Question

In: Computer Science

For the below questions, write a thorough and complete response in the text box below. Go...

For the below questions, write a thorough and complete response in the text box below.

Go to a popular online e-commerce site like Amazon.com. Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select “Properties.” What can you find out about the cryptosystems and protocols in use to protect this transaction?
Repeat question 1 on a different Web site. Does this site use the same or different protocols? Describe them.
After your initial post (minimum of 300 words), reply to the posts of at least two classmates (minimum 100 words per response). You may want to address how the sites they examined are similar and/or different than the ones you looked at and any generalizations or conclusions that can be drawn.

Solutions

Expert Solution

Question: Go to a popular online e-commerce site like Amazon.com. Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select “Properties.” What can you find out about the cryptosystems and protocols in use to protect this transaction?
Repeat question 1 on a different Web site. Does this site use the same or different protocols? Describe them.
After your initial post (minimum of 300 words), reply to the posts of at least two classmates (minimum 100 words per response). You may want to address how the sites they examined are similar and/or different than the ones you looked at and any generalizations or conclusions that can be drawn.

Answer: HTTPs is Hyper Text Transfer Protocol over Secure Socket Layer that makes payment transaction securely. By default, HTTPs uses port number 80 for making connection. And this feature has been adopted in Amazon website for transaction through Credit Card mode.

The Amazon web site sets customers’ account by making two-step verification, i.e. Multi Factor Authentication. This MFA do two steps verification for accessing the account, first sign in the Amazon account with password then it sends a security code on registered mobile number that customer need to fill the received security code then can access his/her account.

Whenever do payment request through credit card, right click the existing web browser and click on Properties option which Amazon.in web site uses i.e. certified by the Hyper Text Transfer Protocol over Secured Socket Layer and it uses 128 bits symmetric encryption and its speed to flow this information is 1024 bits per second (bps) from source machine to destination machine.   

Here Amazon.in web site uses this type of connection. But whenever visit some different e-commerce web site then it is not necessary that do the same flow of action, same protocol and same connection method for completing any transaction through credit card. Basically these days, every site uses the HTTPs connection that achieved SSL (Secure Socket Layer) certification i.e. it is an industry standard in server secure protection.

For credit card payment, ISO 8585 (International Standard for Online financial transaction through Card) and some more customizable XML protocol uses under the HTTPs and VPN (Virtual Private Network) protection

The overall conclusion of above discussion is that particular protocol and format depends on the payment type and the acquirer.


Related Solutions

Write your response in the text box. If graph is required, attach image or scan of...
Write your response in the text box. If graph is required, attach image or scan of your graph using the "v" like icon in the text response box, or use the embed image icon to attach your photo/scan of your graph. Answer each prompt in one paragraph/bullet format (where asked to "list") QUESTION: Prescription drug prices in the United States are often substantially higher than in Canada, the United Kingdom and in India. Today, pharmacies in these countries fill millions...
Write a complete C program that read the text below and save the text in a...
Write a complete C program that read the text below and save the text in a new file "second.txt" with the same text written in all uppercase. "Beedle the Bard was an English wizard and author of wizarding fairytales. Beedle was born in Yorkshire, England. At some point in his life he wrote The Tales of Beedle the Bard . The only known image of Beedle is a woodcut that shows him with a "luxuriant" beard. Beedle wrote in ancient...
Answer each of the following questions by typing the answers into the Assignment text box below....
Answer each of the following questions by typing the answers into the Assignment text box below. For the predicted value of Y we will use Y-hat. 1. Sample data on exam grades (Y), hours studied (X1) and homework average (X2) was used to estimate the following regression equation: Y-hat = 60 + 5X1 + .1 X2. The mean grade was 78.5. The standard error of estimate is Se = 5.25 and the coefficient of determination is R2=.873. a. Interpret the...
Write a response to the following questions. Write you responses in complete sentences. Brief or incomplete...
Write a response to the following questions. Write you responses in complete sentences. Brief or incomplete answers will not be given credit. Responding to more than two people will ensure the highest grade in the discussion board. Responses should be more than I agree or I disagree. 1. A company's customer support division want to test to see if that wait time for a consumer to talk to a representative is under 10 minutes. The manager proposes to test one...
Answer the following questions, please be thorough in your response. 1. Give an example of a...
Answer the following questions, please be thorough in your response. 1. Give an example of a positive and negative externality and what regulations the government would use to correct the negative externality? 2. Choose a product protected by intellectual property rights. Discuss the advantages and disadvantages of that product being protected
My question below Write a complete program that performs encryption/decryption of a text file. Encryption means...
My question below Write a complete program that performs encryption/decryption of a text file. Encryption means you need to scramble the words of a file to become secure. Decryption means you need to apply some rules to an encrypted file in order to find the original file with its original content. An example of encryption is to replace each letter in a file with its consecutive letter in the alphabet. Therefore, ‘a’ is replaced by ‘b’, ‘b’ is replaced by...
Use the correlation section of the PDF instructions provided. Do a complete and thorough write up...
Use the correlation section of the PDF instructions provided. Do a complete and thorough write up on the following correlation analysis. The variable Stay represents the average length of stay in days at a sample of hospitals across the country. Age is the average age of patients. Culture is a measure of the level of understanding of the importance of each employee in helping patients get well. Correlations Stay Age Culture Stay Pearson Correlation 1 .189* .327** Sig. (2-tailed) .045...
Answer the following questions, please be thorough in your response. 1.Why do you think that moral...
Answer the following questions, please be thorough in your response. 1.Why do you think that moral hazard exists in insurance markets and how can it be reduced? 2 Discuss an example of market failure and whether the government has been effective in implementing policies to correct it. 3 Give an example of a positive and negative externality and what regulations the government would use to correct the negative externality? 4 Choose a product protected by intellectual property rights. Discuss the...
write your 200-word response to the questions below. What makes a great grocery store in your...
write your 200-word response to the questions below. What makes a great grocery store in your opinion? Ask your family/friends what they think and then describe your findings. What do you think you could apply to opening up your own retail establishment and why?
Write a complete Python program that asks the user for a line of text (not just...
Write a complete Python program that asks the user for a line of text (not just a single word), and then tells the user whether the string is a palindrome (same forward and backward) if you ignore case and non-alphabetic characters. The following methods and functions may be useful: str.upper(), str.isalpha() -> bool, reversed(str) -> sequence, str.find(str) -> int, str.replace(str, str), str.center(int). Unless otherwise specified, they all return a string.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT