Digital Enablement Service (MDES) and tokenization, as well as Risk Based Decisioning, are only a few examples of MasterCard’s broader efforts to fight the persistent threat of fraud, be it with card present or card not present payments. SecureCode+ Risk Based Decisioning (RBD) Expert Monitoring Solutions (EMS) Fraud Rules Manager (FRM) EMV MULTI-LAYER PROTECTION MDES and tokenization
  • 4. 3 MasterCard leverages the power of its network to monitor transactions across the globe and identify fraud. EMS (EXPERT MONITORING SOLUTIONS) and FRM (FRAUD RULES MANAGER) are at the core of MasterCard’s anti-fraud efforts, underpinning our ability to detect suspicious activity and transactions and provide issuers with the tools to supplement their own fraud systems and processes. MasterCard company DataCash also offers GateKeeper:2.0, an advanced fraud and risk management solution, for merchants to keep chargebacks to a minimum whilst protecting genuine customers. The solution uses layers of sophisticated technologies, such as expertly crafted rules, Shared databases, Device ID, etc, to precisely identify a transaction’s level of risk. High risk transactions are automatically rejected whilst low risk transactions are accepted. A small number of transactions that are not clearly fraudulent or genuine can be manually reviewed via an intuitive user interface which enables further analysis for a more informed decision. The solution is differentiated by a team of experts that have vast experience of fraud trends across multiple industries and achieves industry leading results. MasterCard – in partnership with Visa, American Express, JCB, and China UnionPay – developed and implemented the EMV specification, with the chip payment method its most visible hallmark. MasterCard has introduced the M/Chip and M/Chip Advance payment applications to secure our payments globally. The embedded chip on the plastic card along with the MasterCard payment application is significantly more secure than magnetic stripe cards and its introduction has reduced counterfeit fraud by 60-80%. In Canada, where Chip and PIN is commonplace (90%+ penetration), fraud declined 73% over 4 years, falling from $142 million in 2009 to only $39 million by 2012 (2.0 bps of domestic debit card volume). MasterCard continues to push for global adoption of EMV and has led efforts to encourage a fraud liability shift by late 2015 in the US, the last major market to withhold from widespread acceptance. We process over 1,100 transactions every second – about 108 transactions in the blink of an eye. We screen 1.8bn transactions every month in real time to help detect and eliminate fraud. 2.0 3.8 6.8 8.3 6.2 6.8 6.3 0 1 2 3 4 5 6 7 8 9 CAD $100 CAD $200 CAD $150 CAD $50 Fraud losses (in CAD $mm) Fraud as bps of spend 2012 $70 2011 $119 2009 $39 2010 $107 2006 $95 $142 2008 $105 2007 Fraud losses (CAD $mm) Fraud as bps of spend EMV piloted in Canada EMV launched – liability shift and implementation EMV Timeline 73% drop in fraud dollars
  • 5. 4 MASTERCARD DIGITAL ENABLEMENT SERVICE (MDES) will introduce a new secure platform for payments via mobile devices, including both Card Present and Card Not Present environments by late 2014. MDES substitutes the real card number with a “token” account number. This token is “translated” back to the real account number by MasterCard at the time of purchase, so the issuer can match up the transaction with the correct account. If compromised, tokens cannot be used by fraudsters to facilitate fraud. As an added benefit, the merchant only receives the token and never sees real account data, removing a further point of weakness for fraudsters to target. In 2013, MasterCard launched SECURECODE+, the latest upgrade to its SecureCode technology, which allows merchants to add another layer of security for online transactions by asking the consumer to enter a password using SecureCode+. The SecureCode+ password is only known by the account owner and the merchant can choose which transactions are required to use it.Merchants do not have to use SecureCode+ if they trust the transaction and can dial their authentication needs up or down depending on the desire for further verification. SecureCode+ can also provide a liability shift for merchants: The more a merchant attempts to protect the end consumer through authentication, the more they benefit from protection against fraud. In 2013, SecureCode authenticated 1.4 billion transactions globally, reporting 28% growth in a single year. By dollar volume, SecureCode ensured the safety of about 29% of all online spend around the world. RISK BASED DECISIONING will add a third layer of security in the CNP space. Its basic premise is to use a consumer email address, device information, and account number to develop a unique online “persona.” Based on this digital footprint, we can seamlessly authenticate consumers with no effort on their part. Over time, this unique persona will be given a reputation score which can be used by merchants and issuers with their payment approval process. As an example, returning consumers with a high reputation score can proceed through checkout without ever having to authenticate, resulting in a faster sale with higher likelihood of satisfaction and fewer abandoned purchases. Our top priority: safety and security for consumers In the event fraud occurs, we ensure the consumer is partly or wholly shielded from financial liability or loss resulting from fraud. Consumer liability is generally determined by local regulatory conditions, and MasterCard is working with governments around the world to ensure our rules are one step ahead when it comes to protecting consumers. From a merchant and issuer perspective, the rules for determining fraud liability are complex and varied, but are aligned to reward the party that exerts the most effort to secure the transaction. OUR PROMISE TO PROTECT THE CONSUMER FROM FRAUD WILL REMAIN OUR UTMOST PRIORITY. MasterCard leverages our brand, reputation, and franchise to shield consumers from fraud. Our efforts have already reduced cardholder liability around the world, and in the US we have managed to establish a zero liability guarantee. We aim to expand this zero liability guarantee to our cardholders globally and continue to work with local regulators, banks and merchants around the world to protect the consumer.
  • 6. 5 APPENDIX FRAUD 101 Fraud is the financial loss associated with unauthorized use of an account, whether it is using those credentials to buy merchandise, transfer funds, withdraw money, or receive some other financial benefit. Consumers place safety and security as their first and foremost practical and emotional need for their payments. Credit and debit cards have gained prominence and ubiquity as financial instruments due to their ability to satisfy these needs. In 2012, it was estimated that US credit and debit cards experienced approximately 6 bps of fraud, and MasterCard leads the industry with an even lower figure (5 bps). THE COST OF FRAUD Fraud cost the global card industry more than USD $11 billion in 2012. Despite making up less than a quarter (24%) of the world’s payments volume, the United States constitutes almost half (47%) of all fraud losses, losing $5.3 billion to criminals. The fast-growing online retail space is a particular challenge. Despite being screened and declined almost 6x as often as Card Present (CP), Card Not Present (CNP) fraud is 3x higher. Source: MasterCard data warehouse, 2013 Source: Nilson Report 2013, MasterCard data warehouse; last 12 months figure is through 3Q 2013. All cards (global) figure includes MasterCard, Visa, American Express, China Union Pay, Diners Club, and JCB. Card Not Present comprises 45% of global fraud, but only 8% of global spend The US comprises 45% of global fraud, but only 24% of global spend Card Not Present fraud is still 3x greater than Card Present, despite being declined 6x more often Card Present (CP) Card Not Present (CNP) Card Present (CP) Card Not Present (CNP) 6x 3x Decline rate by transactions Fraud rate by dollars 5.05.3 6.1 MasterCard, global (2012) All brands, global (2012) MasterCard, global (last 12 months) In 2012, MasterCard experienced 14% less gross fraud than the global average This figure is even lower in the last 12 months 63% 37% Issuer fraud cost Merchant fraud cost $7.1 billion $4.2 billion Global fraud cost 2012 $11.3 billion Card Not Present comprises 45% of global fraud, but only 8% of global spend The US comprises 45% of global fraud, but only 24% of global spend Card Not Present fraud is still 3x greater than Card Present, despite being declined 6x more often Card Present (CP) Card Not Present (CNP) Card Present (CP) Card Not Present (CNP) 6x 3x Decline rate by transactions Fraud rate by dollars 5.0 5.3 6.1 MasterCard, global (2012) All brands, global (2012) MasterCard, global (last 12 months) In 2012, MasterCard experienced 14% less gross fraud than the global average This figure is even lower in the last 12 months 63% 37% Issuer fraud cost Merchant fraud cost $7.1 billion $4.2 billion Global fraud cost 2012 $11.3 billion
  • 7. 6 ILLUSTRATIVE OVERVIEW OF CARD FRAUD PROCESS For card fraud to occur, the perpetrator must successfully navigate a few major barriers: 1. Payment account information is lost, stolen, or otherwise compromised and 2. The issuer authorizes the transaction as a legitimate purchase. 3. In some cases, the perpetrator may also be required to authenticate (i.e., prove they are the legitimate cardholder). In other words, the perpetrator must find a way to obtain account data and then successfully imitate the legitimate user’s typical purchase behavior when attempting to consummate a fraudulent transaction. The authorization and authentication steps are unique to cards and, as a result, only a small percentage of compromises of account data lead to fraud. Compromise / expose account data to perpetrate fraud Authenticate as the real cardholder by imitating key security elements Fraud results if perpetrators successfully navigate these safeguards, but in certain cases the cardholder is protected by our zero liability promise Data breach 1 3 4 Receive authorization from issuer to approve purchase 2 Phishing Trick consumer into revealing personal info Skimming Copy static card data during a transaction Account takeover Stolen data used to takeover or create accounts Example compromise techniques Data breach Hack systems that handle account data Fraud / financial loss MasterCard’s network-wide monitoring tools aid issuer decisioning (EMS and FRM) Issuers rely on their own fraud detection system when deciding to approve / decline transactions Authentication reduces fraud – e.g., entering a PIN – Example fraud types Counterfeit Clone cards and use at POS Lost and stolen Theft of legitimate card Card not present Fraud perpetrated without card but is often not required by issuers or merchants to ensure faster speed to pay
  • 8. 7 Informations is used to make online purchases or cline cards. With SecureCode+, however, accounts are protected by the consumer's secure password. Fraud protection in practice: two case studies To illustrate the points discussed in this paper, we present two sample case studies: (1) a phishing attack to expose data which is later used to make purchases online and (2) the theft of data from a payment system to sell account information and produce counterfeit cards. FRAUD CASE STUDY #1: PHISHING COMPROMISE, CARD NOT PRESENT PROTECTIONS While not technically sophisticated, phishing compromises are difficult to protect against given the consumer is often the party disclosing account information. Nonetheless, innovations such as SecureCode+ will make it much harder for fraudsters to perpetrate their activities online. Consumers receives email purporting to be from a trusted source (e.g., friend, reputable company etc.)asking consumer to click on the link. Clicking the link installs malware or uses social engeneering to trick consumer into revealing card account data. 1 2 3
  • 9. 8 FRAUD CASE STUDY #2: DATA BREACH COMPROMISE, CARD PRESENT PROTECTIONS Administrative credentials compromised ILLUSTRATIVE EXAMPLE Malware installed on POS terminals Card account data captured Data used to attempt fraud Data compromise activities Perpetrators access retailer’s system through compromised admin credentials (e.g. obtained through brute force, phishing, etc.) Terminals only capture the data required to process a transaction – E.g. without CVC2, online/CNP fraud is difficult to commit Malware installed in the POS environment to capture card date ; when swiped, card shares data with the POS Issuers, acquirers, and merchants can monitor for suspicious activity However, data is stored or transmitted in clear text in the POS environment, and in some cases is encrypted too late in the process MasterCard can inform issuers if point of compromise is known ; issuers can decide which accounts to close and reissue vs. keep open and monitor Data is now vulnerable to capture by the malware In the event of fraud, consumers are covered in part or in full depending on local market rules and regulations Account data sold through online black markets or directly used to attempt fraudulent purchases If EMV had been present, cloning the chip would be extremely difficult and its use of a dynamic secure feature would make it nearly impossible to “replay” transactions Fraud protection While targeting a retailer’s systems can yield millions of accounts, protections put in place by the card industry and MasterCard can effectively close down more than 90% of attempts at fraud, with even lower actual financial loss. The EMV chip and its dynamic capabilities would have made it harder for fraudsters to clone cards. In addition, new developments such as MDES and tokenization would have yielded tokens instead of real account numbers, further protecting consumers and merchants from fraudsters. However, while direct fraud costs may be relatively low, the full effects of the compromise are very serious, including the loss of confidence in the payments ecosystem, lost sales at the retailer, negative impacts on brand and reputation, and so on. While infrequent, a single major event can cost a retailer upward of $100 million in direct losses, not including other negative effects such as a drop in market capitalization / stock prices. ©2014 MasterCard. Proprietary and Confidential. All rights reserved.