Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question 1:
(a) Differentiate between symmetric and asymmetric encryption system.
(b) Describe how a digital signature is created.
(c) Explain briefly what SSL (secure socket layer) is and how it can be applied to e_banking services to ensure security.
(d) Explain the steps involved in a SET(Secure Electronic Transaction.
(e) In cryptography explain the following: (i) Authentication. (ii) Non-repudiation. (iii) Confidentiality. (iv) Integrity.
Question 2:
(a) Outline the main difference between a credit card and a debit card as a payment instrument.
(b) Outline the role of the credit card Gateway and list down the steps involved when payment is processed via the payment gateway.
(c) Outline briefly how biometric systems work and give four examples of biometric measurements that can be used to identify a person.
(d) Outline the importance of backup, recovery and business continuity procedures in an e_banking environment.
(e) Outline briefly the following electronic payment methods:
(i) E_Wallet. (ii) Smart Card.
Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u
In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c
Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG
Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded usi
homlox prv hetorx orxolxpersorx
INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of
Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r
Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem
INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed
You are free to design the format and structure of the routing table kept locally by each node and exchanged among neighboring nodes. 1. Upon the activation of the program, each
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd