Explain symmetric and asymmetric encryption system, Computer Network Security

Question 1:

(a) Differentiate between symmetric and asymmetric encryption system.

(b) Describe how a digital signature is created.

(c) Explain briefly what SSL (secure socket layer) is and how it can be applied to e_banking services to ensure security.

(d) Explain the steps involved in a SET(Secure Electronic Transaction.

(e) In cryptography explain the following:
(i) Authentication.
(ii) Non-repudiation.
(iii) Confidentiality.
(iv) Integrity.

Question 2:

(a) Outline the main difference between a credit card and a debit card as a payment instrument.

(b) Outline the role of the credit card Gateway and list down the steps involved when payment is processed via the payment gateway.

(c) Outline briefly how biometric systems work and give four examples of biometric measurements that can be used to identify a person.

(d) Outline the importance of backup, recovery and business continuity procedures in an e_banking environment.

(e) Outline briefly the following electronic payment methods:

(i) E_Wallet.
(ii) Smart Card.

Posted Date: 12/3/2013 1:20:33 AM | Location : United States







Related Discussions:- Explain symmetric and asymmetric encryption system, Assignment Help, Ask Question on Explain symmetric and asymmetric encryption system, Get Answer, Expert's Help, Explain symmetric and asymmetric encryption system Discussions

Write discussion on Explain symmetric and asymmetric encryption system
Your posts are moderated
Related Questions
Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

what is guided media or unguided media

Normal 0 false false false EN-US X-NONE X-NONE

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Discuss the risks of having a single root user

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u