Literature Review on "EMV Standard Implementation in Iranian Banks Risks and Challenges"

Literature Review 7 pages (2202 words) Sources: 10

[EXCERPT] . . . .

EMV standard Implementation in Iranian Banks Risks & Challenges

General View on Payment cards frauds and solution

There are diversified vies regarding the various forms of payment card fraud. In this paper we discuss extensively these views with a view of isolating the most dominant forms of payment card fraud so as to come up with viable solutions of how to tackle them.

Common Payment cards frauds

There exist various types of payment card frauds. The main reason for migrating to the EMV card scheme is to reduce the various forms of chip fraud. The main forms of credit card fraud are:

Counterfeiting

Can be lost or stolen

Issues of cardholder being absent which leads to both internet and telephone order being used as gateways to propagate this type of crime.

There are various methods through which magnetic-credit cards are counterfeited. The first method involves the 'skimming' attack on the card. The new EMV technology is however designed in a way that allows for the support of encryption protocols that utilize non-secret technology which is however dynamic in the countering of various transactions that involve the counterfeiting of the card. The exact mechanism involved entails the use of protocols that prevent various replays while at the same time making use of private cryptographic keys in the process of authenticating the card payments with various issuers and merchants (Russell, 2010). The use of the encryption keys can only be effective if the secrecy of the keys used in the card is assured. This is currently the only way of ensu
Continue scrolling to

download full paper
ring that these cards are protected from the various the dangers of skimming attacks.

The technology of ensuring that the encryption keys are properly managed is currently at a matured level as pointed out by (Ward 2006,91).

There are other methods used in perpetrating credit card fraud. These are outlined below:

Mail non-receipt fraud

This form of card fraud occurs whenever a new or a replacement payment card which is destined for a certain bank is never received by its intended recipient. This form of card fraud is prevented through the dispatching of card that are inactive that are to be activated by their intended owners via phone calls to the card issuer. The reality on the grounds is that certain banks till send out cards that are already in activated mode.

Chargeback fraud

This type of fraud occurs or rather is perpetrated whenever a card holder makes use of their legal cards to purchase certain goods and services. However when they receive their statement they claim that they charges against it were never authorized by them. They can also claim that they never received the good or service in the first place.

Skimming

This type of credit card fraud occurs whenever an employee or a given merchant maliciously makes a second copy of an individual's credit card details prior to the processing of their payments. The illegally acquired copy is then sold to criminals in the black market who end up cloning it for the purpose of illegally using it to make unauthorized withdrawals and payments from various outlets. The good news is that this form of credit card fraud has been stemmed down through the introduction of coded technologies such as VCC and CVS. These codes are never encoded on the chip itself but rather are written physically on the cards back. The VCC and CVS are therefore the final step in the process of authorizing. The cloned card can therefore not work without these codes. There have been reported cases of card skimming in ATMs. This is done through the use of an illegally installed ATM machine to which a 'skimmer' device is attached in order to read the all important card details contained in the magnetic strip. Additional devoices are also installed in the machine in order to capture the activities on the keypad. Such a device is the installation of a fake fascia to the surface of the genuine keypad.

Online credit card fraud

This form of online credit card fraud is perpetrated on the internet. It is also the most common form of credit card fraud. This is as a result of the wide spread use of the internet in order to conduct various forms of transaction. The convenience and efficiency that come with the introduction of e-commerce is therefore hindered a great deal by the rampant cases of online credit card fraud. The worst part of this form of credit card fraud is the fact that the hacker steals the details of the card secretly whenever the victim inputs their credit card details into the computer system. This form of payment card fraud can also be perpetrated through the use of fake emails that prompt the victim toupdate their credit card information online. A bogus link is then sent to the victim that prompts them to insert the required information that is then used to scam them. The acquired information is then sold or used by the hacker to initiate online purchases.

2.4.2. Protecting Card Transactions.

Extant literature has been dedicated to the study of how to protect various payment cards from the rampant cases of fraud. Balfe and Paterson (2008, 171) clearly state that the use of the internet in the process of carrying out transactions has made it possible for e-commerce to be carried out via what is referred to as Card Not Present (CNP)(APAC 2003) to be so popular.

Various reports have also been published in order to illustrate the gravity of various forms of credit card fraud in various parts of the word. A study conducted in the UK in 2006 shown that the cases of card fraud through the internet had risen and accounted for close to 36% of all the forms of credo card frauds (APAC 2003). The resulting financial losses were enormous. This happened despite the fact that there were various forms of secure payment technologies and gateways. As pointed out by Balfe and Paterson (2008, 171), the use of technologies such as SLL to protect various payment card information is never sufficient. This is because of the complexity involved in the carrying out of various forms of internet-based CNP transactions. This is because the use of SLL never protects the details themselves. It only helps in securing the channel that the information is conveyed through. There is therefore a lack of information on whoever is authorizing the passage of information through the channel itself. Studies have revealed that a proper demonstration of accurate Personal Account Number (PAN) as well as its corresponding Card Security Code (CSC) is a sufficient for any given hacker to gain access to the account of a certain card holder. In order to reduce these kinds of loopholes various more advance technologies have been devised such as the use of 3-D secure authorization that allows for the authorization of the cardholder to be carried out for the various forms of CNP transactions (VISA 2002). This is done through requiring of a customer to provide separate authentication information in step prior to the processing of the whole transaction. The downside of these techniques is the fact that it is easily compromised by various forms of malware. These include Trojans and certain key loggers which are intended to steal information from the intended victim. This has therefore led to the recent development of more advanced and secure methods of protecting card transactions such as the use of specially strengthened 3-D secure authentication techniques which are intricately integrated into the existing EMV payment cards (VISA 2002).

Other recent development in the field of securing card transactions is the use of Trusted Computing in order to make possible the use of certain client side certification (Alsaid and Mitchell 2006, 123).This is done in conjunction with other technologies such as Trusted Computing Group's TLS which are utilized in executing attestations. There is however still certain amount of danger posed to this system by various forms of malware. This is however discussed in details by various literatures such as Jackson and Mitchell (2007). This involves the use of Trusted Computing as an aid to the existing card readers so as to generate unique digital signatures.

The move to adopt EMV standards have been widely discussed by various literature.SPA (2010) extensively discusses the latest techniques used in ensuring that the cardholder is sufficiently protected from the rampant cases of fraud. Through their white paper, the Smart Payment Association clearly shows the reasons why there is need for migration to better EMV systems in order to reduce the cases of credit card fraud. They point out that it is the various cases of fraud that has necessitated the migration of the existing systems towards the better and safer EMV standards.

The level of success of the EMV standards can be illustrated through the analysis of its success rates in various countries such as the United Kingdom where it was noted to have lead to a substantial decline in the number of… READ MORE

Quoted Instructions for "EMV Standard Implementation in Iranian Banks Risks and Challenges" Assignment:

I am struggling with my literature review because I have to write about implementation of a new technology (EMV standard) EMV comes from the initial letters of Europay, MasterCard and VISA, the chip in a smart card, and I need you help to write this chapter because I have divided my chapter to:

2.1. Introduction:

2.2 Part 1: smart card history

2.3 Part 2: EMV standard *****" An Overview

2.3.1 An Overview

2.3.2 EMV Security Standard

2.3.3 Tools for Compliance

I have done this part but I need some help with the following two parts:

2.4 Part 3: General View on Payment cards frauds and Solutions:

2.4.1. Common Payment cards frauds

2.4.2. Protecting Card Transactions

2.5 Part 4: EMV Implementation Challenges

What I understand from what I have read something like :

Insufficient Guidance, Operational Costs, Operational risk management,

Business challenges , updated equipments , *****¦

** many countries had implement this chip (like UK 2006)

2.6 Conclusion

I am not sure about the structure but that what I have done and I want your help with that specially to focus on part 4 which the rest of my dissertation rely on.

I have the references which I found online and I will upload it to save your time and focus on writing efficiently, and If you think there are better references please make sure they are up to date and please attach them so I can use them.

So I need tour help with part 3 and 4.

the only reference which I can*****'t upload is this book :

A new way to pay: creating competitive advantage through the EMV smart card

but it is available on Google books:

http://books.google.co.uk/books?hl=en&lr=&id=ou6vzANwEXsC&oi=fnd&pg=PP11&dq=migration+to+EMV+standard&ots=172ilO5zCZ&sig=b5DGayKL5E3RTcCnhWbtILMuw7A#v=onepage&q=migration%20to%20EMV%20standard&f=false

Thanks.

*****

How to Reference "EMV Standard Implementation in Iranian Banks Risks and Challenges" Literature Review in a Bibliography

EMV Standard Implementation in Iranian Banks Risks and Challenges.” A1-TermPaper.com, 2010, https://www.a1-termpaper.com/topics/essay/emv-standard-implementation-iranian/730543. Accessed 5 Oct 2024.

EMV Standard Implementation in Iranian Banks Risks and Challenges (2010). Retrieved from https://www.a1-termpaper.com/topics/essay/emv-standard-implementation-iranian/730543
A1-TermPaper.com. (2010). EMV Standard Implementation in Iranian Banks Risks and Challenges. [online] Available at: https://www.a1-termpaper.com/topics/essay/emv-standard-implementation-iranian/730543 [Accessed 5 Oct, 2024].
”EMV Standard Implementation in Iranian Banks Risks and Challenges” 2010. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/emv-standard-implementation-iranian/730543.
”EMV Standard Implementation in Iranian Banks Risks and Challenges” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/emv-standard-implementation-iranian/730543.
[1] ”EMV Standard Implementation in Iranian Banks Risks and Challenges”, A1-TermPaper.com, 2010. [Online]. Available: https://www.a1-termpaper.com/topics/essay/emv-standard-implementation-iranian/730543. [Accessed: 5-Oct-2024].
1. EMV Standard Implementation in Iranian Banks Risks and Challenges [Internet]. A1-TermPaper.com. 2010 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/emv-standard-implementation-iranian/730543
1. EMV Standard Implementation in Iranian Banks Risks and Challenges. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/emv-standard-implementation-iranian/730543. Published 2010. Accessed October 5, 2024.

Related Literature Reviews:

Methodology EMV Standard Implementation in Iranian Banks Risks and Challenges Methodology Chapter

Paper Icon

EMV in Iranian Banks

EMV standard Implementation in Iranian Banks Risks & Challenges

The purpose of this research is to understand the risks and challenges that are likely to be… read more

Methodology Chapter 10 pages (3023 words) Sources: 7 Topic: Economics / Finance / Banking


EMV Standard Implementation in Iranian Banks Risks Conclusion

Paper Icon

EMV standard Implementation in Iranian Banks Risks & Challenges

In order to successfully migrate to EMV system of payment/transactions, the Iranian banks must be able to consider a series of… read more

Conclusion 4 pages (1095 words) Sources: 1 Topic: Economics / Finance / Banking


EMV Standard Implementation in Iranian Banks Risks Discussion Chapter

Paper Icon

EMV standard Implementation in Iranian Banks Risks & Challenges

Challenges

In regard to the isolation of the various challenges that affect the migration process to the new EMV standards. The… read more

Discussion Chapter 9 pages (2295 words) Sources: 3 Topic: Economics / Finance / Banking


Risks and Challenges in Doing Business Essay

Paper Icon

risks and challenges in doing business in emerging markets. Risks inherent any time a firm operates internationally apply, and are arguably intensified, such as market risk, cultural risk, competition and… read more

Essay 6 pages (1968 words) Sources: 6 Topic: Business / Corporations / E-commerce


Risk Management in Banks: Reference to Indian Article Review

Paper Icon

Risk Management in Banks: Reference to Indian Banks Industry

"The Indian Financial System is tasting success of a decade of financial sector reforms. The economy is surging and has gathered… read more

Article Review 16 pages (4399 words) Sources: 6 Topic: Economics / Finance / Banking


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!