Suppose that you obtained a certificate of your own. Explain how you could use that certificate to deal with situations in which an intruder might steal your credit card number.

What will be an ideal response?

You use a protocol that requires that a merchant accept a credit card only if it comes with a certificate and that the credit card number is always encrypted with your private key. Thus only you, and not an intruder, could have sent it. Effectively, you are signing your credit card number.

Computer Science & Information Technology

You might also like to view...

Camera settings can be changed to allow a camera to take a lower resolution photo so that more pictures will fit on the camera's memory card

Indicate whether the statement is true or false

Computer Science & Information Technology

APA style requires that the first line of all paragraphs are indented 1" to the right compared to the rest of the paragraph

Indicate whether the statement is true or false

Computer Science & Information Technology