Explain symmetric and asymmetric encryption system, Computer Network Security

Assignment Help:

Question 1:

(a) Differentiate between symmetric and asymmetric encryption system.

(b) Describe how a digital signature is created.

(c) Explain briefly what SSL (secure socket layer) is and how it can be applied to e_banking services to ensure security.

(d) Explain the steps involved in a SET(Secure Electronic Transaction.

(e) In cryptography explain the following:
(i) Authentication.
(ii) Non-repudiation.
(iii) Confidentiality.
(iv) Integrity.

Question 2:

(a) Outline the main difference between a credit card and a debit card as a payment instrument.

(b) Outline the role of the credit card Gateway and list down the steps involved when payment is processed via the payment gateway.

(c) Outline briefly how biometric systems work and give four examples of biometric measurements that can be used to identify a person.

(d) Outline the importance of backup, recovery and business continuity procedures in an e_banking environment.

(e) Outline briefly the following electronic payment methods:

(i) E_Wallet.
(ii) Smart Card.


Related Discussions:- Explain symmetric and asymmetric encryption system

Develop firewall rules based on a fictitious organisation, Question requir...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Explain the random key distribution, Q. Explain the random key distribution...

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Marketing, what are the participant of marketing channal?

what are the participant of marketing channal?

Host-based ids, Host-Based IDS A host-based IDS (HIDS) resides on a part...

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Uc, every time i connect to WIFI the UC goes directly to 100% then i doesn'...

every time i connect to WIFI the UC goes directly to 100% then i doesn''t want to come down. what shall i do ?

How will network datagrams be protected at network layer, (a) Consider the...

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

Military and space technology, crack the secret message and explain how the...

crack the secret message and explain how the code works. The clue is that it has something to do with the computer keyboard. J-Q-H-6 Q-E-F-Q-H-D-3-W 8-H 5-Y-3 7-W-3 9-R--D-9-J

Enterprise information security policy (eisp), Enterprise Information Secur...

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Http protocol, Question (a) Name 3 popular electronic mail access prot...

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd