Explain symmetric and asymmetric encryption system, Computer Network Security

Question 1:

(a) Differentiate between symmetric and asymmetric encryption system.

(b) Describe how a digital signature is created.

(c) Explain briefly what SSL (secure socket layer) is and how it can be applied to e_banking services to ensure security.

(d) Explain the steps involved in a SET(Secure Electronic Transaction.

(e) In cryptography explain the following:
(i) Authentication.
(ii) Non-repudiation.
(iii) Confidentiality.
(iv) Integrity.

Question 2:

(a) Outline the main difference between a credit card and a debit card as a payment instrument.

(b) Outline the role of the credit card Gateway and list down the steps involved when payment is processed via the payment gateway.

(c) Outline briefly how biometric systems work and give four examples of biometric measurements that can be used to identify a person.

(d) Outline the importance of backup, recovery and business continuity procedures in an e_banking environment.

(e) Outline briefly the following electronic payment methods:

(i) E_Wallet.
(ii) Smart Card.

Posted Date: 12/3/2013 1:20:33 AM | Location : United States







Related Discussions:- Explain symmetric and asymmetric encryption system, Assignment Help, Ask Question on Explain symmetric and asymmetric encryption system, Get Answer, Expert's Help, Explain symmetric and asymmetric encryption system Discussions

Write discussion on Explain symmetric and asymmetric encryption system
Your posts are moderated
Related Questions
ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

QUESTION (a) A convex flow problem is a non linear network flow problem. Explain how a convex flow problem could be transformed into a Minimum Cost Flow problem. (b) Exp

Size of Option field of an ip datagram is 20 bytes. What is the value of HLEN? What is the value in binary?

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

what is computer network?