14188-37032_Ch10_Solutions

14188-37032_Ch10_Solutions - Electronic Commerce, 7th...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Electronic Commerce, 7th Edition Solutions 10-1 Electronic Commerce, 7th Edition 14188-37032 Chapter 10 Solutions Review Questions 1. In about 200 words, explain why Web sites use cookies. In your answer, discuss the reasons that cookies were first devised and explain where cookies are stored. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should include references to shopping carts. Since cookies contain text data, they can help with the statelessness of the Internet. 2. In about 100 words, describe steganography and explain its connection to the topic of online security. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should mention that this involves hiding information within another piece of information. 3. In about 200 words, explain the differences between public-key encryption and private-key encryption. List advantages and disadvantages of each encryption method. Explain which method you would use for e-mail sent from a field sales office to corporate headquarters. Assume that the e-mail regularly includes highly confidential information about upcoming sales opportunities. Answer: Responses will vary but should mention that public-key encryption, encodes messages by using two mathematically related numeric keys. Private-key encryption, encodes a message with one of several available algorithms that use a single numeric key, such as 456839420783, to encode and decode data. 4. In about 300 words, describe the security threats that a company could face if it implements a wireless network. Assume that the company occupies the six middle floors in a 12-story office building that is located in a downtown business area between two other buildings of similar height. Briefly explain how the company could reduce the risks it faces. Answer: Responses will vary, but should include a note about WEP (wireless encryption protocol). Other mentions include wardrivers and warchalking, people that drive around with wireless laptops and monitor high-rise buildings for signals.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Electronic Commerce, 7th Edition Solutions 10-2 5. Consider the reasons that programs such as Java applets that run on client machines are considered security threats. In about 200 words, explain how these programs could breach security. In your answer, be sure to compare
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/30/2010 for the course CME EA2943 taught by Professor Chen during the Spring '10 term at Nanjing University.

Page1 / 4

14188-37032_Ch10_Solutions - Electronic Commerce, 7th...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online