Skip to main content

Posts

Showing posts with the label lecture notes E-commerce
  E-Commerce (Assignment) 1. What is the future of Indian E-commerce? 2. What are the key drivers for Indian e-commerce? 3. Case Studies Retail,Travel,Auctions. 4. Advantage and Disadvantages of E-commerce? 5. What are the enablers of Indian e-commerce?

PUBLIC KEY INFRASTRUCTURE

PUBLIC KEY INFRASTRUCTURE A public key infrastructure (PKI) supports the ·        Distribution and identification of public encryption keys ·        Enables users and computers to exchange data over networks   ·        Verify the identity of the other party ·        Enables people and businesses to utilize a number of secure Internet applications. For example, secure and legally binding emails and Internet based transactions, and services delivery can all be achieved through the use of PKI Key Elements of PKI:- A trusted party( certificate authority (CA) )- act as a root of trust and provides services that authenticate the identity of individuals, computers and other entities A registration authority (subordinate CA)- certified by a root CA to issue certificates for specific uses permitted by the ro...

ARRAY vs ARRAYLIST

ARRAY vs ARRAYLIST Array is an object used to save similar data type elements and its size is limited . Array is static in nature. Once created we cannot change size of array. ·        Random access, linear data structure ·        Fixed size once created ·        Can contain objects and primitives ·        Must declare element type ·        It is not a class ·        Elements accessible with index number Eg: int[] ar=new int[3]; //stores complete integer types Arraylist is a part of Collection Framework of util package to store different data type objects and it is growable . Arraylist is dynamic in nature. It can be re-size itself when needed depending upon capacity and load factor. ·        Random access, linear data structure · ...

Key Dimensions of Security

Key Dimensions   ·          Integrity: Ability to ensure that information being displayed on a web site or transmitted/received over the Internet has not been altered in any way by an unauthorized party. Content should be unaltered. ·          Non repudiation: Ability to ensure that e-commerce participants do deny (repudiate) online auctions. Eg: Phishing(cloning of a website) occurs for online web portals of banks.  ·          Authenticity: Ability to identify the identity of a person or entity with whom you are dealing on the Internet. ·          Confidentiality : Ability to ensure that messages and data are available only to those authorized users to view them. ·          Privacy: Ability to control use of information a customer p...