Explain symmetric and asymmetric encryption system, Computer Network Security

Question 1:

(a) Differentiate between symmetric and asymmetric encryption system.

(b) Describe how a digital signature is created.

(c) Explain briefly what SSL (secure socket layer) is and how it can be applied to e_banking services to ensure security.

(d) Explain the steps involved in a SET(Secure Electronic Transaction.

(e) In cryptography explain the following:
(i) Authentication.
(ii) Non-repudiation.
(iii) Confidentiality.
(iv) Integrity.

Question 2:

(a) Outline the main difference between a credit card and a debit card as a payment instrument.

(b) Outline the role of the credit card Gateway and list down the steps involved when payment is processed via the payment gateway.

(c) Outline briefly how biometric systems work and give four examples of biometric measurements that can be used to identify a person.

(d) Outline the importance of backup, recovery and business continuity procedures in an e_banking environment.

(e) Outline briefly the following electronic payment methods:

(i) E_Wallet.
(ii) Smart Card.

Posted Date: 12/3/2013 1:20:33 AM | Location : United States







Related Discussions:- Explain symmetric and asymmetric encryption system, Assignment Help, Ask Question on Explain symmetric and asymmetric encryption system, Get Answer, Expert's Help, Explain symmetric and asymmetric encryption system Discussions

Write discussion on Explain symmetric and asymmetric encryption system
Your posts are moderated
Related Questions
Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

Re: Website Google Ranking Hello! Hope you are doing well. I discovered some major issues in your website which might be the cause for the Google Penalties and poor search ranki

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

With explain the encryption model the help of diagram. Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encr

There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio