Suppose that you obtained a certificate of your own. Explain how you could use that certificate to deal with situations in which an intruder might steal your credit card number.

What will be an ideal response?


You use a protocol that requires that a merchant accept a credit card only if it comes with a certificate and that the credit card number is always encrypted with your private key. Thus only you, and not an intruder, could have sent it. Effectively, you are signing your credit card number.

Computer Science & Information Technology

You might also like to view...

A(n) ________ is an assignment of time for which you do not have to schedule resources such as rooms

Fill in the blank(s) with correct word

Computer Science & Information Technology

One way to control access to workbooks on a server is to use ____.

A. passwords B. interactive worksheets C. PivotTable lists D. routing

Computer Science & Information Technology

What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?

a. OC-3 b. OC-12 c. OC-48 d. OC-96

Computer Science & Information Technology

A(n) __________ is any device that prevents a specific type of information from moving between an untrusted network and a trusted network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology