SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
2008


             A GHL Whitepaper
            Secure IP Networks:
What’s Available other than SSL?
Secure IP Payment Networks: What’s available other than SSL?
Payments security threat models today assume a powerful adversary, with access to
virtually all communications links and insecure networks and systems. As a result, financial
institutions, businesses, card associations and statutory bodies have, in recent years taken
vital steps in addressing these threats by working closely together and introducing all
necessary measures to combat this scourge.

In fact, banks across the globe continue to invest heavily and consider strategic options
regarding security and fraud management tools and practices to strengthen control of non-
public consumer and corporate information, primarily on the heels of such mandates such
as capital and operational risk management, and stronger customer authentication.
Deceitful online and offline schemes target banks from both within and without. (Source:
Top 10 Strategic IT Initiatives for Financial Services in 2007, Financial Insights, 2007)

With these considerations in mind, against the backdrop of increasing IP-based network
deployments by financial services institutions, this article seeks to briefly present prevailing
approaches often touted as the solution to the issue of payment network security - the
ubiquitous Security Sockets Layer (SSL). The chief aim is to provide a viable security solution
to payment infrastructure that seeks to address the shortfalls of SSL – the GHL Systems’
NetMATRIX Terminal Line Encryption.

The context of this article, however, is limited to the deployment of both concepts into
TCP/IP EDC terminal networks.

SSL

Secure Sockets Layer (SSL) is a collection of TCP/IP security protocols and is considered by
many to be the current de facto Internet security standard. The purpose of SSL is to provide
a layer of security between the sockets at the transport layer and the application accessing
the network through the sockets. The idea is that, when SSL is active, network services such
as FTP and HTTP are protected from attack by the secure SSL protocols.

Typically, only the server is authenticated (i.e., its identity is validated) while the client
remains unauthenticated; this means that the end user (whether an individual or an
application, such as a Web browser) can be ensured of whom it is communicating. SSL is
commonly used in banking and e-commerce websites, but also in non-commercial sites that
offer online memberships and webmail.

Terminal Line Encryption (TLE)

Terminal Line encryption in its broadest sense, effectively protects against wire-tapping and
other threats such as eavesdropping/card skimming, ghost or phantom EDC terminals, host
spoofing and replay attacks. Wire tapping is the monitoring of telephone, Internet traffic or
even wireless local area networks by a third party, often by covert means and fraudulent
purposes. Again, within the context of this discussion, we refer specifically to the


                                               2
interception of card transaction data traffic from EDC terminal to the bank or destination
host on IP networks.

In simplistic terms, Terminal Line Encryption (TLE) converts parts of a message holding
sensitive cardholder information to incoherent and incomprehensible data while in
transition. Only the intended receiver who is able to decrypt the message can read the
information to complete the transaction, thus preventing any attempt by fraudsters to
capture payment card details, account numbers or any other information.

Combined approaches: TLE & EMV

Malaysia’s foray into terminal line encryption back in 2005 is perhaps the best testament of
the effectiveness of TLE in combating card fraud. To strengthen its payment security
infrastructure, Malaysia implemented line encryption of its terminals and bank systems,
making it the first country in the world to deploy both line encryption and EMV technology
nationwide.

Malaysia’s experience is unique in the sense that the Malaysian central bank (Bank Negara)
mandated for both line encryption and EMV to be implemented as a combined approach in
overcoming card fraud. This works in tandem to enhance the integrity of the payments
systems and instruments, while promoting confidence and ensuring consumers' interests
are safeguarded.




                                             3
Using actual fraud data and experience from the Malaysian experience, there is historical
and empirical evidence that depict the strong inverse relationship between increasing chip
maturity and declining counterfeit fraud.




       Source: Bank Negara Malaysia, 2005

As a result of these two initiatives, and according to Visa Asia Pacific’s Mr. Ingo Noka, Head
of Visa’s Payment Security Services, “Counterfeit fraud in Malaysia on domestically-issued
cards fell from an average of 0.16 percent in the years 2000 to 2004 to a record low of 0.03
percent in 2005. Expressed in US dollars, after one year of using chip cards, domestic
counterfeit has dropped 92 percent from about US$400,000 in January 2004 to US$31,000
in August 2005.

