answersLogoWhite

0


Best Answer

SET, SSL, and S-HTTP

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What security protocols are predominantly used in Web based electronic commerce?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What security protocols are predominantly used in Web-based electronic commerce?

§SET, SSL, and S-HTTP


How communication technology has contributed to growth of electronic commerce?

Developments in internet security have enabled people to transfer funds, and purchase goods electronically - e-commerce now accounts for more of the market share than non-e-commerce transactions !


What security measure is used for internet e-commerce?

E commerce security is the protection of e comm assets from un authorised access.For security an e commerce must use SSl (secure socket layer) , that will meet your security requirements like authentication,encryption,integrity. Must use secure hyper text protocol like SHTTP as they support multiple security mechanism providing security to end users. Must secure the electronic transaction like secure payment gateways,merchant software,certificate authority software.


What has the author Jeffrey H Matsuura written?

Jeffrey H. Matsuura has written: 'Nanotechnology Regulation And Policy Worldwide' 'Security, rights, and liabilities in e-commerce' -- subject(s): Data protection, Database security, Electronic commerce, Law and legislation, Security (Law) 'Jefferson vs. the patent trolls' -- subject(s): Contributions in law, Intellectual property


What is electronic personnel security questionnaire?

The Electronic Personnel Security Questionnaire is a permanent document.


Is a set of standardized security protocols for encryption and authentication information?

IPsec


What services or protocols should be avoided in a network to increase security?

Telnet


Why might someone see better security when using a browser other internet explorer?

Internet Explorer does not have that kind of security protocols than Chrome. Chrome has established better protocols than others.


Security measures for e-commerce?

none


Security of electronic banking?

how many kinds of electronic banking?


Objective of security analysis?

The objective of a security analysis is to ensure your computer network is as secure as possible. A security analysis will help you find weaknesses in your system in order to develop your security protocols.


What has the author James A Schweitzer written?

James A. Schweitzer has written: 'Protecting information in the electronic workplace' -- subject(s): Access control, Computers, Electronic data processing departments, Security measures 'Computers, business, and security' -- subject(s): Computer security, Electronic data processing departments, Industries, Security measures 'Managing information security' -- subject(s): Business intelligence, Computer security, Electronic data processing, Electronic data processing departments, Security measures 'Computer crime and business information' -- subject(s): Computer crimes, Electronic data processing departments, Information resources management, Security measures