E-Business Security Principles
10 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Asymmetric encryption, or public-key encryption, encodes messages by using two mathematically related numeric keys: a ______ key and a private key.

public

Symmetric encryption, or private-key encryption, the message is encrypted and decrypted by using the same ______.

key

MD5 accepts as input a string (series of characters) of any length and produces a 128-bit fixed-length digest ______.

value

The SSL encrypts and decrypts information flowing between the two ______.

<p>computers</p> Signup and view all the answers

Data warehouses are designed to facilitate reporting and analysis, and provide decision support solutions that run faster and are more ______.

<p>accurate</p> Signup and view all the answers

Encryption is the coding of information by a mathematically based program and a ______ key to produce a string of characters that is unintelligible.

<p>secret</p> Signup and view all the answers

E-business Security refers to the principles which guide safe electronic transactions, allowing the buying and selling of goods and services through the internet, but with protocols in place to provide ______ for those involved.

<p>safety</p> Signup and view all the answers

Confidentiality: Most of the information is not confidential. However, the credit card number certainly is. All of the information is confidential and must be protected in ______.

<p>transmission</p> Signup and view all the answers

The customer will want to have integrity in the order so that he gets what he wants. Need to guarantee the integrity of the catalog so that the price in the catalog is the price that is paid for the ______.

<p>item</p> Signup and view all the answers

The organization will need to make sure that the person using the credit card is the owner of the card. The organization will need to have some form of identification and authentication so that only subscribers can view the ______.

<p>information</p> Signup and view all the answers

More Like This

E-commerce 2020-2021 Chapter 4 Quiz
16 questions
E-commerce Security and Legal Aspects Quiz
12 questions
e-Business and e-Commerce Concepts
26 questions
E-commerce Basics and Business Models
5 questions
Use Quizgecko on...
Browser
Browser