A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

What is a Smart Card?

 , updated on July 05, 2023
A smart card is a wallet-sized card that has a computer embedded in it for purposes such as identification, authentication, data storage and application processing. These are often used to enhance security by making cards difficult to copy or manipulate.

Purpose

Smart cards are commonly used for payments, public transport, security ids, government identification such as health cards and to enhance computer and ecommerce security. In many cases, a single card can be used for multiple purposes such as a transit card that can store electronic cash for payments. Smart cards may be contactless whereby they can communicate with devices in close proximity. Alternatively, they may require contact such as being inserted into a slot.
Overview: Smart Card
Type
Definition
A wallet-sized card with embedded integrated circuits.
Value
Typically used to offer secure and convenient services such as payments or access to services such as transit and healthcare.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Data Backup

Several data backup techniques compared.

Sandbox Definition

An overview of sandboxes. An information security technique.

Strong Password

A few examples of what makes a password strong or weak.

Zero-day Vulnerability

An overview of zero-day vulnerability.

Personal Information

A definition of personal information with examples.

Cybersecurity

A definition of cybersecurity with examples.

Public Network

A definition of public network with examples.

Sandbox

A definition of sandbox with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map