Different operating systems and browsers may use different terms) What can you find out about the cryptosystems and protocols in use to protect your transaction?

1. Go to three different e-commerce Web sites, e.g., Amazon.com, eBay.com, a retail store Web site, etc. Place several items in your shopping cart and go to the checkout page. When you get to the payment screen that asks for your credit card, right-click on the Web browser and select “Properties”. (Note: Different operating systems and browsers may use different terms)
What can you find out about the cryptosystems and protocols in use to protect your transaction?


Do the three sites use the same protocols? Describe each.

2. There are several passphrase generators available online. Locate three of them and try them out. What did you observe? Develop a table to compare the three of them using a minimum of three criteria of your choosing. Using a 5-point Likert scale (1 being highest; 5 being lowest) to rate your evaluation of each product in each category in the table. Discuss your results

3. Search for “software firewalls” online. Examine the various alternatives available. Develop a table to compare the functionality, cost, features, and type of protection for three of them. Using a 5-point Likert scale (1 being highest; 5 being lowest) to rate your evaluation of each product in each category in the table. Discuss your results
Note: You are not required to complete the purchase transactions.

Last Completed Projects

topic title academic level Writer delivered

Leave a Comment