Kim Mattson

ITS 380



Case Study

1.       Who are the three major players in the mobile payment market?

The three major players are the technology companies (Apple, Google, Samsung, PayPal, and Square), large national merchants, and third are the banks and credit card companies.

2.       Why is Venmo considered a social-mobile payment system?

Venmo allows users to share their purchase events and can send money to other Venmo account holders.

3.       How does Apple Pay differ from Android Pay and Samsung Pay?

Apple collects .15% from credit card companies and banks in exchange for guaranteeing the transaction made through their phones and watches.

4.       How does PayPal enable mobile payments?

PayPal has three ways to process mobile payments. One, merchants can purchase a device for a tablet or smartphone to swipe credit cards. Two, using a tablet or smartphone’s mobile device browser to purchase or make a payment to a website. And last, is PayPal’s app for IOS or Android.


2.       Given the shift toward m-commerce, do a search on m-commerce (or mobile commerce) crime. Identify and discuss the security threats this type of technology creates. Prepare a presentation outlining your vision of the new opportunities for cybercrime that m-commerce may provide.

M-commerce is going to require businesses to update their payment system to be more flexible to accommodate this increasing area. While EMV makes POS transactions more secure, it is not the same for e-commerce/ m-commerce transactions. The basic information of credit cards is still vulnerable for fraudulent use. Beyond the credit account numbers used over the internet, the basic use of Wi-Fi, will be targeted. Retailer’s will have to take measures to secure their network to protect their customers. These networks and mobile devices are not immune to being targeted with malware and viruses. As the popularity of mobile devices has grown, so has the interest in mobile malware.  According to McAfee Labs, over 16 million incidents of mobile malware happened in 2017. Another concern is the construction of the apps used. Many are not developed with adequate security features. Mobile devices and apps are of high interest to cyber criminals because they lack the multiple layers of security measures the PC has. 

3.       Find three certification authorities and compare the features of each company’s digital certificates. Provide a brief description of each company as well, including number of clients. Prepare a brief presentation of your findings.


Let's Encrypt





DV, Wildcard,

DV, Wildcard,


RSA 2048-bit

RSA 2048-bit (DV, Wildcard, EV) 128-bit or 256-bit (UC)

256-bit, RSA and ECC,
RSA and DSA (Wildcard only)


Free, automated

Free, automated
reminders 60 days out

automated reminders
with 30 day grace period



$250,000 - $1,750,000

$1,500,000 to $1,750,000



$76.95/yr to $404.95/yr

$399/yr to $1,999/yr

Other info

unlimited certificates issued, multiple can run at same time,open source

Free 1 year PCI and
vulnerability scanning,
unlimited re-issuance
TrustLogo site seal

Daily malware scanning,
Norton Secured Seal,