Underwater Intervention
Underwater Intervention
Underwater Intervention
90 E-COMMERCE
FALL 2015
HOMEWORK # 1
DUE SEPTEMBER 23, 2015
1.
2.
S. Erfani
88-590 E-Commerce
ECE Dept. U Windsor
nonrepudiation services?
9. Discuss some of the vulnerabilities of biometric authentication
mechanism.
10/19/2015
S. Erfani
88-590 E-Commerce
ECE Dept. U Windsor
10. Describe an example where absolute denial of service to a user (i.e., the
user gets no response from the computer) is a serious problem to that
user. Describe another example where 10 percent denial of service to a
user (i.e., the users computation progresses, but at a rate 10 percent
slower than normal) is a serious problem to that user. Could access by
unauthorized people to a computing system result in a 10 percent denial
of service to the legitimate users? How?
10/19/2015
S. Erfani
88-590 E-Commerce
ECE Dept. U Windsor