Hello, please find the attached assignment. If you want I can send the turnitin report. Please let me know if you have any question. Thanks
Running Head SECURITY PROTOCOL
For any transaction, an essential part is security. Organizations or Individual lose the faith
in e-commerce or e-business if the security is compromised. So, we need certain essential
properties of any transactions like Confidentiality, Integrity, Availability, Authenticity, NonRepudiability, Encryption and Auditability. So, to achieve all these security attributes for our
secure transactions or web-based e-commerce, we have some popular security protocols.
There are different security protocols used in Web-based e-commerce. SET (Secure Electronic
Transactions), HTTP Secure (Secure HTTP or S-HTTP) and SSL (Secure Socket Layer) these
are some of the security protocols used in Web-based e-commerce.
The content of information sent over the Internet could be seen by every computer
through which it passes. One’s e-mail is like a postcard that anyone can read. Not only that,
many different machines owned by many different entities handle your postcard along its way,
so sensitive e-mail and Web content need to be secured in some way. One way to ensure th...