1. Explain what is meant by encryption and describe the use of public key infrastructure (PKI) in the e-business domain.
2. Outline the main security standard and protocols used within computerized information systems domains.
3. Explain what is meant by internet misuse and fraudulent internet activity and list two examples of fraud on the internet.
1. Outline and describe the five main aspects of computer security and explain how these are dealt with in the business information systems environment.
2. Explain what is meant by authentication and describe the use of digital signatures in computer systems security.