Suppose that you obtained a certificate of your own. Explain how you could use that certificate to deal with situations in which an intruder might steal your credit card number.
What will be an ideal response?
You use a protocol that requires that a merchant accept a credit card only if it comes with a certificate and that the credit card number is always encrypted with your private key. Thus only you, and not an intruder, could have sent it. Effectively, you are signing your credit card number.
You might also like to view...
A(n) ________ is an assignment of time for which you do not have to schedule resources such as rooms
Fill in the blank(s) with correct word
One way to control access to workbooks on a server is to use ____.
A. passwords B. interactive worksheets C. PivotTable lists D. routing
What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?
a. OC-3 b. OC-12 c. OC-48 d. OC-96
A(n) __________ is any device that prevents a specific type of information from moving between an untrusted network and a trusted network.
Fill in the blank(s) with the appropriate word(s).