Explain symmetric and asymmetric encryption system, Computer Network Security

Question 1:

(a) Differentiate between symmetric and asymmetric encryption system.

(b) Describe how a digital signature is created.

(c) Explain briefly what SSL (secure socket layer) is and how it can be applied to e_banking services to ensure security.

(d) Explain the steps involved in a SET(Secure Electronic Transaction.

(e) In cryptography explain the following:
(i) Authentication.
(ii) Non-repudiation.
(iii) Confidentiality.
(iv) Integrity.

Question 2:

(a) Outline the main difference between a credit card and a debit card as a payment instrument.

(b) Outline the role of the credit card Gateway and list down the steps involved when payment is processed via the payment gateway.

(c) Outline briefly how biometric systems work and give four examples of biometric measurements that can be used to identify a person.

(d) Outline the importance of backup, recovery and business continuity procedures in an e_banking environment.

(e) Outline briefly the following electronic payment methods:

(i) E_Wallet.
(ii) Smart Card.

Posted Date: 12/3/2013 1:20:33 AM | Location : United States

Related Discussions:- Explain symmetric and asymmetric encryption system, Assignment Help, Ask Question on Explain symmetric and asymmetric encryption system, Get Answer, Expert's Help, Explain symmetric and asymmetric encryption system Discussions

Write discussion on Explain symmetric and asymmetric encryption system
Your posts are moderated
Related Questions
ROUTING TABLE For efficiency, information about forwarding is saved in a routing table, which is started at system initialization and must be updated as network topology modif

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Discuss the risks of having a single root user

ADVANCED RESEARCH PROJECT AGENCY (ARPA) The efforts of ARPA was to active all its research groups have accept to new era computers. For this purpose ARPA started investing in wa

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

You are free to design the format and structure of the routing table kept locally by each node and exchanged among neighboring nodes. 1. Upon the activation of the program, each