Electronic Payment Systems and Security
Across
- 2. Adherence to security standards to protect against fraud
- 4. Verification of user or system identity
- 5. Process of granting access to a system or resource
- 10. Electronic devices worn on the body that collect and transmit data
- 13. Payment authentication method that uses physical characteristics such as fingerprints or facial recognition
- 14. Digital currency that uses encryption techniques for secure transactions
- 15. Software that damages or disrupts computer systems
- 16. Payment method that allows customers to complete transactions by tapping or waving their card or mobile device
- 17. Use of physical or behavioral characteristics for authentication
- 19. Payment system that operates on a peer-to-peer network without a central authority or intermediary
- 21. Type of artificial intelligence that allows devices to learn and improve without explicit programming
- 23. Ability of devices to connect and communicate with other devices or networks
- 24. Network security system that controls access
- 25. Payment method that allows customers to complete transactions using their smartphone or other mobile device
Down
- 1. Residence equipped with Internet of Things devices that can be controlled remotely
- 3. Cryptographic method of verifying document authenticity
- 6. Data security technique that replaces sensitive data with unique identification symbols
- 7. Security process that requires two methods of authentication
- 8. Deliberate deception for unlawful gain
- 9. Dispute resolution process where a customer can reverse a transaction
- 11. Use of algorithms to identify and prevent fraudulent activity
- 12. The process of verifying and adding transactions to a blockchain by solving complex mathematical equations
- 18. Service that authorizes and processes electronic payments
- 20. Process of encoding data for secure transmission
- 22. Devices that detect and respond to changes in the physical environment