![Ism 4480 Exam 3 Study Guide](https://data.docslib.org/img/3a60ab92a6e30910dab9bd827208bcff-1.webp)
<p> ISM 4480 EXAM 3 STUDY GUIDE</p><p>Exam 3 is a 100 point exam. It consists of MC, short-answer, and essay questions. Questions will be taken from Chapters 9-12, lectures, quizzes, and class discussions.</p><p>Know the following terms: catalogue, shopping cart, middleware, virus, Trojan horse, worm, backdoor, Bluetooth, Bluespike, ASP, JSP, sandbox, sniffer, spoofer, Anonymizer, message digest.</p><p>Why is the checkout process critical for B2C sites?</p><p>What approaches help to overcome the stateless system problem?</p><p>What is ERP? what does it do? how is it integrated with Web servers?</p><p>What is data mining? How does it differ from data analysis (or OLAP)?</p><p>With what back-office systems do e-commerce systems interact?</p><p>What is an application server?</p><p>When does transaction processing take place? What activities are involved? Why should it be on a separate server?</p><p>Differentiate between various types of firewalls including gateway servers, proxy servers, application firewalls, packet-filtering firewalls.</p><p>What are the primary forms of electronic cash?</p><p>Identify e-commerce software for small, medium, and large businesses. What are the main differences between them other than price?</p><p>What are some free or low-cost hosting services?</p><p>Define all three of the following threats: Integrity, Necessity, and Secrecy.</p><p>How does privacy differ from secrecy?</p><p>What is a denial of service attack? What are zombies?</p><p>Understand each of the following and its characteristics: public key encryption, private key encryption, and hash coding. How is a digital signature created?</p><p>What is necessary to protect integrity? authenticity? non-repudiation?</p><p>How are the following protocols different from one another: SSL, S-HTTP, and SET.</p><p>What is the difference between an untrusted applet, a trusted applet, and a signed applet?</p><p>What is ActiveX and what problems could be associated with it? What are the different ways that support communication between Web servers and databases?</p><p>What two factors determine encryption strength?</p><p>What is RSA? 3DES? MD5? Why may DES be preferred to RSA, particularly for large messages?</p><p>What is steganography? digital watermarking? How can they be used to support secrecy and protect intellectual property?</p><p>What is meant by the term ‘computer forensics?’</p><p>What is a smart card? What is Mondex?</p><p>What are the characteristics of electronic cash? What potential problems does e-cash pose?</p><p>What is the highest wireless security standard?</p><p>What standard would allow customers to enter data only once, simplifying the form-filling process?</p><p>What is the W3C? CERT? WIPO?</p><p>What are the advantages of electronic cash? Where can e-cash be stored? </p><p>What low-cost service offers data-mining capability?</p><p>Who (or what) is VeriSign and what services do they offer?</p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages2 Page
-
File Size-