Processing Payment Transactions
Because people have no thoughts to deal in, they deal cards, and try and win one another's money. Idiots!
In order to understand the vulnerability points of point-of-sale and payment applications, it is necessary to know the basics—how, when, and why sensitive cardholder data moves between different peers during the payment transaction cycle:
- Why (the reason): Is it really necessary to hold, store, and transmit this data throughout the entire process?
- How (the location and the routes): What are the areas with a concentration of sensitive records?
- When (the timing): How long is this information available in those areas?
The use of payment cards is obviously one of the main subjects of this book. There are several main types of payment cards commonly used for payments: