1. Describe briefly the different web security threats and its countermeasures.
2. What is the need of E-mail security?
3. With a neat diagram, explain the different actors of SET.
1. Explain the functionality of SET in E-commerce.
2. Outline SET operations involved during E-transaction with credit card.