© Jim Seaman 2020
J. SeamanPCI DSShttps://doi.org/10.1007/978-1-4842-5808-8_10

10. Payment Channel Attack Vectors

Jim Seaman1 
(1)
Castleford, West Yorkshire, UK
 

Criminals are predators, seeking any opportunities to exploit bad practices or poorly configured, or managed, systems. Increasingly, consumers are seeking to use more convenient, efficient, and quicker ways to purchase goods or services. In response to this demand, businesses are turning to new technologies to meet customer expectations.

Such technology has advanced at such a pace, with payments being able to be made instantly, without even a need for any contact. Increasing technological advancements have served to create a distanced shopping experience:
  • The customer making the purchase online ...

Get PCI DSS: An Integrated Data Security Standard Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.