E-Business Security Principles

ConciliatoryAphorism avatar
ConciliatoryAphorism
·
·
Download

Start Quiz

Study Flashcards

10 Questions

Asymmetric encryption, or public-key encryption, encodes messages by using two mathematically related numeric keys: a ______ key and a private key.

public

Symmetric encryption, or private-key encryption, the message is encrypted and decrypted by using the same ______.

key

MD5 accepts as input a string (series of characters) of any length and produces a 128-bit fixed-length digest ______.

value

The SSL encrypts and decrypts information flowing between the two ______.

computers

Data warehouses are designed to facilitate reporting and analysis, and provide decision support solutions that run faster and are more ______.

accurate

Encryption is the coding of information by a mathematically based program and a ______ key to produce a string of characters that is unintelligible.

secret

E-business Security refers to the principles which guide safe electronic transactions, allowing the buying and selling of goods and services through the internet, but with protocols in place to provide ______ for those involved.

safety

Confidentiality: Most of the information is not confidential. However, the credit card number certainly is. All of the information is confidential and must be protected in ______.

transmission

The customer will want to have integrity in the order so that he gets what he wants. Need to guarantee the integrity of the catalog so that the price in the catalog is the price that is paid for the ______.

item

The organization will need to make sure that the person using the credit card is the owner of the card. The organization will need to have some form of identification and authentication so that only subscribers can view the ______.

information

Explore the principles guiding safe electronic transactions in e-commerce and the protocols in place to provide safety for those involved. This quiz covers topics such as confidentiality, integrity, authentication, and non-repudiation in e-business security.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser