Public-key Cryptography and E-commerce

Only available on StudyMode
  • Download(s) : 2029
  • Published : March 25, 2011
Open Document
Text Preview
13.1 13.2 Define E-commerce. What are the different types of E-commerce? Explain B2B E-Commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers. Assume that the distributor has stocks of books of a large number of publishers and book sellers order books as and when their stock is low. Distributors give 1 month's time to booksellers for payment. 13.3 Explain B2C E-Commerce of a customer reserving airline tickets from his home or place of work. 13.4 13.5 13.6 Explain C2C E-Commerce with an appropriate example. List the advantages and disadvantages of E-Commerce Explain the system architecture of E-Commerce by looking at it as a set of layers with the physical network at the bottom layer and applications at the top layer. 13.7 13.8 Define internet. Why is internet important in E-Commerce? What do you understand by EDI? Is EDI used in B2C or B2B E-Commerce? Why is EDI important in E-Commerce? 13.9 What are two major EDI standards used in E-Commerce? Which is the standard accepted for Government transactions in India? 13.10 What is VAN? What services do VANs provide? What are the advantages and disadvantages of VAN? 13.11 13.12 If internet is to be used for EDI which mail standard is used? If email is to be used to exchange EDI between two businesses what are the

points on which they should agree? 13.13 Why is security important in E-Commerce? What are the security issues to be taken into account while designing a security system for E-Commerce? 13.14 13.15 13.16 13.17 What is a firewall? What are the functions of a firewall? What is packet screening? Which hardware device performs packet screening? What is a proxy application gateway? What are the functions of this gateway? What is a hardened firewall host? What are its functions? In what way is it different from proxy application gateway? 13.18 Given a plain text: THIS IS A SAMPLE SENTENCE FOR ENCRYPTION. Apply the...
tracking img