Tuesday 12 April 2016

Educational training

Educational training:

This application provides information about different universities available through out the world and they also provide information about different causes offered with respective course fees in each university. This application gives a benefit of knowledge sharing where different queries are solved for capturing information about different queries are solved for capturing information about different studies. For example let us take an example of search engines like google, dog pile, Alta vista etc which help in gaining information about different things. These search engines are also helpful in providing information about different financial issues, business measures, economic development implements etc. Thus consumer orient applications have great impact or influence on customer or consumer with the help of E-commerce which give the different features like low cost for utilization, faster fun, accurate, case of use, where each and every and every user is feeling comfortable to utilize all these applications, it gives facility for different banking transactions etc. So it can be declared that it has great influence over different applications which get focused with the concept of E-commerce.

Security issues involving e-commerce transaction:

When we speak about security issues involving E-commerce transactions, protocols play a major role where they are defined as the set of rules to be followed when an application is obeying the concepts of network. some of the protocols which give support to network. some of the protocols which give support to network transactions are like tcp/ip. http, telnet ,pop, smtp, we also have set protocol, which was designed in the year 1997 and has four security features like.

Authentication:

Which checks for the proper digital signatures or proper valid logins like correct username and password.

Encryption:

Which coverts the original text into cipher text to safeguard the original data from unauthorized users and again this cipher text is encrypted at the destination or receiver level integrity which combines the various aspects required for the proper flow of information in network. This aspects is helpful in combining different packets of data for proper data transmission.

0 comments: