lec 2 Flashcards

(13 cards)

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the first method used for conducting payment card transactions

A

and what was its limitation?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How has payment card technology evolved over time?

A

Payment cards progressed from embossed cards to magnetic stripe (logging transactions electronically)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who are the key players involved in a card payment system and what are their roles?

A

Cardholder: Uses the card for purchases. Retailer/Merchant: Sells goods or services. Acquirer: Processes card transactions for the merchant. Issuer: The bank or institution that issues the card. Card Scheme: Oversees rules and transaction flows (e.g., Visa, Mastercard).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the significance of the PAN (Primary Account Number) in payment systems?

A

The PAN is the card number used to identify the account and route transactions correctly. The first digits indicate the card scheme (e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What functions do card schemes perform in the transaction cycle?

A

Card schemes define transaction rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can the card scheme be bypassed during a transaction?

A

Sometimes the acquirer caches the issuer information and communicates directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of cyberattack did the Magecart group use on British Airways?

A

They altered BA’s JavaScript file to include malicious code that captured and serialized form data when the payment button was pressed. The stolen data was sent to a rogue server mimicking BA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happened during the Magecart attack on Newegg

A

and what was the impact?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is JavaScript’s event-driven nature a security challenge in web development?

A

Event-driven scripts can execute based on user actions (e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is JavaScript difficult to formalize or secure through verification methods?

A

JavaScript supports prototype inheritance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why has the credit card industry remained a persistent target for cybercriminals?

A

Due to its high monetary value and widespread usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What advancement made physical card cloning less effective

A

and how did attackers respond?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly