Describe the use of the Secure Electronic Transaction (SET) in computer systems security for internet transactions in the e-business domain.

1. Outline and describe the main human features and characteristics measured in biometrics and suggest which are the least invasive.

2. Outline three ways that computer systems are attacked with viruses and describe two ways that e-mail borne viruses attack a computer system.

 

1. Describe the use of the Secure Electronic Transaction (SET) in computer systems security for internet transactions in the e-business domain.

2. What is biometrics and how is biometrics used to identify systems users and permit access to computerized systems and locations?

Solution:

Looking for help with your homework?
Grab a 30% Discount and Get your paper done!

30% OFF
Turnitin Report
Formatting
Title Page
Citation
Place an Order

Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -