• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back

Several e-commerce payment technologies are in common use, either as transaction methods or as tools to secure transactions:

Electronic Funds Transfer (EFT)


Payment gateway


3-D Secure

Electronic Funds Transfer (EFT)


is a generic term that describes the ability to transfer funds using computers, rather than using paper. Banks use EFT to save time and ensure that monetary exchange between individuals and businesses is a secure as possible.


Payment gateway


A payment gateway is a system, either hardware-based or software-based, that mediates between a merchant (i.e., an e-commerce-enabled Web site) and an acquirer (e.g, the merchant's bank).


3-D Secure

an XML based protocol used by credit card companies to add security to online credit and debit card transactions. It is often listed as "Verified by VISA" or MasterCard Secure Code."

Secure Sockets Layer (SSL)

a protocol that provides authentication and encryption, used by most servers for secure exchanges over the internet. Superseded by Transport Layer Security (TLS)

Transport Layer Secure (TLS)

A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the internet.

Request for Comments (RFC)

A document published by the IETF that details information about standardized internet protocols and those in various development stages.

Public Key Infrastructure (PKI)

a collection of individuals, networks and computers that together have the ability to authoritatively confirm the identity of a person, host or organization.

PKI makes it possible for two parties that have never met each other to trust each other. Once trust is established, encryption can begin. PKI involves two elements with which you should be familiar:

- Digital certificate


- Certificate authority (CA)

Digital certificate

a signed public key that verifies a set of credentials associated with public key of a certificate authority (CA). All SSL/TLS sessions require a valid certificate, which acts as a trust third party to allow unknown parties to authenticate with each other and begin encryption.

Certificate authority (CA)

a trusted third party that verifies the identity of the person or company that has submitted a certification request (CR). A CA is an organization that issues digital certificates and helps to ensure the identity of a person, host or process. A CA is more than just a computer that issues digital certificates; a CA is an entire organization.