Question: Generally, secure websites use encryption and authentication standards to protect the confidentiality of web transactions. The more commonly used protocol for web security has been

 Generally, secure websites use encryption and authentication standards to protect the

Generally, secure websites use encryption and authentication standards to protect the confidentiality of web transactions. The more commonly used protocol for web security has been TLS, or Transport Layer Security. This technology is still commonly referred to as SSL. Web sites with addresses beginning with https use this protocol. Do you believe that https websites provide true confidentiality? Select the correct answer choice. Yes, the TSL protocol is strong enough to prevent hacking of databases and even prevent creation of hard copies with web transaction data. No, the SSL protocol can be hacked directly by simple brute force methods. The protocol is very flimsy protection from highly skilled hackers. Yes, the TSL protocol is very robust, and can indeed insure total confidentiality of web transactions. No, despite using the protocol for encryption, it does nothing to protect the record of the transaction on the vendor's' side. Do you think it is possible to guarantee the confidentiality of data on any website? Select the correct answer choice. Yes, it is possible with many different layers of encryption to ensure total confidentiality in web transactions. No, it will never be possible since there will always be a way to access the information concerning the transaction No, it is never going to be possible to maintain confidentiality since it's possible for any database to get hacked into, even with the best web protocols. O Yes, it is possible for a company to maintain complete confidentiality by using TSL

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!