Hacking Point of Sale: Payment Application Architecture & Vulnerabilities
In order to understand all of the different types of threats that may break the payment application (PA), it is first necessary to learn about the internal structure of these systems. The details of concrete implementations may vary from vendor to vendor, but the main design principles remain closely similar due to the narrow specialization of such applications.
This excerpt from the book "Hacking Point of Sale: Payment Application Secrets, Threats & Solutions" by Slava Gomzin defines different components of payment systems, terms and protocols in a way that is easily understandable by business leaders and technical audiences alike. The document covers overall payment system architecture, vulnerabilities and threats in retail payment systems which businesses need to be aware of to mitigate risk and protect customer data.