Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Write a paragraph in which you explain the concept of a “sandbox” and describ

ID: 3864901 • Letter: 1

Question

1. Write a paragraph in which you explain the concept of a “sandbox” and describe how it is used to reduce security risks in client computers 2. Write a paragraph in which you describe the purpose and use of a sniffer program. 3. In one paragraph, explain what an encryption algorithm is and what it can do to provide increased computer security. 4. In two or three paragraphs, explain the differences between a symmetric and an asymmetric encryption system. 5. In one or two paragraphs, explain the difference between an open loop and a closed loop payment card processing system. 6. Write a paragraph or two in which you discuss the micropayments problem and some possible solutions to it. 7. Write a paragraph in which you explain the differences between upstream and downstream business strategies 8. In about 100 words, explain why IT projects (such as Web site development or redesign) are less likely to be delivered on time and within budget than large building construction projects. Include a discussion of how project management software can help IT project managers achieve their goals. 9. Write a paragraph in which you identify the three key elements that must exist in any electronic commerce software package. 10. In a paragraph, outline how the REST approach to Web services differs from that used in protocols such as SOAP

Explanation / Answer

1. "Sandbox" is a program in Java programming that sets the rules that are required by the programmers while creating the Java code which is sent as a part of the web page. The Java applet is sent automatically as the part of the web page and is very easy to execute it. It can be executed as soon as it arrives. This applet can cause harm.if we give unlimited access to the memory as well as the operating system on the computer of the client. Here the sandbox safety feature comes into the light. The sandbox puts restrictions and limitations on what resources of the system the applet can access. The code should be written within the confined limits of the sandbox. The sandbox is like a small area of the computer where an applet's code can work freely but it is not allowed to work any place else.

2. A sniffer programme is that which monitors the traffic of a network and also detects the concerned problems in a network.Using this information a network manager can keep the flow of the traffic in the network efficient and good. It can be used properly or improperly for capturing the data which is being transferred in a network. The network router reads every bit of data passed to it determining whether it is intended for a destination within the routers own network or whther it should be passed further along with the internet. sniffers are very much used in the academic networks to prevent traffic problems which are caused by file sharing applications.

3. An encryption algorithm is a security feature for a safe electronic data transport. This algorithm is based on actual mathematical steps and changing numbers and ciphers are used in it to encrypt elctronic data or numbers. Encryption is a process of encoding numbers or characters in such a way that it can be protected from the eyes of the hackers but with the help of decryption program the authorised parties can get back the original data. It may have various levels of encryption depending upon the depth of the security required. They are a part of Risk Management and are often found in places where the financial transactions and secret data transport are required.

4. The main difference between the symmetric and asymmetric encryption is that the symmetric encryption uses a similar key to encrypt or decrypt the data while on the other hand in asymmetric encryption a differect public and private key is used. In symmetric encryption system the private key must be known the party who is encrypting the data and also the party decrypting the data. But , asymmetric encryption allows for distribution of your public key to anyone with which the data can be encrypted, which they want to send in a secured manner and it can only be decoded by the person who is having a private key.

Symmetric encryption is a traditional technique while asymmetric is relatively new. The asymmetric encryption emerged as to balance the problem of the need to share the key in symmetric encryption model, removing the need to share the key by using a pair of public/private keys.