“Since September 2004, the share of fraud losses due to counterfeit fraud has fallen from 90
percent to 22 percent and we see a shift to lost or stolen and card-not-present (CNP) fraud
types which now represent 73 percent of fraud losses”. (Source: Visa Payment Security
Bulletin - Issue 1, 2006)

Currently, about 90% of the terminals in Malaysia are encrypting authorization messages.




                                              4
A Brief Comparison of SSL and NetMATRIX TLE as a payment network security
solution

GHL Systems’ NetMATRIX TLE uses symmetric key encryption and decryption which is more
suitable in an environment where processing power; memory and bandwidth are limited –
where up to 4 Billion unique keys per terminal application and also supports Unique Key Per
Transaction. Additionally, the NetMATRIX TLE uses Dynamic Key Derivation instead of Static
Keys for each transaction effectively preventing Terminal Cloning and reducing Key
Management issues. It further provides a Remote Key Injection (RKI) utility to ease the
deployment of Keys into terminals, remotely.

Performance considerations

SSL is a PKI (Public Key Infrastructure) implementation and thus requires greater resources
(in terms of processing power and memory) and more overhead (in terms of processing
time, hand-shaking overhead, session keys exchange, etc. further constrained by bandwidth
limitations). This is compounded if one needs to perform a Client/Device authentication
besides Host authentication, since a Digital Certificate needs to be downloaded to the
terminals.

Communication Channels/Technologies Independence

•   NetMATRIX TLE functionality is independent of the underlying carrier technology and
    protocol and can work over X.25, TCP/IP, SNA, SDLC, HDLC, LAPB networks, while SSL
    can only work over TCP/IP-based network.
•   NetMATRIX TLE can also work over a Heterogeneous network (a combination of
    different underlying network protocols) while SSL can only work over a homogenous
    TCP/IP network.
•   NetMATRIX TLE secures data at each individual terminal application layer which
    conforms to the ISO8583 format and can be routed through a bank’s existing payment
    infrastructure without additional major investments
•   Where typical SSL implementations require a TCP/IP environment to support the
    implementation which has to be augmented with additional security infrastructure such
    as Firewalls, SSL Accelerators or Intrusion Detection Systems, NetMATRIX can be
    deployed across a variety of environments without requiring such investments

Greater security and flexibility

NetMATRIX TLE secures transaction and card data at each individual terminal application
layer instead of at the communication channel layer. Additionally, it further provides more
flexibility than SSL as NetMATRIX TLE allows application-specific customization to determine
the exact fields/data that need to be encrypted/decrypted.




                                             5
Other key considerations:

SSL implementation requires a Certificate Server if in-house certificates are being used. If
banks or other financial institutions already have their own Certificate Server then this
would probably be a non-issue. However, if public digital certificates from Certification
Authorities are used, then this would mean additional costs as their pricing model is
typically based on each individual digital certificate. Other considerations that warrant
notice is also to consider the long-term management of the digital certificates themselves.

Conclusion

As the industry advances forward, changes in the payments landscape will continue to be
dynamic and the level of requirements, complexity, and sophistication in payment networks
will further intensify. While considerable efforts have been undertaken to enhance
protection for consumers and banks alike, still more remains to be done.

Given the issues and considerations discussed – as well as its own experiences implementing
TLE in India, Malaysia, Thailand and Indonesia, GHL Systems believes the time is now for
card associations, banks, and payment network security/technology/solution providers to
reconsider the proposition that SSL should remain the de facto standard – as far as TCP/IP
EDC terminal networks are concerned.
                                             6

Mais conteúdo relacionado

Mais procurados

E banking & security
E banking & securityE banking & security
E banking & securitySumeer Sharma
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605SovanChanda
 
Enterprise Blockchain Development Services | Blockchain Developments
Enterprise Blockchain Development Services | Blockchain DevelopmentsEnterprise Blockchain Development Services | Blockchain Developments
Enterprise Blockchain Development Services | Blockchain DevelopmentsBlockchain Developments
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerceStudsPlanet.com
 
