Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Generally, secure websites use encryption and authentication standards to protect the confidentiality of web transactions. The more commonly used protocol for web security has been

image text in transcribed
Generally, secure websites use encryption and authentication standards to protect the confidentiality of web transactions. The more commonly used protocol for web security has been TLS, or Transport Layer Security. This technology is still commonly referred to as SSL. Web sites with addresses beginning with https use this protocol. Do you believe that https websites provide true confidentiality? Select the correct answer choice. Yes, the TSL protocol is strong enough to prevent hacking of databases and even prevent creation of hard copies with web transaction data. No, the SSL protocol can be hacked directly by simple brute force methods. The protocol is very flimsy protection from highly skilled hackers. Yes, the TSL protocol is very robust, and can indeed insure total confidentiality of web transactions. No, despite using the protocol for encryption, it does nothing to protect the record of the transaction on the vendor's' side. Do you think it is possible to guarantee the confidentiality of data on any website? Select the correct answer choice. Yes, it is possible with many different layers of encryption to ensure total confidentiality in web transactions. No, it will never be possible since there will always be a way to access the information concerning the transaction No, it is never going to be possible to maintain confidentiality since it's possible for any database to get hacked into, even with the best web protocols. O Yes, it is possible for a company to maintain complete confidentiality by using TSL

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions