Go to a popular online e-commerce site like Amazon.com. Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select “Properties.” What can you find out about the cryptosystems and protocols in use to protect this transaction? Do you think these are sufficient? Why or why not? Support your answers with information and examples from your text and your experiences in Ministry of Interior and three or four citing articale.
Principles of Information Security 6th Edition
by Michael E. Whitman (Author), Herbert J. Mattord (Author)