Cayman Compliant Series - AML Requirements for VASPs
Cayman Compliant Series - AML Requirements for VASPsCayman Compliant Series - AML Requirements for VASPs
Cayman Compliant Series - AML Requirements for VASPsRamona Tudorancea
 
Chapter 2 virtual banking
Chapter 2   virtual bankingChapter 2   virtual banking
Chapter 2 virtual bankingQuan Risk
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?Colleen Beck-Domanico
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryptionijcisjournal
 
A deep walk on the dark side of information security
A deep walk on the dark side of information securityA deep walk on the dark side of information security
A deep walk on the dark side of information securityDATA SECURITY SOLUTIONS
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareIonixx Technologies Inc.
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
Experiment
ExperimentExperiment
Experimentjbashask
 
Finra - implications of blockchain for the securities industry
Finra - implications of blockchain for the securities industryFinra - implications of blockchain for the securities industry
Finra - implications of blockchain for the securities industryIan Beckett
 
Defi smart contract development company
Defi smart contract development companyDefi smart contract development company
Defi smart contract development companyBrugusoftwaresolutions
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-securityKerri Lorch
 
Blockchain for Trade Finance: Payment Method Automation (Part 2)
Blockchain for Trade Finance: Payment Method Automation (Part 2)Blockchain for Trade Finance: Payment Method Automation (Part 2)
Blockchain for Trade Finance: Payment Method Automation (Part 2)Cognizant
 
Blockchain and its Applications in the Finance Industry
Blockchain and its Applications in the Finance Industry Blockchain and its Applications in the Finance Industry
Blockchain and its Applications in the Finance Industry milemadinah
 
2017.03.30 - e-Signatures Conference for ZertES and eIDAS
2017.03.30 - e-Signatures Conference for ZertES and eIDAS 2017.03.30 - e-Signatures Conference for ZertES and eIDAS
2017.03.30 - e-Signatures Conference for ZertES and eIDAS Kyos
 
How Blockchain Can Revitalize Trade Finance (Part 1)
How Blockchain Can Revitalize Trade Finance (Part 1)How Blockchain Can Revitalize Trade Finance (Part 1)
How Blockchain Can Revitalize Trade Finance (Part 1)Cognizant
 

Mais procurados (20)

E banking & security
E banking & securityE banking & security
E banking & security
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
 
Enterprise Blockchain Development Services | Blockchain Developments
Enterprise Blockchain Development Services | Blockchain DevelopmentsEnterprise Blockchain Development Services | Blockchain Developments
Enterprise Blockchain Development Services | Blockchain Developments
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
Cayman Compliant Series - AML Requirements for VASPs
Cayman Compliant Series - AML Requirements for VASPsCayman Compliant Series - AML Requirements for VASPs
Cayman Compliant Series - AML Requirements for VASPs
 
Chapter 2 virtual banking
Chapter 2   virtual bankingChapter 2   virtual banking
Chapter 2 virtual banking
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryption
 
A deep walk on the dark side of information security
A deep walk on the dark side of information securityA deep walk on the dark side of information security
A deep walk on the dark side of information security
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Experiment
ExperimentExperiment
Experiment
 
Finra - implications of blockchain for the securities industry
Finra - implications of blockchain for the securities industryFinra - implications of blockchain for the securities industry
Finra - implications of blockchain for the securities industry
 
Tokenization
TokenizationTokenization
Tokenization
 
Defi smart contract development company
Defi smart contract development companyDefi smart contract development company
Defi smart contract development company
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 
Blockchain for Trade Finance: Payment Method Automation (Part 2)
Blockchain for Trade Finance: Payment Method Automation (Part 2)Blockchain for Trade Finance: Payment Method Automation (Part 2)
Blockchain for Trade Finance: Payment Method Automation (Part 2)
 
Blockchain and its Applications in the Finance Industry
Blockchain and its Applications in the Finance Industry Blockchain and its Applications in the Finance Industry
Blockchain and its Applications in the Finance Industry
 
