This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Business model of Facebook What is social operating system and why Google is wary of Facebook PAYMENT SYSTEMS Desired property of money Differences between Fiduciary vs. Scriptural money In table 5.6, study the financial risk, merchant risk, float, anonymity, authentication, refutability for credit card, cash, personal check and debit card digital cash How Paypal works, its business models, strategy and competitors E-SECURITY Six dimensions of e-security The three points of vulnerability in e-commerce environment Trojan horse, worm The 3 types of viruses Spyware and Adware The 3 types of hackers social engineering & phishing Denial of service Difference between secret key and public key encryption Limitations of secret key encryption and public key encryption Hash digest, digital signatures, and digital envelop (see the "formulas") Certificate Authority (CA) limitations of PKI Format of the exam There are 60 MC questions and some short essay questions....
View Full Document
- Spring '09
- Auction, Public-key cryptography, lament Shill bidding