1. Outline and describe the main human features and characteristics measured in biometrics and suggest which are the least invasive.
2. Outline three ways that computer systems are attacked with viruses and describe two ways that e-mail borne viruses attack a computer system.
1. Describe the use of the Secure Electronic Transaction (SET) in computer systems security for internet transactions in the e-business domain.
2. What is biometrics and how is biometrics used to identify systems users and permit access to computerized systems and locations?