2017.03.30 - e-Signatures Conference for ZertES and eIDAS
2017.03.30 - e-Signatures Conference for ZertES and eIDAS 2017.03.30 - e-Signatures Conference for ZertES and eIDAS
2017.03.30 - e-Signatures Conference for ZertES and eIDAS
 
How Blockchain Can Revitalize Trade Finance (Part 1)
How Blockchain Can Revitalize Trade Finance (Part 1)How Blockchain Can Revitalize Trade Finance (Part 1)
How Blockchain Can Revitalize Trade Finance (Part 1)
 

Destaque

Apex Inspection Solutions
Apex Inspection SolutionsApex Inspection Solutions
Apex Inspection Solutionsguest51058f8
 
(189) redesigning welfare (disability wales, october 2011)
(189) redesigning welfare (disability wales, october 2011)(189) redesigning welfare (disability wales, october 2011)
(189) redesigning welfare (disability wales, october 2011)Citizen Network
 
Citizenship: why Its important, what It is and how its achieved
Citizenship: why Its important, what It is and how its achievedCitizenship: why Its important, what It is and how its achieved
Citizenship: why Its important, what It is and how its achievedCitizen Network
 
Slides on Personalisation and Cuts
Slides on Personalisation and CutsSlides on Personalisation and Cuts
Slides on Personalisation and CutsCitizen Network
 
The global challenge of achieving citizenship for all
The global challenge of achieving citizenship for allThe global challenge of achieving citizenship for all
The global challenge of achieving citizenship for allCitizen Network
 
Google Tech For Better Content
Google Tech For Better ContentGoogle Tech For Better Content
Google Tech For Better ContentTin180 VietNam
 

Destaque (11)

Wc
WcWc
Wc
 
Apex Inspection Solutions
Apex Inspection SolutionsApex Inspection Solutions
Apex Inspection Solutions
 
(189) redesigning welfare (disability wales, october 2011)
(189) redesigning welfare (disability wales, october 2011)(189) redesigning welfare (disability wales, october 2011)
(189) redesigning welfare (disability wales, october 2011)
 
Aqua
AquaAqua
Aqua
 
Citizenship: why Its important, what It is and how its achieved
Citizenship: why Its important, what It is and how its achievedCitizenship: why Its important, what It is and how its achieved
Citizenship: why Its important, what It is and how its achieved
 
Slides on Personalisation and Cuts
Slides on Personalisation and CutsSlides on Personalisation and Cuts
Slides on Personalisation and Cuts
 
Are You The Man
Are You The ManAre You The Man
Are You The Man
 
The global challenge of achieving citizenship for all
The global challenge of achieving citizenship for allThe global challenge of achieving citizenship for all
The global challenge of achieving citizenship for all
 
ηφαιστειο
ηφαιστειοηφαιστειο
ηφαιστειο
 
Liberalism and freedom
Liberalism and freedomLiberalism and freedom
Liberalism and freedom
 
Google Tech For Better Content
Google Tech For Better ContentGoogle Tech For Better Content
Google Tech For Better Content
 

Semelhante a Secure ip payment networks what's available other than ssl - final

A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
Reconsidering PKI and its Place in Your Enterprise Encryption Strategy
Reconsidering PKI and its Place in Your Enterprise Encryption StrategyReconsidering PKI and its Place in Your Enterprise Encryption Strategy
Reconsidering PKI and its Place in Your Enterprise Encryption StrategyNirmal Misra
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Omlis
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e businesschristophefeltus
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Heather Vargas
 
Tokenization: What's Next After PCI?
Tokenization: What's Next After PCI?Tokenization: What's Next After PCI?
Tokenization: What's Next After PCI?EMC
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
 
Key Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsKey Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsITIO Innovex
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTURohit Verma
 

Semelhante a Secure ip payment networks what's available other than ssl - final (20)

