This website uses cookies to ensure you have the best experience. Learn more

Bank Security Using Secure Socket Layer Bank Security Using Secure Socket Layer Bank Security Using Secure Socket Layer

743 words - 3 pages



Name ID NO
1 TameratAlemu CIR/335/06
2 MubarekHiyaru CIR/272/06
3 EliyasDeriba CIR/124/06
4 Hiwot Daniel CIR/186/06
5 FILimonAregawe CIR/151/06

Chapter Two
...view middle of the document...

- It creates an encrypted connection that provides the sending of the data from one source to another using the SSL.

- SSL provides a way to ensure that the security is being provided to the transaction and the data in use.

- The lock is used to display the browsers connection is closed or opened on the secure channel of SSL or TLS.
2.2 Users of the Secure Socket Layer

2.3 Components of the Secure Socket Layer in Banks
* SSL Handshake Protocol
* negotiation of security algorithms and parameters
* key exchange
* server authentication and optionally client authentication
* SSL Record Protocol
* Fragmentation(a phenomenon of computer storage)
* compression
* message authentication and integrity protection
* encryption
* SSL Alert Protocol
* error messages (fatal alerts and warnings)
* SSL Change Cipher Spec Protocol
* a single message that indicates the end of the SSL handshake

2.4 Problems of the Secure Socket Layer in Bank
Digital certificates provide security to websites by encrypting sensitive data and verifying the identity of the websites that are secured.
We provide these certificates as a service to website owners to ensure the security of online communications.
SSL problem messages and warnings are often displayed in an attempt to protect website users from potentially compromising situations. However, an SSL error message may also indicate a problem that is entirely significant in nature. In this second case, there is often an issue either with the website you are...

Other assignments on Bank Security Using Secure Socket Layer Bank Security Using Secure Socket Layer Bank Security Using Secure Socket Layer

Security Essay

765 words - 4 pages numerous security issues and risks. The problem statement that Team INFINITY has come up with is identifying various security risks that lead to increased theft on campus. There are plenty of solutions to prevent this problem from happening. However, strategically placing security features will help prevent crime and theft from occurring on ITT Technical Institutes campus. Team INFINITY’s solution statement for this problem is using cameras

Security Essay

1066 words - 5 pages unusual activity, (iii) Accessing sensitive information unrelated to the user’s role without following the proper procedures. Having security programmers in place is thus a vital concept that every organization should embrace. This helps to warrant the fact that employees are conscious about the value of guarding sensitive information. It also serves to ensure that they are aware of what to do to ensure secure handling of information, and the


9492 words - 38 pages business environment. The matching model also misses the ‘human’ aspect of human resources and has been called a ‘hard’ model of HRM (Guest, 1987; Storey, 1992; Legge, 1995). The idea of considering and using human resources like any other resource of an organisation seems unpragmatic in the present world. Despite the many criticisms, however, the matching model deserves credit for providing an initial framework for subsequent theory development in

Grameen Bank

4194 words - 17 pages -proof and permanent homes. Members get a loan of US $350, payable within a period of 5years with a 8 percent interest rate attached to it (Grameen Bank, 2015). The woman is vested with the home's title who thereby gets financial security plus enhanced status within the household and society. To qualify for a housing loan one has to be an existing Grameen borrower with a 100% repayment record and also must have completely paid back their first two

Bangladesh Bank

673 words - 3 pages Bangladesh Bank Bangladesh Bank, the central bank of the country, was established as a body corporate vide the Bangladesh Bank Order, 1972 (P.O. No. 127 of 1972) with effect from 16th December, 1971. The powers and functions of Bangladesh Bank are governed by various laws and acts including the Banker's Books Evidence Act 1891, Insolvency Act 1920, Banking Companies Ordinance 1962, Foreign Exchange (Regulation) Act 1986, Money Loan Court

Mountain Bank

1186 words - 5 pages unique products and better services for customers unlike those of other banks. In an article by an author is was said that, “The differentiation strategy of a business is a predetermined set of actions designed to produce and deliver goods or services to customers who perceive the company’s offering as different.” (Fletcher) Using this strategy would guide Mountain Bank into creating a unique bank that would be seen as different from all other

Bank Processes

1151 words - 5 pages identified for effective and productive investment banking processes. Choosing an investment bank or firm can depend on the investor themselves. Some processes and guidelines can vary from firm to firm, this would all depend on the investor and the financial experts and their preferences. Portfolio construction is an important task which involved expertise from a financial expert. Investment Banking and IPO Process Investment banking contains

State Bank Of India

8300 words - 34 pages provides easy access to money to its customers through more than 8500 ATMs in India. The Bank also facilitates the free transaction of money at the ATMs of State Bank Group, which includes the ATMs of State Bank of India as well as the Associate Banks – State Bank of Bikaner & Jaipur, State Bank of Hyderabad, State Bank of Indore, etc. You may also transact money through SBI Commercial and International Bank Ltd by using the State Bank ATM-cum

Bank Of America

5971 words - 24 pages developed a security feature that ensures that information sent between the bank and the mobile device remains encrypted. To activate mobile banking, customers must register through the bank's Online Banking service at Once registered, customers can use the Internet browser on their mobile phones to conveniently access their accounts from anywhere, anytime. Competition Bank of America’s competitors consist of JPMorgan Chase

Wachovia Bank Fail

636 words - 3 pages Using the fall of Wachovia bank, there could be several lines that have room to improve and grow. They need to focus on image transformation based in clean international reputation. Establish a clear policy and easy for all levels of society. With the intention to cover the general public, customers, investors and government. The restore confidence in these lines will be a strong distrust task as completely closed all channels of

Case - Charter Financial Bank

326 words - 2 pages Charter Financial Bank + NutriStar Project and Production Management Tutorial Group 8 Replacement-Paper for the FIRST test Case I - Charter Financial Bank Charter Financial Bank recently got the Idea to develop a Website to promote bank services, to provide access to customer account information, and to allow individuals to apply online for loans and credit cards. In order to develop this Websites Ray Chopper, Vice-President of

Similar Documents

Secure Network Essay

1304 words - 6 pages prescription by a beautician. The specialist, who will be at every retail point, will guide the customers on the right product for the individual client. General skin care advice will also be provided at no cost by the organization’s dermatologists and beauticians. That will enhance the product’s quality by ensuring right end users’ positive outcome as a result of using the product in the right way. For instance, a dark skinned individual who

Bank Essay

2001 words - 9 pages to the report, most statistics are automatically complied by record in database. Monitor team have to analysis weekly because the computer cannot measure some critical. 5. Conclusion This report has presented the view of Standard Chartered Bank (Hong Kong) Limited and what kind of strategies and tactics consider adopting the market. SCBL have to concern about internet sales and security safety. Awareness of SCBL internet

Autocad Layer Standards Essay

1415 words - 6 pages additional layers to be added to accommodate special project requirements. This should only be done if a desired layer does not apply to a project. Some examples of layers using a user-defined Minor Group field are as follows. A-Door-Metl Metal Doors A-Wall-Strc Walls To Structure A-Furn-Pnl1 Furniture Panels From Manufacturer 1 A-Furn-Pnl2 Furniture Panels From Manufacturer 2 In contrast to the first edition of "CAD Layer Guidelines

Keeping Information Secure Essay

1741 words - 7 pages Keeping information secure in the workplace Hacking A hacker is a person who breaks codes and passwords to gain unauthorised entry to computer systems. A system hacker knows about designing and maintaining operating systems and a password hacker knows how to find out someone else's password. Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers enjoy learning more