What can you find out about the cryptosystems and protocols in use to protect this transaction in online e-commerce site like Amazon.com? Do you think these are sufficient? Why or why not?

I’m trying to study for my Computer Science course and I need some help to understand this question.

Go to a popular online e-commerce site like Amazon.com. Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select “Properties.” What can you find out about the cryptosystems and protocols in use to protect this transaction? Do you think these are sufficient? Why or why not? Support your answers with information and examples from your text and your experiences in Ministry of Interior and three or four citing articale.

Text Book:

Principles of Information Security 6th Edition

by Michael E. Whitman (Author), Herbert J. Mattord (Author)