150819_oml_pki_v1p
150819_oml_pki_v1p150819_oml_pki_v1p
150819_oml_pki_v1p
 
150819_oml_pki_v1p
150819_oml_pki_v1p150819_oml_pki_v1p
150819_oml_pki_v1p
 
E-commerce Security
E-commerce SecurityE-commerce Security
E-commerce Security
 
2
22
2
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
E commerce unit 2
E commerce unit 2E commerce unit 2
E commerce unit 2
 
Reconsidering PKI and its Place in Your Enterprise Encryption Strategy
Reconsidering PKI and its Place in Your Enterprise Encryption StrategyReconsidering PKI and its Place in Your Enterprise Encryption Strategy
Reconsidering PKI and its Place in Your Enterprise Encryption Strategy
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )
 
Tokenization: What's Next After PCI?
Tokenization: What's Next After PCI?Tokenization: What's Next After PCI?
Tokenization: What's Next After PCI?
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
Key Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsKey Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment Systems
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 

Mais de Alex Tan

NetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL SystemsNetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL SystemsAlex Tan
 
ATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless ConnectivityATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless ConnectivityAlex Tan
 
Netaccess introduction
Netaccess introductionNetaccess introduction
Netaccess introductionAlex Tan
 
Net Access L 300 Training Slides
Net Access L 300 Training SlidesNet Access L 300 Training Slides
Net Access L 300 Training SlidesAlex Tan
 
Net Access L 200 Training Slides
Net Access L 200 Training SlidesNet Access L 200 Training Slides
Net Access L 200 Training SlidesAlex Tan
 
Net access web page configurations
Net access web page configurationsNet access web page configurations
Net access web page configurationsAlex Tan
 
Ghl systems net access w & n series presentation sept 2009 for wnb
Ghl systems net access w & n series presentation   sept 2009 for wnbGhl systems net access w & n series presentation   sept 2009 for wnb
Ghl systems net access w & n series presentation sept 2009 for wnbAlex Tan
 
L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...Alex Tan
 
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...Alex Tan
 
Ghl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_studyGhl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_studyAlex Tan
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...Alex Tan
 
Net access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentationNet access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentationAlex Tan
 
Ghl systems may 2010
Ghl systems may 2010Ghl systems may 2010
Ghl systems may 2010Alex Tan
 
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010Alex Tan
 
Ghl success stories retail series aug 2010
Ghl success stories   retail series aug 2010Ghl success stories   retail series aug 2010
Ghl success stories retail series aug 2010Alex Tan
 
Ghl success stories transportation series - mar 2010
Ghl success stories   transportation series - mar 2010Ghl success stories   transportation series - mar 2010
Ghl success stories transportation series - mar 2010Alex Tan
 
Ghl systems customer success story zouk kl
Ghl systems customer success story  zouk klGhl systems customer success story  zouk kl
Ghl systems customer success story zouk klAlex Tan
 
Ghl systems customer success story shoemart
Ghl systems customer success story shoemartGhl systems customer success story shoemart
Ghl systems customer success story shoemartAlex Tan
 
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...Alex Tan
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...Alex Tan
 

Mais de Alex Tan (20)

NetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL SystemsNetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL Systems
 
ATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless ConnectivityATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless Connectivity
 
Netaccess introduction
Netaccess introductionNetaccess introduction
Netaccess introduction
 
Net Access L 300 Training Slides
Net Access L 300 Training SlidesNet Access L 300 Training Slides
Net Access L 300 Training Slides
 
Net Access L 200 Training Slides
Net Access L 200 Training SlidesNet Access L 200 Training Slides
Net Access L 200 Training Slides
 
Net access web page configurations
Net access web page configurationsNet access web page configurations
Net access web page configurations
 
Ghl systems net access w & n series presentation sept 2009 for wnb
Ghl systems net access w & n series presentation   sept 2009 for wnbGhl systems net access w & n series presentation   sept 2009 for wnb
Ghl systems net access w & n series presentation sept 2009 for wnb
 
L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...
 
