SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Mims 1
" Credit Cards and Swiping Information"
" You may not realize it, but the American credit system is in a time of change. The
fact is, change cannot come soon enough. Credit security breaches have proven over
and over that we need a better system than the terrible, primitive one we have now."
" Let me refresh your memory on how our system works now with an explanation
by Casey Liss on Accidental Tech Podcast:"
If you're at a restaurant, the general way things work is, you ask for a check,
they bring you the check, you give the server your credit card, they run away to
some terminal that could be in the back of the restaurant well out of your line of
sight, swipe your card, hopefully not skim your card, bring it back, and then you
are to add the tip that you want to add, sign the paper, and leave it and just hope
that (A) they didn't skim your card, and (B) they actually put the amount you
want them to put into the point of sale system in order to charge you…we are so
backwards anything will be an improvement. (Arment)."
" As you can imagine, plenty of security breaches have come from this. The
biggest one in the recent past happened in late November to early December 2013,
when data from around 40 million credit and debit cards was stolen from Target
Corporation. ("Target security breach affects up to 40M cards"). In all of 2013, $6 billion
was lost to credit card fraud in the U.S., up from around $4.5 billion in 2011. ("Seventy
Percent of U.S. Credit Cards to be EMV Enabled by the End of 2015")."
Cody Mims"
Mrs. Mann"
DC English III"
11-20-14
Mims 2
" By October 1, 2015, credit card transactions in the United States are going to
require a chip built into the card. (Rosenblatt). This is a much safer system that 19 other
countries have already adopted. In the United Kingdom, counterfeit credit card fraud
plummeted to $67 million in 2013 from $151 million in 2004 after it started using chipped
cards. However, what we are doing in the U.S. is still a feeble half measure that involves
the customer giving a signature instead of entering a PIN. Signing is a pointless ritual
that gives a false sense of security, and without a PIN, stolen cards can be used for
online shopping just as easily as ones with a magnetic stripe."
" A wonderful effect of this change is that now is a great time for completely new
payment methods to arrive. NFC payments such as Google Wallet and Apple Pay offer
humongous security benefits over credit cards. Here is how it works: instead of using
your actual credit and debit card numbers when you add your card to your phone, your
phone stores an encrypted, unique Device Account Number. When you make a
purchase, you enter a PIN, or, in the case of Apple Pay, scan your fingerprint, and the
Device Account Number, along with a transaction-specific dynamic security code, is
used to process your payment. Your actual credit or debit card numbers are never
shared with merchants or transmitted with payment."
" Mobile payments are a great alternative to credit cards that could create a world
where you don't have to remember to grab your wallet along with your phone and keys
when you leave your house in the morning, and are much more secure, although
considering what we have now, chip and PIN alone would be a drastic improvement.
American credit companies need to think about how long they really want to wait before
doing away with signatures and implementing PINs.

Mims 3
Works Cited!
" Arment, Marco, Casey Liss, and John Siracusa. Entering the iTouch Phase of My
Life. 2014. MP3."
" Rosenblatt, Seth. "Chips promise more security for credit cards, but signature still
required." CNET. CBS Interactive Inc., 17 Nov. 2014. Web. 18 Nov. 2014."
" "Seventy Percent of U.S. Credit Cards to be EMV Enabled by the End of 2015."
Aite. Aite Group LLC, 10 Jun. 2014. Web. 18 Nov. 2014"
" "Target security breach affects up to 40M cards". Associated Press via
Milwaukee Journal Sentinel. 19 Dec. 2013. Web. 21 Dec. 2013.

Mais conteúdo relacionado

Mais procurados

Why Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyWhy Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyProtegrity
 
Manifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityManifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityVladislav Solodkiy
 
Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2editKehinde Adelusi
 
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...Steven Rhyner
 
Dorado Industries TrendWatch 2.0 Q3 2013 Industry Review
Dorado Industries TrendWatch 2.0 Q3 2013 Industry ReviewDorado Industries TrendWatch 2.0 Q3 2013 Industry Review
Dorado Industries TrendWatch 2.0 Q3 2013 Industry ReviewDorado Industries
 
Venmo_Live_Case_2016 copy
Venmo_Live_Case_2016 copyVenmo_Live_Case_2016 copy
Venmo_Live_Case_2016 copytlc44
 
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/32/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3Alessio Bonetti
 
Dorado Industries TrendWatch 2.0 Q1 2017
Dorado Industries TrendWatch 2.0 Q1  2017Dorado Industries TrendWatch 2.0 Q1  2017
Dorado Industries TrendWatch 2.0 Q1 2017Dorado Industries
 
