merchant gateway

Discussion in 'Payment Processing' started by sanyal, May 14, 2012.

  1. #1
    Online security is the number one fear factor for people when using merchant gateways. The last thing people want when using merchant gateways is their personal account details leaked out and misused. To prevent malicious people from finding clues for breaching it rate on net resets display errors to false in the production environment. It uses complex secure socket layer protocols to establish encrypted conversations between your browser and the server and encrypt POST data in spoofed HTTP requests. It adheres to spoof form and session security measures set by the PHP security consortium security guide
     
    sanyal, May 14, 2012 IP
  2. sanyal

    sanyal Peon

    Messages:
    4
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    0
    #2
    So is this
     
    sanyal, May 15, 2012 IP
  3. andrewclives

    andrewclives Peon

    Messages:
    84
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    0
    #3
    We all know very well that today Online Security is very important because there are many Cyber crimes has been faced by many people from last few years.The misuse of an account of any people is not a good thing.So we have to be careful when we are going for online shopping and all.
     
    andrewclives, May 15, 2012 IP
  4. sanyal

    sanyal Peon

    Messages:
    4
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    0
    #4
    Which is why we need to ensure we choose a secure merchant
     
    sanyal, May 15, 2012 IP
  5. Ryanloop

    Ryanloop Peon

    Messages:
    21
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    0
    #5
    Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:

    privacy: information must be kept from unauthorized parties.
    integrity: message must not be altered or tampered with.
    authentication: sender and recipient must prove their identities to each other.
    non-repudiation: proof is needed that the message was indeed received.

    Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such procedures form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).
     
    Ryanloop, May 15, 2012 IP
  6. sanyal

    sanyal Peon

    Messages:
    4
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    0
    #6
    This merchant uses inhouse IT staff to meet these 4 mechanics
     
    sanyal, May 15, 2012 IP
  7. Kinkypeepz

    Kinkypeepz Greenhorn

    Messages:
    36
    Likes Received:
    1
    Best Answers:
    0
    Trophy Points:
    16
    #7
    never been spoofed
     
    Kinkypeepz, May 16, 2012 IP