Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

B2B Vs B2C: 2. Discuss About Public & Private Key Encryptions

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

1.

B2B vs B2C

2. Discuss about Public & Private Key Encryptions.

Public-key cryptography, or asymmetric cryptography, is a cryptographic


system that uses pairs of keys: public keys, which may be disseminated widely,
and private keys,which are known only to the owner. The generation of such keys
depends on cryptographic algorithms based on mathematical problems to
produce one-way functions. Effective security only requires keeping the private
key private; the public key can be openly distributed without compromising
security.

Public key vs. private key

The main difference between a public and a private key is their use. The public key
, as its name implies, is public and open to anyone in the system. The public key is
used to encrypt data.

The private key however is private. It is only ever stored on user’s device. The
private key is used to decrypt data.

Public key is used to convert the message to an unreadable form. Private key is
used to convert the received message back to the original message. Both these keys
help to ensure the security of the exchanged data. A message encrypted with the
public key cannot be decrypted without using the corresponding private key.

3. Define E-auction

An online auction (also electronic auction or E-Auction or e-auction or e Auction)


is an auction which is held over the internet. The scope and reach of these auctions
have been propelled by the Internet to a level beyond what the initial purveyors
had anticipated. This is mainly because online auctions break down and remove the
physical limitations of traditional auctions such as geography, presence, time,
space, and a small target audience. This influx in reachability has also made it
easier to commit unlawful actions within an auction. In 2002, online auctions were
projected to account for 30% of all online e-commerce due to the rapid expansion
of the popularity of the form of electronic commerce. Online auctions include
business to business (B2B), business to consumer (B2C), and consumer to
consumer (C2C) auctions.
4. What are the uses of HTML?

HTML (Hypertext Markup Language) is the code that is used to structure a web
page and its content. For example, content could be structured within a set of
paragraphs, a list of bulleted points, or using images and data tables.

HTML is not a programming language; it is a markup language that defines the


structure of your content. HTML consists of a series of elements, which you use to
enclose, or wrap, different parts of the content to make it appear a certain way, or
act a certain way. The enclosing tags can make a word or image hyperlink to
somewhere else, can italicize words, can make the font bigger or smaller, and so
on.

5. Define E logistics

E- commerce logistics are the activities that ensures that customers get what they
need at right time at right place and at minimum cost. E-commerce logistics face
many challenges in developing countries like higher tariffs, Complicated global
trade rules, Global Terrorism and Geographical Barriers. The lack of knowledge of
total cost in online merchant is the main cause for the failure of many electronic
commerce in past decades.

The difference between traditional logistics and e- logistics are as follows. In case
of traditional logistics the volume is very low because large amounts of goods are
sent to lesser location like retail stores. But in case of e- logistics the lesser amount
of materials are sent to many customers quickly. In case of traditional logistics the
objective is that it is efficient and cost effective but in case of e- logistics it is more
speed and can meet customer expectation.In case of traditional logistics the
information is gathered through fax, paperwork and Management Information
System(MIS) but in case of e- logistics the information is gathered through
Internet, Electronic Data Interchange (EDI), Radio Frequency Identification
(RFID) and Integrated IS. The E- logistics is more reliable and fast than traditional
logistics.
6. What is ethical hacking?

Ethical hacking and ethical hacker are terms used to describe hacking performed
by a company or individual to help identify potential threats on a computer or
network. An ethical hacker attempts to bypass system security and search for any
weak points that could be exploited by malicious hackers.

Ethical Hacking sometimes called as Penetration Testing is an act of


intruding/penetrating into system or networks to find out threats, vulnerabilities in
those systems which a malicious attacker may find and exploit causing loss of data,
financial loss or other major damages. The purpose of ethical hacking is to
improve the security of the network or systems by fixing the vulnerabilities found
during testing. Ethical hackers may use the same methods and tools used by the
malicious hackers but with the permission of the authorized person for the purpose
of improving the security and defending the systems from attacks by malicious
users.
Ethical hackers are expected to report all the vulnerabilities and weakness found
during the process to the management.

You might also like