Vous êtes sur la page 1sur 3

Final Revision

1. 5 type of website
 Informational website have a simple goal of informing the user about the specific topic such as Wikipedia.
 Ecommerce website have a goal of making profit such as Amazon.com.
 Blog is short for web log. Blog are made up of ‘postings’ that contain text, video or some other content.
 Social media website have dominated internet use for several years now such as Facebook
 Custom web applications such as a website that art like a software program that loads though web browser.

2. Different between TCP and IP

 TCP control the disassembly of messages or a file into packet before it is transmitted over the internet, and it is
control the reassembly of the packet in the original format when they reach their destination.
 IP specific the addressing detail with each packets, labelling each with the packet’s origination and destination

3. Different between dynamic web page and static web page

 Static web page is an unchanged page retrieved from the file on the web serve.
 Dynamic web page whose content is shaped by a program in response to user request.

4. Define of static website and dynamic website

 Static website
It has web page store on the serve in the format that sent to a client web browser.
Primarily coded in Hyper Text Mark-up Language(HTML)
Example of website such as classic website.
This may include information about a company and its product and service via text, video.
 Dynamic Catalog
Changes or customize itself frequently and automatically, based on certain criteria
Two type of dynamic activity:
 Dynamic Code is invisible or behind the scenes
 Dynamic Content is visible or fully displayed.

5. Different between virus and worm

 The virus is a software that attaches itself to another program and can cause damage when the host program is
 The worm is a type of virus that replicate itself to the computer that it infect and can spead quickly though the

6. Cybersquatting
 It mean that buy domain name that lead to trend and make the profit from a goodwill of trademark belongs to
someone else.

7. Different between white hacker and black hacker (Case study)

 White hacker
Doing good ; ethical hacker
Work with government or company as security specialist
With permission to enter the computer
 Black hacker
Motivation is personal gain, but they can involve in cybercrime
Aim Steal other people data specially for financial information
 Define of Hacker
 A person that using their knowledge of computer software and hardware to entre people computer to
receive information.
 SSL(Secure Sockets Layer)
A commonly used encryption technique for scrambling data it is passed across the internet from customer’s
web browser to merchant’s web serve.
 TLS(Transport Layer Security)
A protocol that provide privacy and data integrity between two communicating application.
TLS is composed two layer: TLS Record Protocol and TLS Handshake Protocol
 SET (Secure Electronic Transaction)
A standard of public key encryption intended to enable secure ecommerce transaction, lead development by
Mister Card and VISA.
 HTTPS (Hype Text Transaction Protocol Secure)
HTTPS appear in URL when a website is secured by SSL certificate.
 VPN (Virtual Private Network) is one of the private key
Use private wide-area network that run over the public network, rather than a more experience private
network. It keep your financial information safe online by encrypt.
VPN use encrypt to hide all your data, history etc.

9. How to secure you website?

 Keep yourself updated by reading tech blog
 Use strong password to enhance website security
 Delete installation folder
 Change your database table prefix
 Protect your database with password
 Update your web script constantly
 secure your administrative email address

10. Briefly describe the requirements for secure electronic commerce//How to secure for internet transaction(Case
 Integrity : checking the message is sent it complete (i.e. it is not corrupted)
 Availability : Provide delivery assurance message of segment
 Key management : Provide a distribution and management of key needed to provide secure communication
 Non-repudiation : answer sender cannot deny message
 Authentication : Authentication are parties to the transaction who they claim to be

11. How does a payment gateway work? (Case Study)

 Must provide by bank to its customer
 Facilitate portal and front and processor
 Merchant service provided by ecommerce application provided by use credit card and direct payment of e-
business and online retailer.

12. Phishing attacks & Pharming

 Phishing involve getting user to entre personal information via fake email.
 Pharming involve modifying domain name system entries, which cause the user to be direct entry wrong
website when they visit a certain web address.

13. Different between static catalog and a dynamic catalog?

 Static Catalog
It is a simple list written in HTML that appear on web page.
To add or delete an item or change the item listing, the company must edit in HTML in one page or more
 Dynamic Catalog
It store information about item in database.
Feature multiple picture of each item, detail description and a search tool that allow customer search an item
and determine its availability.
14. Symmetric encryption (Case Study)
 Define:
Encode the message by using two mathematically related numeric key
Utilize the same key for decryption and encryption.
 Private key
Kept secret by the private key owner
The owner use the private key to decrypt the message received
 Public key
Freely distribution to public
Used to encrypt message using encryption algorithms.
 Ad of Public key
No problem of key distribution
Small combination of key required
Implement of digital signature possible
 Disa of Public key
Do not replace private key
Significantly lower than private key system

15. Difference between shared hosting and dedicated hosting and self-hosting?
 Shared hosting
The client’s Web site is on a server that hosts other Web sites simultaneously and is operated by
the service provider at its location.
 Dedicated hosting,
The service provider makes a Web server available to the client, but the client does not share the
server with other clients of the service provider.
 Self-hosting
The online business owns and maintains the server and all its software.

16. What are the advantages of using a value-added network?

 Users need to support only the VAN’s communications protocol instead of many possible protocols used by
trading partners.
 The VAN records message activity in an audit log.
 The VAN audit log becomes an independent record of transactions, and this record can be helpful in resolving
disputes between trading partners.
 The VAN can provide translation between different transaction sets used by trading partners.
 The VAN can perform automatic compliance checking to ensure that the transaction set is in the specified EDI

17. Describe the major components of a typical request message from a client to a server.
 Three major parts:
 Request line contains a command, the name of the target resource and the protocol name and version
Optional request headers can contain information about the types of files that the client will accept in
response to this request.
Optional entity body is sometimes used to pass bulk information to the server.