Professional Documents
Culture Documents
GROUP 6
Magbanua, Jamaica
Landicho, Patricia
Mora, Justin Jared
Llegue, Jana
Mercado, Jorge Amiel
Reporter: Jorge Amiel Mercado
SECRET KEY
ENCRYPTION
In private key encryption, data is
encrypted using a single same key that
only the sender and receiver know. That
is why private key encryption is also
called Symmetric key Encryption, because
the same key is used during both the
encryption and decryption of the data.
EXAMPLE of SECRET
KEY ENCRYPTION
Implementation errors
Even if the secret key is generated securely and managed properly, implementation errors can still introduce
vulnerabilities. For example, if the encryption algorithm is not implemented correctly, it may be possible for an
attacker to exploit this weakness to decrypt data
Complexity Security
The World Wide Web is a system for exchanging information over the Internet. The Web
is constructed from specially written programs called Web servers that make
information available on the network. Other programs, called Web browsers , can be
used to access the information that is stored in the servers and to display it on the
user's screen.
Request for Request for
web page web page
Internet
Web page Web page
HTML file HTML file
TYPES OF
ELECTRONIC PAYMENT SYSTEM
Digital cash
Systems that generate a private form of currency that can be spent at e-commerce sites
Digital cash
Systems that generate a private form of currency that can be spent at e-commerce sites
Digital checking
Systems that create digital checks for e-commerce remittances and extend the
functionality of existing bank checking systems
REFERENCES
What is web security? - definition, importance & more: Proofpoint us. Proofpoint. (2023, September 19). https://www.proofpoint.com/us/threat-reference/web-security
Spafford, S. G. & G. (1999, February 4). Practical Unix & Internet Security. документация - unix.org.ua. https://docstore.mik.ua/orelly/networking/puis/ch18_01.htm
Junior, E. G. (n.d.). Unveiling the unprotected: Assessing the impact of unencrypted files. LinkedIn. https://www.linkedin.com/pulse/unveiling-unprotected-assessing-impact-unencrypted-guilherme-junior
Tobias, E. (2022, February 22). 5 common key management challenges (part 1 of 6). Ubiq. https://www.ubiqsecurity.com/5-common-key-management-challenges/
York, M. (2015, September 4). Electronic payment systems. ppt video online download. https://slideplayer.com/amp/6398076/