Past Paper Discussion
Question 06 (2019)
i.) What is SET protocol? (3 marks)
Secure Electronic Transaction or SET is a system that ensures the security and integrity of electronic transactions done using credit and debit cards. secure electronic transaction protocols were responsible for blocking out the personal details of card information, thus preventing merchants, hackers, and electronic thieves from accessing consumer information
ii.) State three (03) internet banking issues (3 marks)
iii.) What is the difference between online banking and electronic banking (06 Marks)
Electronic banking, also known as electronic fund transfer (EFT), uses computer and electronic technology in place of checks and other paper transactions. EFTs are initiated through devices like cards or codes that let you, or those you authorize, access your account. (Ex. Doing transactions using debit or credit cards in the supermarket, Withdrawing money from ATM machine)
Online banking allows a user to conduct financial transactions via the Internet. Online banking is also known as Internet banking or web banking.
Online banking offers customers almost every service traditionally available through a local branch including deposits, transfers, and online bill payments. (Ex. Check balance through internet)
iv.) Briefly explain Asymmetric cryptography (public key cryptography) mechanism with its uses. (8 marks)
Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
Plaint text – the original text created by user
Cipher text – Secret code after applying public key
Public key – Computer algorithm that use to convert plain text into cipher text (Encryption)
Private key – Computer algorithm that use to convert cipher text into original text (Decryption)
Question 06 (2018)
Encryption – The process of converting plain text (User prepared message) into cipher text (Secret of code of Symbol) using the public key.
Decryption – The process of getting original text from cipher text using the private key.
2) There are six Dimensions of E- Commerce security. What are those?
Integrity - correctness of the information that has been transmitted or received or displayed on a website over the internet
Non-repudiation - assurance that anyone cannot deny the validity of transaction
Authenticity - ensure a person's identity are customer log in using a password, user name, bio metrics etc.
Confidentiality - Confidentiality refers to protecting information from being accessed by an unauthorized person on the internet
Privacy - privacy is used to control the usage of information by the customers that they have given to the merchant
Availability - Continuous availability of the data is the key to provide a better customer experience in ecommerce
3) Compare the contrast “Symmetric key encryption” and “Asymmetric key encryption” algorithms.
In Symmetric-key encryption the message is encrypted by using a key and the same key is used to decrypt the message which makes it easy to use but less secure. It also requires a safe method to transfer the key from one party to another.
Asymmetric Key Encryption is based on public and private key encryption technique. It uses two different key to encrypt and decrypt the message. It is more secure than symmetric key encryption technique but is much slower
| Symmetric | Asymmetric |
Key requirement |
|
|
Size of cipher text |
|
|
Speed of process |
|
|
Usage |
|
|
Security dimension |
|
|
4) Briefly describe “Digital Signature” and “Digital Certificate”.
The digital signature is a method of verifying the authenticity of a transaction, document or a message. It guarantees that the message is generated by the sender and is not modified by the external entity.
Digital certificate is issued by a trusted third party which proves sender’s identity to the receiver and receiver’s identity to the sender. �A digital certificate is a certificate issued by a Certificate Authority (CA) to verify the identity of the certificate holder.