Page 89 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 89
E-Commerce and E-Business
(i) Receiver (ii) Sender (iii) Merchant (iv) Cash issuing bank
(e) Which of the following issues the public keys?
(i) Certification Authorities (ii) Banks (iii) Payment gateway (iv) Online merchant
6.7 Review Questions
1. “PGP protocol is widely used when compared to MOSS protocol for secured communication.”
Discuss.
2. “Are e-commerce systems safe for engaging in online transactions?” Analyze.
3. “SET protocol is considered as the secure protocol for transactions involving credit cards.”
Discuss.
4. “Privacy Enhanced Mail is not compatible to handle MIME messages.” Analyze.
5. “Attacking an application that uses Oracle as back-end is very difficult when compared to
attacking an application that uses SQL server.” Comment.
6. “Is encrypting information in stream cipher mode better than block cipher mode?” Validate with
appropriate examples.
7. “The technique of generating checksum from the transmitted information and rechecking the
same at the receiving provides better data integrity.” Explain.
8. “Why do Web applications set the user password to be at least six characters long?” Comment.
9. “Is it possible to create a Web application that overcomes the buffer overflow vulnerability?”
Comment.
10. “The MOSS protocol is not based on any security standard for establishing secured
communication.” Discuss.
11. “Symmetric cryptosystems are better than asymmetric cryptosystems as they are capable of
handling data of any size.” Analyze.
12. “Are money transactions carried out by using paper documents safer than online transactions?”
Discuss.
Answers: Self Assessment
1. (a) T (b) F (c) F (d) T (e) F (f) F
2. (a) SQL injection (b) HTML hidden (c) Block Cipher (d) Secret Key (e) Hash
3. (a) MOSS (b) Availability (c) Encryption (d) Sender (e) Certification authorities
6.8 Further Readings
Bajaj, K K. and Nag, De. (2005). E-Commerce: The Cutting Edge of Business, 2 nd ed. New
Delhi: Tata McGraw-Hill.
Joseph, P.T. (2008). E-Commerce – An Indian Perspective, 3 rd ed. New Delhi: PHI
Learning Private Limited.
http://download.oracle.com/javase/1.5.0/docs/guide/security/cert3.html
http://tools.ietf.org/html/rfc1422
http://www.ehow.com/about_6748970_set-protocol_.html
82 LOVELY PROFESSIONAL UNIVERSITY