Question: Question3 Consider an exchange between a customer and a merchant (via the Internet) consisting of the following six step: Step 1: Customer queries merchant about

Question3 Consider an exchange between a customer and a merchant (via the Internet) consisting of the following six step: Step 1: Customer queries merchant about availability of product (e.g., "list all available t-shirts") Step 2: Merchant sends lists of products (e.g., "green t-shirt $6, blue t-shirt $8, grey t-shirt S7, ..") Step 3: Customer chooses product (e.g., "want to buy blue t-shirt") Step 4: Merchant requests payment (e.g., "provide payment for $8"). Step 5: Customer sends credit card information (e.g., "charge to Visa 1234 ., exp 12/16"). Step 6: Merchant confirms order (e.g., "order #xY2987 complete"). For each step, consider the following five security properties: confidentiality, integrity, authentication, non-repudiation, availability . Create a table with steps (rows) and security properties (columns) and indi- cate if that security property for that step is necessary ('yes" if necessary, "no" if not necessary or optional
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
