1 | 14 | 18 | |||||||||||||||||||||||
16 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | 15 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 |
1. A system that allows businesses to automatically charge customers on a predetermined schedule.
2. Measures taken to reduce the risk of fraudulent activities in online transactions.
3. A card that contains a magnetic stripe on the back used to store account information for swiping transactions.
4. A security process that uses unique biological traits, such as fingerprints or facial recognition, for identity verification.
5. Criminal activities involving the manipulation of automated teller machines.
6. A digital wallet that allows users to make transactions using their smartphones.
7. A payment card that can make transactions by simply tapping it near a payment terminal.
8. A method of confirming a user's identity by sending a one-time code via text message.
9. A transaction method that allows payment by simply tapping a card or mobile device against a terminal.
10. A physical device or software application that generates a unique code for authentication purposes.
11. A digital payment card generated for online purchases, providing enhanced security for transactions.
12. A mobile application that generates time-based or event-based codes for authentication.
13. A password that is valid for only one login session or transaction, enhancing security.
14. A refund initiated by the issuing bank for a disputed charge on a credit card.
15. The process of encoding transaction data to protect it from unauthorized access during processing.
16. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
17. A service that authorizes credit card or direct payments for online businesses.
18. The process of regaining access to a locked or compromised account, typically using backup methods.