Chapter 1
Processing Payment Transactions
Because people have no thoughts to deal in, they deal cards, and try and win one another's money. Idiots!
—Arthur Schopenhauer
In order to understand the vulnerability points of point-of-sale and payment applications, it is necessary to know the basics—how, when, and why sensitive cardholder data moves between different peers during the payment transaction cycle:
- Why (the reason): Is it really necessary to hold, store, and transmit this data throughout the entire process?
- How (the location and the routes): What are the areas with a concentration of sensitive records?
- When (the timing): How long is this information available in those areas?
Payment Cards
The use of payment cards is obviously one of the main subjects of this book. There are several main types of payment cards commonly used for payments:
Get Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.