Page 89 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 89

E-Commerce and E-Business



                                  (i)  Receiver    (ii) Sender  (iii) Merchant      (iv) Cash issuing bank
                              (e)  Which of the following issues the public keys?
                                  (i)  Certification Authorities      (ii) Banks     (iii) Payment gateway      (iv) Online merchant

                          6.7   Review Questions
                          1.  “PGP protocol is widely used when compared  to MOSS protocol for secured communication.”
                              Discuss.
                          2.  “Are e-commerce systems safe for engaging in online transactions?” Analyze.
                          3.  “SET protocol is  considered as the  secure protocol for transactions involving credit cards.”
                              Discuss.
                          4.  “Privacy Enhanced Mail is not compatible to handle MIME messages.” Analyze.
                          5.  “Attacking an application that uses Oracle as  back-end is  very difficult when compared to
                              attacking an application that uses SQL server.” Comment.
                          6.  “Is encrypting information in stream cipher mode better than block cipher mode?” Validate with
                              appropriate examples.
                          7.  “The technique of generating  checksum from the transmitted  information and rechecking the
                              same at the receiving provides better data integrity.” Explain.
                          8.  “Why do Web applications set the user password to be at least six characters long?” Comment.
                          9.  “Is  it possible to create a  Web application that overcomes the buffer overflow  vulnerability?”
                              Comment.
                          10.  “The MOSS  protocol  is not based on any security standard for establishing secured
                              communication.” Discuss.
                          11.  “Symmetric cryptosystems are better than asymmetric cryptosystems as they are capable of
                              handling data of any size.” Analyze.
                          12.  “Are money transactions carried out by using paper documents safer than online transactions?”
                              Discuss.
                          Answers: Self Assessment

                          1.  (a) T         (b) F       (c) F       (d) T      (e) F      (f) F
                          2.  (a) SQL injection   (b) HTML hidden     (c) Block Cipher      (d) Secret Key  (e) Hash
                          3.  (a) MOSS    (b) Availability  (c) Encryption  (d) Sender  (e) Certification authorities
                          6.8   Further Readings


                                      Bajaj, K K. and Nag, De. (2005). E-Commerce: The Cutting Edge of Business, 2 nd  ed. New
                                      Delhi: Tata McGraw-Hill.

                                      Joseph, P.T. (2008). E-Commerce – An Indian Perspective, 3 rd  ed. New Delhi: PHI
                                      Learning Private Limited.


                                      http://download.oracle.com/javase/1.5.0/docs/guide/security/cert3.html
                                      http://tools.ietf.org/html/rfc1422
                                      http://www.ehow.com/about_6748970_set-protocol_.html









                          82                  LOVELY PROFESSIONAL UNIVERSITY
   84   85   86   87   88   89   90   91   92   93   94