Discuss some security issues involved in executing transactions over the Internet.

What will be an ideal response?


An intruder can eavesdrop on messages, change messages, pretend to be someone else, send false messages.
An intruder can read/change the database information on a server, read/change the information on your browser, deny service by sending a large number of messages to a server.

Computer Science & Information Technology

You might also like to view...

Which of the following creates a blue circle centered at X = 50, Y = 50 with a radius of 50?

a. Circle blueCircle = new Circle(50, 50, 50); blueCircle.setFill(Color.BLUE); b. Circle blueCircle = new Circle(50, 50); blueCircle.setStroke(Color.BLUE); c. Circle blueCircle = new Circle(50, 50, 50, Color.BLUE); d. Circle blueCircle = new blueCircle(50); blueCircle.setColor(BLUE);

Computer Science & Information Technology

An element declaration can specify which of the following?

A. an element's name B. what kind of content the element can contain C. the order in which elements appear in the document D. all of the above

Computer Science & Information Technology

A brownie is a message used to keep track of the pages you view at a site, the merchandise you select, and other profile information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Windows 2000 __________ provides a global catalog that allows users to find any object for which they have access rights.

a. Active Directory b. domain tree c. Common Internet File System d. Distributed file system

Computer Science & Information Technology