B2B Vs B2C: 2. Discuss About Public & Private Key Encryptions
B2B Vs B2C: 2. Discuss About Public & Private Key Encryptions
B2B Vs B2C: 2. Discuss About Public & Private Key Encryptions
B2B vs B2C
The main difference between a public and a private key is their use. The public key
, as its name implies, is public and open to anyone in the system. The public key is
used to encrypt data.
The private key however is private. It is only ever stored on user’s device. The
private key is used to decrypt data.
Public key is used to convert the message to an unreadable form. Private key is
used to convert the received message back to the original message. Both these keys
help to ensure the security of the exchanged data. A message encrypted with the
public key cannot be decrypted without using the corresponding private key.
3. Define E-auction
HTML (Hypertext Markup Language) is the code that is used to structure a web
page and its content. For example, content could be structured within a set of
paragraphs, a list of bulleted points, or using images and data tables.
5. Define E logistics
E- commerce logistics are the activities that ensures that customers get what they
need at right time at right place and at minimum cost. E-commerce logistics face
many challenges in developing countries like higher tariffs, Complicated global
trade rules, Global Terrorism and Geographical Barriers. The lack of knowledge of
total cost in online merchant is the main cause for the failure of many electronic
commerce in past decades.
The difference between traditional logistics and e- logistics are as follows. In case
of traditional logistics the volume is very low because large amounts of goods are
sent to lesser location like retail stores. But in case of e- logistics the lesser amount
of materials are sent to many customers quickly. In case of traditional logistics the
objective is that it is efficient and cost effective but in case of e- logistics it is more
speed and can meet customer expectation.In case of traditional logistics the
information is gathered through fax, paperwork and Management Information
System(MIS) but in case of e- logistics the information is gathered through
Internet, Electronic Data Interchange (EDI), Radio Frequency Identification
(RFID) and Integrated IS. The E- logistics is more reliable and fast than traditional
logistics.
6. What is ethical hacking?
Ethical hacking and ethical hacker are terms used to describe hacking performed
by a company or individual to help identify potential threats on a computer or
network. An ethical hacker attempts to bypass system security and search for any
weak points that could be exploited by malicious hackers.