Mba solved assignmnets call us at - 08263069601
Mba solved assignmnets   call us at - 08263069601Mba solved assignmnets   call us at - 08263069601
Mba solved assignmnets call us at - 08263069601smumbahelp
 
The case for Electronic Cash - Coincenter
The case for Electronic Cash - CoincenterThe case for Electronic Cash - Coincenter
The case for Electronic Cash - CoincenterJosu San Martin
 
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorldAdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorldNigel Mark Dias
 
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry SynopsisDorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry SynopsisDorado Industries
 
The Disruptive Power Of Virtual Currency
The Disruptive Power Of Virtual CurrencyThe Disruptive Power Of Virtual Currency
The Disruptive Power Of Virtual CurrencyAranca
 
Adscash presentation
Adscash presentationAdscash presentation
Adscash presentationbitaminb
 

Mais procurados (20)

Dorado trend watch q2 2013
Dorado trend watch q2 2013Dorado trend watch q2 2013
Dorado trend watch q2 2013
 
Why Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyWhy Hacking into Your Company is so Easy
Why Hacking into Your Company is so Easy
 
Manifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO communityManifesto of the Crypto\ICO community
Manifesto of the Crypto\ICO community
 
Presentation joys en (1)
Presentation joys en (1)Presentation joys en (1)
Presentation joys en (1)
 
payments-interview
payments-interviewpayments-interview
payments-interview
 
Target@ Data Breach2edit
Target@ Data Breach2editTarget@ Data Breach2edit
Target@ Data Breach2edit
 
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
THE $1.7 TRILLION REASON BANKS PREFER BLOCKCHAIN OR DISTRIBUTED LEDGER OVER B...
 
Dorado Industries TrendWatch 2.0 Q3 2013 Industry Review
Dorado Industries TrendWatch 2.0 Q3 2013 Industry ReviewDorado Industries TrendWatch 2.0 Q3 2013 Industry Review
Dorado Industries TrendWatch 2.0 Q3 2013 Industry Review
 
Venmo_Live_Case_2016 copy
Venmo_Live_Case_2016 copyVenmo_Live_Case_2016 copy
Venmo_Live_Case_2016 copy
 
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/32/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
2/3 - Branch, Internet, Mobile, Digital. Evolution of Banking services 2/3
 
Dorado Industries TrendWatch 2.0 Q1 2017
Dorado Industries TrendWatch 2.0 Q1  2017Dorado Industries TrendWatch 2.0 Q1  2017
Dorado Industries TrendWatch 2.0 Q1 2017
 
The Future of Banking
The Future of BankingThe Future of Banking
The Future of Banking
 
Mba solved assignmnets call us at - 08263069601
Mba solved assignmnets   call us at - 08263069601Mba solved assignmnets   call us at - 08263069601
Mba solved assignmnets call us at - 08263069601
 
Currency And Paperless Money
Currency And Paperless MoneyCurrency And Paperless Money
Currency And Paperless Money
 
The case for Electronic Cash - Coincenter
The case for Electronic Cash - CoincenterThe case for Electronic Cash - Coincenter
The case for Electronic Cash - Coincenter
 
Payment Industry Trends for 2016
Payment Industry Trends for 2016Payment Industry Trends for 2016
Payment Industry Trends for 2016
 
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorldAdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
AdsCash Coin: Ethereum Smart Contract based Cryptocurrency for AdWorld
 
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry SynopsisDorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
Dorado Industries TrendWatch 2.0 Q1 2019 Payments Industry Synopsis
 
The Disruptive Power Of Virtual Currency
The Disruptive Power Of Virtual CurrencyThe Disruptive Power Of Virtual Currency
The Disruptive Power Of Virtual Currency
 
Adscash presentation
Adscash presentationAdscash presentation
Adscash presentation
 

Destaque

D2 t1 pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
D2 t1   pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...D2 t1   pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
D2 t1 pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...ichitaso Satou
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 

Destaque (11)

D2 t1 pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
D2 t1   pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...D2 t1   pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
D2 t1 pod2g, planetbeing, musclenerd and pimskeks aka evad3rs - swiping thr...
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Semelhante a Safer Payment Methods

White_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LASWhite_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LASJean-Ann Langert
 
Money2020 2015 Day One Highlights
Money2020 2015 Day One HighlightsMoney2020 2015 Day One Highlights
Money2020 2015 Day One HighlightsSam Maule
 
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...- Mark - Fullbright
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTesth9gfhypx97
 
