Top Menu

  • Home
  • Blog
  • Contact us

Main Menu

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Sign in / Join

Login

Welcome! Login in to your account
Lost your password?

Lost Password

Back to login
  • Home
  • Blog
  • Contact us
Nerd Tutorials

Nerd Tutorials

  • Home
  • Cryptography
  • E-Commerce
  • Cloud computing
Home›Category: "E-Commerce"

E-Commerce

  • E-commerce Payment Systems - Slide points

    E-Commerce
    November 24, 2020
    by remshad
    Slide 2:Introduction Slide 3:Types of Payment Systems ■ Cash■ Checking Transfer■ Credit Card■ Stored Value■ Accumulating Balance Slide 4:Cash slide 5:Checking Transfer slide 6:Most Common Payment Systems, Based on Number ...
    Read More
  • Security and Encryption - module 3 - slide points

    E-Commerce
    November 24, 2020
    by remshad
    slide 2: The E-commerce Security Environment: The Scope of the Problem slide 3:What Is Good E-commerce Security? slide4:The E-commerce Security Environment slide 5:Dimensions of E-commerce Security slide 6:Customer and Merchant ...
    Read More
  • Discuss briefly the threats in E-Commence environment due to malicious code.

    E-Commerce
    November 23, 2020
    by remshad
    THE most Security Threats in the E-commerce Environments are ▪ Malicious code▪ Phishing▪ Hacking and cybervandalism▪ Credit card fraud/theft▪ Spoofing (pharming)▪ Denial of service attacks▪ Sniffing▪ Insider jobs▪ Poorly designed ...
    Read More
  • Briefly discuss the concept of digital envelop with a neat diagram.

    E-Commerce
    November 23, 2020
    by remshad
    A digital envelope is a secure electronic data container that is used to protect a message through encryption and data authentication. A digital envelope allows users to encrypt data with the speed of secret key encryption ...
    Read More
  • What do you mean by phishing and pharming?

    E-Commerce
    November 23, 2020
    by remshad
    Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive ...
    Read More
  • What are the limitations of online credit card payment?

    E-Commerce
    November 23, 2020
    by remshad
    credit card is plastic money issued by banks and credit card companies, which allows you to spend now and pay later. Limitations of Online Credit Card Payment Systems ■Security: neither ...
    Read More
  • Explain about credit card E-Commerce Enablers.

    E-Commerce
    November 23, 2020
    by remshad
    Credit Card E-commerce Enablers Companies that have a merchant account still need to buy or build a means of handling the online transaction; securing the merchant account is only step ...
    Read More
  • What do you mean by white hats, black hats and gray hats on the basis ...

    E-Commerce
    November 23, 2020
    by remshad
    Hacker is an Individual who intends to gain unauthorized access to computer systems , classification of hacker ▪ White hats▪ Black hats▪ Grey hats White hats ■ “good” hackers who ...
    Read More
  • Write short notes on firewalls, proxy servers and intrusion detection systems with diagrams?

    E-Commerce
    November 23, 2020
    by remshad
    Firewall: ■The firewall controls traffic to and from servers and clients, forbidding communications from untrustworthy sources, and allowing other communications from trusted sources to proceed. ■firewall is Hardware or software ...
    Read More
  • List down and explain the dimensions of Ecommerce security achieved by encryption?

    E-Commerce
    November 23, 2020
    by remshad
    An ecommerce website must protect its assets from unauthorized access, use, alteration, or destruction. It requires a reliable infrastructure and framework to enable a secure and successful ecommerce business Six Dimensions of Ecommerce Security  ■ Integrity: ...
    Read More
1 2 →

Recent Posts

  • Explain the requirements of Public key cryptography?
  • State Fermat’s Theorem. Find out the result of 3^12 mod 11 using second version of Fermat’s Theorem.
  • What is ransomware?
  • Text Pre-Processing to Latent Semantic Indexing
  • Information Retrieval and Web Search

Recent Comments

  • sanu on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?
  • a on With the help of a block diagram explain the RSA algorithm for digital signature ?

Categories

  • cloud computing
  • Cryptography
  • E-Commerce
  • module 1
  • module 2
  • module 3
  • Python
  • web datamining
  • Home
  • Blog
  • Contact us
© Copyright Nerd Tutorials. All rights reserved.