0% found this document useful (0 votes)
24 views18 pages

New Ms

no
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views18 pages

New Ms

no
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Department of Computer Engineering

Presentation on “Seminar And Technical Communication”


Date: 22/10/2024
“Secure Mobile Payments With Advanced Cyber Security:
A Extensive Study”
Presented By: Mr.Ghogare Anant Rahul Guided By: Dr.P.B.Vikhe
*CONTENTS*
● Abstract
● Introduction
● Methodology
● Literature Review
● Advantages
● Disadvantage
● Application
● Conclusion
● References
 Abstract:-

Mobile phones have become an inseparable friend for many


users, serving much more than just communication tools.
Every person wants to manage his/her daily transactions
and related issues by using his/her mobile phone. In this we
will discuss different security mechanisms involved in
MPS, and provide analysis of technologies, used in MPS.
Secure Mobile Payments With Advanced Cyber
Security : A Extensive Study

❖ Introduction:-

In today's digitally connected world, mobile payments have


become an integral part of everyday life. This introduction sets
the stage for an extensive study that delves into the critical
intersection of mobile payments and advanced cyber security,
emphasizing the importance, evolution, and key focus areas of
this dynamic field.
 What is Cyber Security?

- Cyber Security is practice of defending Computers,


Servers, Mobile Devices and data from malicious attack.

- Cyber Security is important because it protect all


categories of data from theft and damage.
 What is Mobile Payment System?

1. Mobile Payments are typically completed using a digital


wallet or mobile app, and can be linked to bank account,
credit card , debit card ,and other payment method.

2. There are different types of mobile payment system:


 Mobile browser-based payment.
 In-app mobile payment
 Mobile or wireless credit card reader
 Major Components of Mobile
Payment System.

 CONSUMER/CUSTOMER
 MERCHANT/SELLER
 SERVICE PROVIDER
 BANKS
 Needs of Mobile Payments security :-

1. Data Encryption: Robust encryption of data during


transmission and storage to protect sensitive information
from unauthorized access.
2. Authentication: Implement strong user authentication
methods, such as biometrics or multi-factor authentication, to
ensure that only authorized users can make transactions.
 Literature Review:-

Title Methodology Algorithm used Gap Analysis

Scenario for The speed,


m-payment models. QR Coding transaction is
--- intended by the
merchant for more
reliable and accurate
connection.

Short Message Short Message Peer to peer Provide the privacy


service service and transition can be
done by transmitting
the mobile numbers.
 Algorithm For
E-Payment System

Ways of E-payment System


1.Credit Card
2.Debit Card
3.Smart Card
4.Electronic Fund Transfer
 Methodology :–

Encryption technology-
It include Symmetric encryption and Public-key encryption.
1) SYMMETRIC KEY ENCRYPTION (SKE):-SKE system uses a
common key to encrypt messages, which means both sender and receiver
will hold a common key for encryption and decryption. Symmetric
encryption is still commonly used in insecure data communication.

2) PUBLIC-KEY ENCRYPTION (PKE):- PKE system is a type of


asymmetric encryption because the same key is not used to encrypt and decrypt
the messages. In the PKE system, two different keys are used, called public and
private key
❖ Advantages :-

1. Mobile payment acceptance improve customer service.


2. Increase customer convenience.
3. Time efficiency.
4. Accessing the bank 24/7.
 Disadvantages:-

1. One disadvantage of mobile payment systems is the potential


for security risks. Mobile payments can be vulnerable to fraud,
hacking, and data breaches, putting users' sensitive financial
information at risk if proper security measures are not in place
 Applications of Mobile Payment System: -

1. Samsung pay.
2. Google pay.
3. Phone pay.
4. Paytm.
5. Amazon pay.
❖ Conclusion: -

● This PPT discussed various payment schemes and their


usage, technology, and provided security mechanisms.
● Most payment methods are account-based payment systems,
and their main focus is on security, privacy, confidentiality,
and authentication.
● We discussed different aspects of MPS, including
advantage, disadvantages and methodology in MPS form
different aspects
❖ References :-

1. https://ieeexplore.ieee.org/document/9514868
2. M. Rouse. (2017). Single-Factor Authentication (SFA). [Online]. Available:
https://searchsecurity.techtarget.com/
3. Secure Network Architectures and Protocols" by Christos Stergiou and Dimitrios
D. Vergados.
4. A. Rahav. (2018). The Secret Security Wiki. [Online]. Available: https:
//doubleoctopus.com/security-wiki/authentication/single-factorauthentication/
Thank You

You might also like