How contactless payment can boost your business
How contactless payment can boost your businessHow contactless payment can boost your business
How contactless payment can boost your businessGraeme McGilliard
 
Retail POS Breaches/Chip and Pin
Retail POS Breaches/Chip and PinRetail POS Breaches/Chip and Pin
Retail POS Breaches/Chip and PinMike Smith
 
Re-Inventing Finance
Re-Inventing FinanceRe-Inventing Finance
Re-Inventing FinanceTom Carlson
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniquesijsrd.com
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxvrickens
 
Virtual credit card in India
Virtual credit card in IndiaVirtual credit card in India
Virtual credit card in IndiaMorCryp
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicInApp
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemWarren Smith
 
EMV Chip Cards
EMV Chip CardsEMV Chip Cards
EMV Chip Cardstxheaven
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-securityKerri Lorch
 

Semelhante a Safer Payment Methods (20)

Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Data Breach Article
Data Breach ArticleData Breach Article
Data Breach Article
 
White_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LASWhite_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LAS
 
EMV and the consumer Final
EMV and the consumer FinalEMV and the consumer Final
EMV and the consumer Final
 
Atm theft
Atm theftAtm theft
Atm theft
 
credit card theft
credit card theftcredit card theft
credit card theft
 
Money2020 2015 Day One Highlights
Money2020 2015 Day One HighlightsMoney2020 2015 Day One Highlights
Money2020 2015 Day One Highlights
 
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
 
How contactless payment can boost your business
How contactless payment can boost your businessHow contactless payment can boost your business
How contactless payment can boost your business
 
Retail POS Breaches/Chip and Pin
Retail POS Breaches/Chip and PinRetail POS Breaches/Chip and Pin
Retail POS Breaches/Chip and Pin
 
Re-Inventing Finance
Re-Inventing FinanceRe-Inventing Finance
Re-Inventing Finance
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docx
 
Virtual credit card in India
Virtual credit card in IndiaVirtual credit card in India
Virtual credit card in India
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card System
 
EMV Chip Cards
EMV Chip CardsEMV Chip Cards
EMV Chip Cards
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 

Mais de Cody Mims

Rotational motion
Rotational motionRotational motion
Rotational motionCody Mims
 
Bandwagon billboard
Bandwagon billboardBandwagon billboard
Bandwagon billboardCody Mims
 
Story of an Hour mythological analysis
Story of an Hour mythological analysisStory of an Hour mythological analysis
Story of an Hour mythological analysisCody Mims
 
Psychology review
Psychology reviewPsychology review
Psychology reviewCody Mims
 
Merger conglomerate-multinational worksheet
Merger conglomerate-multinational worksheetMerger conglomerate-multinational worksheet
Merger conglomerate-multinational worksheetCody Mims
 
Abnormal psychology
Abnormal psychologyAbnormal psychology
Abnormal psychologyCody Mims
 
Stages of psychosexual development
Stages of psychosexual developmentStages of psychosexual development
Stages of psychosexual developmentCody Mims
 
Sophienburg history scholarship
Sophienburg history scholarshipSophienburg history scholarship
Sophienburg history scholarshipCody Mims
 
States of consciousness
States of consciousnessStates of consciousness
States of consciousnessCody Mims
 
Sensory perceptory
Sensory perceptorySensory perceptory
Sensory perceptoryCody Mims
 
Developmental psychology
Developmental psychologyDevelopmental psychology
Developmental psychologyCody Mims
 
Angular Motion notes
Angular Motion notesAngular Motion notes
Angular Motion notesCody Mims
 
Introspection
IntrospectionIntrospection
IntrospectionCody Mims
 
Executive branch review
Executive branch reviewExecutive branch review
Executive branch reviewCody Mims
 
Executive branch worksheet
Executive branch worksheetExecutive branch worksheet
Executive branch worksheetCody Mims
 

Mais de Cody Mims (20)

Rotational motion
Rotational motionRotational motion
Rotational motion
 
Bandwagon billboard
Bandwagon billboardBandwagon billboard
Bandwagon billboard
 
Story of an Hour mythological analysis
Story of an Hour mythological analysisStory of an Hour mythological analysis
Story of an Hour mythological analysis
 
Psychology review
Psychology reviewPsychology review
Psychology review
 
Merger conglomerate-multinational worksheet
Merger conglomerate-multinational worksheetMerger conglomerate-multinational worksheet
Merger conglomerate-multinational worksheet
 
Abnormal psychology
Abnormal psychologyAbnormal psychology
Abnormal psychology
 
Stages of psychosexual development
Stages of psychosexual developmentStages of psychosexual development
Stages of psychosexual development
 
Motivation
MotivationMotivation
Motivation
 
Cognition
CognitionCognition
Cognition
 
Sophienburg history scholarship
Sophienburg history scholarshipSophienburg history scholarship
Sophienburg history scholarship
 
Sleep
SleepSleep
Sleep
 
States of consciousness
States of consciousnessStates of consciousness
States of consciousness
 
Sensory perceptory
Sensory perceptorySensory perceptory
Sensory perceptory
 
Developmental psychology
Developmental psychologyDevelopmental psychology
Developmental psychology
 
Angular Motion notes
Angular Motion notesAngular Motion notes
Angular Motion notes
 
Introspection
IntrospectionIntrospection
Introspection
 
Psychology
PsychologyPsychology
Psychology
 
Temperance
TemperanceTemperance
Temperance
 
Executive branch review
Executive branch reviewExecutive branch review
Executive branch review
 
Executive branch worksheet
Executive branch worksheetExecutive branch worksheet
Executive branch worksheet
 

Último

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Safer Payment Methods

  • 1. Mims 1 " Credit Cards and Swiping Information" " You may not realize it, but the American credit system is in a time of change. The fact is, change cannot come soon enough. Credit security breaches have proven over and over that we need a better system than the terrible, primitive one we have now." " Let me refresh your memory on how our system works now with an explanation by Casey Liss on Accidental Tech Podcast:" If you're at a restaurant, the general way things work is, you ask for a check, they bring you the check, you give the server your credit card, they run away to some terminal that could be in the back of the restaurant well out of your line of sight, swipe your card, hopefully not skim your card, bring it back, and then you are to add the tip that you want to add, sign the paper, and leave it and just hope that (A) they didn't skim your card, and (B) they actually put the amount you want them to put into the point of sale system in order to charge you…we are so backwards anything will be an improvement. (Arment)." " As you can imagine, plenty of security breaches have come from this. The biggest one in the recent past happened in late November to early December 2013, when data from around 40 million credit and debit cards was stolen from Target Corporation. ("Target security breach affects up to 40M cards"). In all of 2013, $6 billion was lost to credit card fraud in the U.S., up from around $4.5 billion in 2011. ("Seventy Percent of U.S. Credit Cards to be EMV Enabled by the End of 2015")." Cody Mims" Mrs. Mann" DC English III" 11-20-14
  • 2. Mims 2 " By October 1, 2015, credit card transactions in the United States are going to require a chip built into the card. (Rosenblatt). This is a much safer system that 19 other countries have already adopted. In the United Kingdom, counterfeit credit card fraud plummeted to $67 million in 2013 from $151 million in 2004 after it started using chipped cards. However, what we are doing in the U.S. is still a feeble half measure that involves the customer giving a signature instead of entering a PIN. Signing is a pointless ritual that gives a false sense of security, and without a PIN, stolen cards can be used for online shopping just as easily as ones with a magnetic stripe." " A wonderful effect of this change is that now is a great time for completely new payment methods to arrive. NFC payments such as Google Wallet and Apple Pay offer humongous security benefits over credit cards. Here is how it works: instead of using your actual credit and debit card numbers when you add your card to your phone, your phone stores an encrypted, unique Device Account Number. When you make a purchase, you enter a PIN, or, in the case of Apple Pay, scan your fingerprint, and the Device Account Number, along with a transaction-specific dynamic security code, is used to process your payment. Your actual credit or debit card numbers are never shared with merchants or transmitted with payment." " Mobile payments are a great alternative to credit cards that could create a world where you don't have to remember to grab your wallet along with your phone and keys when you leave your house in the morning, and are much more secure, although considering what we have now, chip and PIN alone would be a drastic improvement. American credit companies need to think about how long they really want to wait before doing away with signatures and implementing PINs.

  • 3. Mims 3 Works Cited! " Arment, Marco, Casey Liss, and John Siracusa. Entering the iTouch Phase of My Life. 2014. MP3." " Rosenblatt, Seth. "Chips promise more security for credit cards, but signature still required." CNET. CBS Interactive Inc., 17 Nov. 2014. Web. 18 Nov. 2014." " "Seventy Percent of U.S. Credit Cards to be EMV Enabled by the End of 2015." Aite. Aite Group LLC, 10 Jun. 2014. Web. 18 Nov. 2014" " "Target security breach affects up to 40M cards". Associated Press via Milwaukee Journal Sentinel. 19 Dec. 2013. Web. 21 Dec. 2013.