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
 
Ghl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_studyGhl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_study
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
 
Net access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentationNet access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentation
 
Ghl systems may 2010
Ghl systems may 2010Ghl systems may 2010
Ghl systems may 2010
 
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
 
Ghl success stories retail series aug 2010
Ghl success stories   retail series aug 2010Ghl success stories   retail series aug 2010
Ghl success stories retail series aug 2010
 
Ghl success stories transportation series - mar 2010
Ghl success stories   transportation series - mar 2010Ghl success stories   transportation series - mar 2010
Ghl success stories transportation series - mar 2010
 
Ghl systems customer success story zouk kl
Ghl systems customer success story  zouk klGhl systems customer success story  zouk kl
Ghl systems customer success story zouk kl
 
Ghl systems customer success story shoemart
Ghl systems customer success story shoemartGhl systems customer success story shoemart
Ghl systems customer success story shoemart
 
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
 

Último

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Secure ip payment networks what's available other than ssl - final

  • 1. 2008 A GHL Whitepaper Secure IP Networks: What’s Available other than SSL?
  • 2. Secure IP Payment Networks: What’s available other than SSL? Payments security threat models today assume a powerful adversary, with access to virtually all communications links and insecure networks and systems. As a result, financial institutions, businesses, card associations and statutory bodies have, in recent years taken vital steps in addressing these threats by working closely together and introducing all necessary measures to combat this scourge. In fact, banks across the globe continue to invest heavily and consider strategic options regarding security and fraud management tools and practices to strengthen control of non- public consumer and corporate information, primarily on the heels of such mandates such as capital and operational risk management, and stronger customer authentication. Deceitful online and offline schemes target banks from both within and without. (Source: Top 10 Strategic IT Initiatives for Financial Services in 2007, Financial Insights, 2007) With these considerations in mind, against the backdrop of increasing IP-based network deployments by financial services institutions, this article seeks to briefly present prevailing approaches often touted as the solution to the issue of payment network security - the ubiquitous Security Sockets Layer (SSL). The chief aim is to provide a viable security solution to payment infrastructure that seeks to address the shortfalls of SSL – the GHL Systems’ NetMATRIX Terminal Line Encryption. The context of this article, however, is limited to the deployment of both concepts into TCP/IP EDC terminal networks. SSL Secure Sockets Layer (SSL) is a collection of TCP/IP security protocols and is considered by many to be the current de facto Internet security standard. The purpose of SSL is to provide a layer of security between the sockets at the transport layer and the application accessing the network through the sockets. The idea is that, when SSL is active, network services such as FTP and HTTP are protected from attack by the secure SSL protocols. Typically, only the server is authenticated (i.e., its identity is validated) while the client remains unauthenticated; this means that the end user (whether an individual or an application, such as a Web browser) can be ensured of whom it is communicating. SSL is commonly used in banking and e-commerce websites, but also in non-commercial sites that offer online memberships and webmail. Terminal Line Encryption (TLE) Terminal Line encryption in its broadest sense, effectively protects against wire-tapping and other threats such as eavesdropping/card skimming, ghost or phantom EDC terminals, host spoofing and replay attacks. Wire tapping is the monitoring of telephone, Internet traffic or even wireless local area networks by a third party, often by covert means and fraudulent purposes. Again, within the context of this discussion, we refer specifically to the 2
  • 3. interception of card transaction data traffic from EDC terminal to the bank or destination host on IP networks. In simplistic terms, Terminal Line Encryption (TLE) converts parts of a message holding sensitive cardholder information to incoherent and incomprehensible data while in transition. Only the intended receiver who is able to decrypt the message can read the information to complete the transaction, thus preventing any attempt by fraudsters to capture payment card details, account numbers or any other information. Combined approaches: TLE & EMV Malaysia’s foray into terminal line encryption back in 2005 is perhaps the best testament of the effectiveness of TLE in combating card fraud. To strengthen its payment security infrastructure, Malaysia implemented line encryption of its terminals and bank systems, making it the first country in the world to deploy both line encryption and EMV technology nationwide. Malaysia’s experience is unique in the sense that the Malaysian central bank (Bank Negara) mandated for both line encryption and EMV to be implemented as a combined approach in overcoming card fraud. This works in tandem to enhance the integrity of the payments systems and instruments, while promoting confidence and ensuring consumers' interests are safeguarded. 3
  • 4. Using actual fraud data and experience from the Malaysian experience, there is historical and empirical evidence that depict the strong inverse relationship between increasing chip maturity and declining counterfeit fraud. Source: Bank Negara Malaysia, 2005 As a result of these two initiatives, and according to Visa Asia Pacific’s Mr. Ingo Noka, Head of Visa’s Payment Security Services, “Counterfeit fraud in Malaysia on domestically-issued cards fell from an average of 0.16 percent in the years 2000 to 2004 to a record low of 0.03 percent in 2005. Expressed in US dollars, after one year of using chip cards, domestic counterfeit has dropped 92 percent from about US$400,000 in January 2004 to US$31,000 in August 2005. “Since September 2004, the share of fraud losses due to counterfeit fraud has fallen from 90 percent to 22 percent and we see a shift to lost or stolen and card-not-present (CNP) fraud types which now represent 73 percent of fraud losses”. (Source: Visa Payment Security Bulletin - Issue 1, 2006) Currently, about 90% of the terminals in Malaysia are encrypting authorization messages. 4
  • 5. A Brief Comparison of SSL and NetMATRIX TLE as a payment network security solution GHL Systems’ NetMATRIX TLE uses symmetric key encryption and decryption which is more suitable in an environment where processing power; memory and bandwidth are limited – where up to 4 Billion unique keys per terminal application and also supports Unique Key Per Transaction. Additionally, the NetMATRIX TLE uses Dynamic Key Derivation instead of Static Keys for each transaction effectively preventing Terminal Cloning and reducing Key Management issues. It further provides a Remote Key Injection (RKI) utility to ease the deployment of Keys into terminals, remotely. Performance considerations SSL is a PKI (Public Key Infrastructure) implementation and thus requires greater resources (in terms of processing power and memory) and more overhead (in terms of processing time, hand-shaking overhead, session keys exchange, etc. further constrained by bandwidth limitations). This is compounded if one needs to perform a Client/Device authentication besides Host authentication, since a Digital Certificate needs to be downloaded to the terminals. Communication Channels/Technologies Independence • NetMATRIX TLE functionality is independent of the underlying carrier technology and protocol and can work over X.25, TCP/IP, SNA, SDLC, HDLC, LAPB networks, while SSL can only work over TCP/IP-based network. • NetMATRIX TLE can also work over a Heterogeneous network (a combination of different underlying network protocols) while SSL can only work over a homogenous TCP/IP network. • NetMATRIX TLE secures data at each individual terminal application layer which conforms to the ISO8583 format and can be routed through a bank’s existing payment infrastructure without additional major investments • Where typical SSL implementations require a TCP/IP environment to support the implementation which has to be augmented with additional security infrastructure such as Firewalls, SSL Accelerators or Intrusion Detection Systems, NetMATRIX can be deployed across a variety of environments without requiring such investments Greater security and flexibility NetMATRIX TLE secures transaction and card data at each individual terminal application layer instead of at the communication channel layer. Additionally, it further provides more flexibility than SSL as NetMATRIX TLE allows application-specific customization to determine the exact fields/data that need to be encrypted/decrypted. 5
  • 6. Other key considerations: SSL implementation requires a Certificate Server if in-house certificates are being used. If banks or other financial institutions already have their own Certificate Server then this would probably be a non-issue. However, if public digital certificates from Certification Authorities are used, then this would mean additional costs as their pricing model is typically based on each individual digital certificate. Other considerations that warrant notice is also to consider the long-term management of the digital certificates themselves. Conclusion As the industry advances forward, changes in the payments landscape will continue to be dynamic and the level of requirements, complexity, and sophistication in payment networks will further intensify. While considerable efforts have been undertaken to enhance protection for consumers and banks alike, still more remains to be done. Given the issues and considerations discussed – as well as its own experiences implementing TLE in India, Malaysia, Thailand and Indonesia, GHL Systems believes the time is now for card associations, banks, and payment network security/technology/solution providers to reconsider the proposition that SSL should remain the de facto standard – as far as TCP/IP EDC terminal networks are concerned. 6