INFORMATION AND COMMUNICATION TECNNOLOGY ACT, 2006 Prepared for Md. Ziaul Haque Senior Lecturer, Dept. Of Business Administration East West University Prepared by Bus-361 Sec: 6 Name | ID | 1. Md.Musrukh Ruhaim | 2010-2-10-091 | 2. MD. Tajul Islam | 2011-2-10-240 | 3. MD. Naiem Bhuiyan | 2011-2-10-110 | 4. Sunjida Haque | 2010-2-10-355 | 5. Md.Mahfuzur Rahman | 2011-1-10-049 | 6. MD. Mahmudul Hasan | 2011-1-13-060 | Date
Words: 12177 - Pages: 49
confidential data 6 Modification of Data 6 Errors in Software 6 Poor stipulation and testing 6 Repudiation 6 Solutions to E-commerce Security Risks 7 Encryption 7 Data Encryption Standard (DES) 7 RSA Public Key Algorithm 8 Digital signatures 8 Digital certificates 9 Security for Transactions 9 Secure sockets layer 10 Secure Electronic Transactions (SET) 10 Conclusions 11 INTRODUCTION Internet security is not fully understood by many.
Words: 2106 - Pages: 9
Terry Addison IAAS483 DAVENPORT UNIVERSITY ONLINE August 9, 2011 Dan Parrell, PhD Certificate of Authorship: By submitting this assignment I hereby certify that I am the author of this assignment. I understand that all coursework is governed by the University Academic Integrity Statement outlined in the DU catalog. I have not consulted or collaborated with anyone else outside of the Davenport University Online classroom environment. I understand that I may use reference material
Words: 647 - Pages: 3
Survey Paper on Secure Electronic Transaction (SET) By Contents ABSTRACT: 3 INTRODUCTION: 3 BACKGROUND 6 DESIGN AND IMPLEMENTATION 7 CONCLUSION 15 REFERENCES 16 ABSTRACT: Security of electronic exchange over unstable communication channel is a testing task that incorporates numerous discriminating areas as secure communicating channel,strong encryption procedure and trusted outsider to keep up the electronic database. The traditional systems for encryption
Words: 3019 - Pages: 13
Describing Digital Signatures By Chris LeDoux Digital signatures are electronic signatures used to authenticate the identity of the sender of a message or the signer of a document, and also possibly to insure that the original content of the message or document that has been sent is unchanged. Digital signatures are extremely convenient. They are easily transportable, cannot be imitated by an unwanted third party, and are often automatically time-stamped. The sender cannot easily deny the
Words: 705 - Pages: 3
they were given an access denied error. 9. 11. When transferring test1.txt into the test3 folder, it turned into an encrypted file. 12. 13-14. for #13, the test5.txt stayed encrypted within the test folder. 16. Operation of exporting certificate was successful. Lab 3.10E – File Access Control Using TrueCrypt 1-11. Creating the TrueCrypt container 1-4. Using the TrueCrypt container 1-2. Dismounting the TrueCrypt container Part 2 – Data Encryption Security Report In the world
Words: 1801 - Pages: 8
Because of the growing variety of certificates in use today and the growing number of certificate issues, some organizations may want to manage certificate trust and prevent users in the domain from configuring their own set of trusted root certificates. Some organizations may want to identify and distribute specific trusted root certificates to enable business scenarios where additional trust relationships are needed. Depending the circumstances you will need to have licensing applied and any
Words: 840 - Pages: 4
Define one type of cryptography and describe the security features. Asymmetric Cryptography: Digital Signatures Most of the time when we mention cryptography, or put asymmetric in front of it we are met with just plain blank stares. In the following paragraphs I will attempt to explain what it is, and give examples on its use. First an explanation of Public Key Infrastructure, or PKI. A cryptographic system uses two keys, a public key known to everyone and a private key, the private key has
Words: 589 - Pages: 3
E-Business Security Concerns The Internet can seem like an entrepreneur's dream come true. The Web offers instant access to millions of consumers around the world and the ability to set up a virtual store, which can limit start-up costs. While the Web does offer a powerful platform for launching new ventures, e-businesses are subject to a variety of unique security concerns. Ads by Google Network Security Scan Antivirus, Network Management & Asset Tracking in 10 min or less! www.gficloud
Words: 2387 - Pages: 10
1. What are some threats associated with a direct digital signature scheme? a. The scheme validation is dependent on the security of the sender’s private key, which the sender can later claim lost or stolen and that the signature was forged when trying to deny sending a particular message. b. If a private key is stolen from Bob at time t, the thief can send a message signed with Bob’s signature with a time stamp equal to or less than t. c. The need for trust between 2 participants is a potential
Words: 649 - Pages: 3