Sign In
Not register? Register Now!
Pages:
6 pages/β‰ˆ1650 words
Sources:
9 Sources
Style:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 38.88
Topic:

Module 4 - SLP: Cryptography and Computer Forensics

Research Paper Instructions:

Module 4 - SLP
CRYPTOGRAPHY AND COMPUTER FORENSICS
SLP 4 is in two parts, cryptosystems and computer forensics.
Part I
Open Internet Explorer and visit several shopping sites you frequent (e.g., Amazon.com, eBay, Macy's, etc.). Pick a few things you would like to purchase and place them into the shopping cart. When you go to the checkout page which requires you put in credit card, right click on the page and select "property."
Write a 3- to 5-page paper to discuss the cryptosystems and protocols used in protecting your transaction. This exercise is only window shopping. Please do NOT checkout and actually buy items.
Your paper should include the following:
Common protocols that the site uses
Specific protocols that the site uses
Part II
Do your own research on computer forensics and crime cases. Write a 3- to 5-page paper based on your findings. Your paper should include the following:
The whole story line of what has happened
How computer forensics investigators approached the cases
What you have learned from the investigators
SLP Assignment Expectations
Your paper should be from 6 to 10 pages. Combine parts I and II into a single report labeling each part accordingly.
Your paper should provide a summary of your findings from the assigned materials and any quality resources you can find. Cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular:
Demonstration of your understanding on cryptographic protocols and forensics
Clear presentation of your findings

Research Paper Sample Content Preview:

Cryptography and Computer Forensics
Name:
Institution:
Cryptography and Computer Forensics
Part I
Cryptosystems and Protocols used in Protecting eBay, Amazon, and Macy's Online Transactions
Introduction
Technological advancement has changed the way various activities are conducted today in different sectors. Among the sectors that have benefited from improvement in technology, include business especially regarding service delivery. For instance, unlike the previous era where shopping involved physical interaction between the seller and the buyer, technological improvement has led to the emergence of online shopping sites such as eBay, Amazon, Macy and Alibaba among many others. However, as much as these sites have made shopping easier, some threats accompanying them a form of cyber crimes. This includes cases where buyers credit card have been used without their authentication while at the same time some of their sensitive information have been exposed to the general public during online transactions. Therefore, to curb this, various shopping sites have come up with different cryptography systems and protocols to aid in minimizing such frauds and vulnerability as shall be discussed in the paper.
Common Cryptosystems and Protocols used on Shopping Sites
After conducting extensive research on various shopping sites, it has been observed that almost every site has established a cryptographic system and protocol. However, even though some of the protocols may vary from one site to another, some are familiar to a majority of sites. Among the common cryptosystem and protocol measures that have been put in place by Amazon, Macy, and eBay shopping sites include the Secure Socket Layers (SSL) (Amazon, 2016). Apart from just being the most widely used data encryption system used in an online transaction, SSL ensures that all the credit card numbers used during the e-commerce transactions are encrypted hence rendering their security (Elgamal & Hickman, 2010). Also, SSL also ensures that all personal information about the seller or the buyer is scrambled before being sent or received over the internet thus making it difficult to be accessed by non-relevant internet users.
Besides the Secure Socket Layers (SSL) that is being used by all of the shopping as mentioned above sites, Macy and eBay shopping sites also apply the use of firewall as one of their technical safeguards towards protecting their clients' personal information from theft or loss. Macy shopping site, for instance, uses special communication management computers in creating secure firewall (eBay, 2016). These computers are therefore used to store personal information of their members safely and inaccessible to other Internet users. Subsequently, this firewall is only useful to the buyers who have chosen to register with the shopping site as their personal information are secured by the passwords that they have created themselves and are unknown to other individuals (eBay, 2016). However, it is also advisable that when creating passwords, the members should avoid combinations that can be guessed easily by other users.
Specific Protocols used by Different Sites
Just as discussed before that some of the technical safeguard protocols vary from one s...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!