E - Commerce
E - Commerce
INTRANET SECURITY:
An intranet is a private, internal network used within an organization for
communication and information sharing among employees. Intranets, being
internal, often have higher inherent security due to restricted access.
o Restricted Access:
Intranets are typically accessible only within the organization's internal
network, limiting exposure to unauthorized individuals.
o Firewalls and Passwords:
Firewalls help prevent unauthorized access, while passwords control access
to sensitive data on servers.
o Secure VPN Connections:
Secure Virtual Private Networks (VPNs) can grant remote access to the
intranet while maintaining security.
EXTRANET SECURITY:
An extranet, is a private network that extends an organization's intranet to
authorized external parties, like partners, customers, or suppliers, allowing them to
access specific resources.
o Controlled External Access:
Extranets allow authorized external users, like partners or customers, access
to specific resources.
o Authentication and Encryption:
Robust authentication mechanisms and data encryption are crucial to protect
sensitive information shared with external users.
o Role-Based Permissions:
Granting access based on roles helps ensure that only authorized individuals
can access specific data or functionalities.
o Threat Detection and Mitigation:
Extranets need to be monitored for potential threats and have mechanisms in
place to mitigate them, such as intrusion detection systems and regular
security audits.
THREATS AND PROTECTION METHODS:
Threats are actions carried out primarily by hackers or attackers with malicious
intent, to steal data, cause damage, or interfere with computer systems. A threat is
any potential danger that can harm your systems, data, or operations. In cyber
security, threats include activities like hacking, malware attacks, or data breaches
that aim to exploit vulnerabilities.
Some of the common threats are as follows:
Virus: They have the ability to replicate themselves by hooking them to the
program on the host computer like songs, videos etc and then they travel all
over the Internet.
Malware: Short for "malicious software," malware includes viruses, worms,
and trojans that can damage or take control of systems.
Phishing: A technique where attackers trick users into revealing personal
information or installing malware.
Adware: Adware is not exactly malicious but they do breach privacy of the
users. They display ads on a computer's desktop or inside individual
programs. They come attached with free-to-use software, thus main source
of revenue for such developers. They monitor your interests and display
relevant ads.
Spyware: It is a program or we can say software that monitors your activities
on computer and reveal collected information to an interested
party. Spyware are generally dropped by Trojans, viruses or worms. Once
dropped they install themselves and sits silently to avoid detection.
Threat protection refers to security measures and solutions designed to defend
against various threats, including cyberattacks and malware, which can compromise
systems, steal data, or disrupt operations.
Some of the Protection methods are as follows:
Firewalls:
Network security systems that control incoming and outgoing network
traffic.
Encryption:
Transforming data into an unreadable format to protect its confidentiality.
Access Control:
Limiting who can access specific resources or areas, ensuring only authorized
individuals have access.
Network Security:
Measures to protect network infrastructure from threats, including firewalls,
intrusion detection systems, and security policies.
Multi-factor Authentication (MFA):
Adding an extra layer of security by requiring multiple forms of identification
before granting access.
Data Backup and Disaster Recovery:
Creating copies of data and having plans in place to restore it in case of data
loss or system failure.
DATA AND MESSAGE SECURITY:
Data security is the practice of protecting digital information from unauthorized
access, corruption, or theft.
Types of Data Security:
Access control: Restricting who can access data and what they can do with it.
Authentication: Verifying user identities.
Encryption: Converting data into an unreadable format, making it secure.
Data loss prevention (DLP): Preventing data from leaving an organization's
control.
Message security ensures the confidentiality and authenticity of communications.
Types of Message Security:
Message confidentiality: Ensuring only the intended recipient can read the
message.
Message integrity: Ensuring the message hasn't been altered in transit.
Message authentication: Verifying the sender's identity.
FIREWALLS:
A firewall is a network security device designed to monitor, filter, and control
incoming and outgoing network traffic based on predetermined security rules. The
primary purpose of a firewall is to establish a barrier between a trusted internal
network and untrusted external networks.
Types of Firewall:
Hardware Firewalls: Physical devices that sit between the network and the
internet, providing a centralized point of control.
Software Firewalls: Software programs installed on individual computers or
servers, offering an additional layer of security.
Network Firewalls: Devices that protect entire networks, acting as a barrier
between internal and external networks.
Personal Firewalls: Software programs installed on individual devices, such
as laptops or desktops, to protect them from online threats.
Uses of Firewalls:
Protection from Cyber attacks: Firewalls are essential for protecting
networks and individual devices from a wide range of cyber threats.
Prevention of Data Breaches: They help prevent unauthorized access to
sensitive information, reducing the risk of data breaches.
Content Filtering: Firewalls can be configured to filter inappropriate content,
such as blocking access to certain websites or content.
Enforcement of Security Policies: They enforce security policies, ensuring
that only authorized traffic is allowed to pass through the network.
CRYPTOGRAPHY:
Cryptography is a technique of securing information and communications using
codes to ensure confidentiality, integrity and authentication. Thus, preventing
unauthorized access to information.
Basic features of Cryptography are given below:
Confidentiality: Information can only be accessed by the person for whom it
is intended and no other person except him can access it.
Integrity: Information cannot be modified in storage or transition between
sender and intended receiver without any addition to information being
detected.
Non-repudiation: The creator/sender of information cannot deny his
intention to send information at a later stage.
Authentication: The identities of the sender and receiver are confirmed. As
well destination/origin of the information is confirmed.
Interoperability: Cryptography allows for secure communication between
different systems and platforms.
Adaptability: Cryptography continuously evolves to stay ahead of security
threats and technological advancements.
Advantages of Cryptography:
Cryptography can be used for access control to ensure that only parties with the
proper permissions have access to a resource.
For secure online communication, it offers secure mechanisms for transmitting
private information like passwords, bank account numbers, and other sensitive
data over the Internet.
Cryptography can help firms in meeting a variety of legal requirements including
data protection and privacy legislation.
ENCRYPTION:
Encryption is a form of data security in which information is converted to ciphertext.
Only authorized people who have the key can decipher the code and access the
original plaintext information. An encryption algorithm is a mathematical formula
used to transform plaintext (data) into ciphertext. An algorithm will use the key to
alter the data in a predictable way. Even though the encrypted data appears to be
random, it can actually be turned back into plaintext by using the key again. Some
commonly used encryption algorithms include Blowfish, Advanced Encryption
Standard (AES), Rivest Cipher 4 (RC4), RC5, RC6, Data Encryption Standard (DES), and
Twofish.
Benefits of Encryption:
Privacy and security: Encryption ensures no one can read communications or
data except the intended recipient or data owner. This prevents attackers
from intercepting and accessing sensitive data.
Regulations: Encrypting data allows organizations to protect data and
maintain privacy in accordance with industry regulations and government
policy. Many industries, especially those in financial services and healthcare,
have explicit rules on data protection.
Secure internet browsing: Encryption keep users feel safer entering personal
information into webpages and carrying out financial or e-commerce
transactions.
Encryption keeps sensitive data safe: Encryption will continue to be a core
security feature in everything from video chats to e-commerce to social
media. Both organizations and individual users would benefit from keeping on
top of encryption standards to ensure that both their personal and
professional data is safe from misuse or compromise.
DIGITAL SIGNATURE:
A digital signature is an electronic stamp of authenticity on digital information,
ensuring it hasn't been altered and originates from the claimed sender. It uses
cryptography to create a unique "fingerprint" for a document or message, similar to
a handwritten signature but with added security and legal binding in many
jurisdictions.
Benefits of Digital Signatures:
Authentication: Verifies the identity of the signer.
Integrity: Confirms that the document or message hasn't been altered.
Non-Repudiation: Provides proof that the sender signed the document,
making it difficult for them to deny their signature later.
Security: Offers a high level of security and trustworthiness in digital
communications.
Legally Binding: In many countries, digital signatures are considered legally
binding.
Uses of VPN:
Secure Remote Access: VPNs allow users to securely access their
organization's network or applications from remote locations.
Increased Online Privacy: VPNs can mask a user's IP address and location,
enhancing their online privacy and security.
Bypassing Censorship and Geoblocks: VPNs can help bypass censorship or
geoblocks imposed by governments or internet service providers.
Protecting Data on Public Wi-Fi: VPNs can help protect sensitive data when
using public Wi-Fi networks, where eavesdropping is a concern.
MODULE – 5
E – MARKETING
TRADITIONAL MARKETING:
Traditional marketing is any form of marketing that uses offline media to reach an
audience. Basic examples of traditional marketing include things like newspaper ads
and other print ads, but there are also billboards, mail advertisements, and TV and
radio advertisements.
The challenges of Traditional Marketing are as follows:
High Costs:
Traditional marketing methods like TV and radio advertising, print media, and
billboards can be expensive, making them less accessible for smaller businesses.
Limited Audience Targeting:
Traditional marketing struggles to segment audiences and tailor messages to
specific demographics effectively, unlike digital marketing where precise targeting is
possible.
Lack of Flexibility:
Once a traditional campaign is launched, it's difficult to make changes or
adjustments to optimize performance.
Less Interactive:
Traditional marketing is primarily a one-way communication process, offering
limited interaction with the audience compared to the engagement opportunities of
digital channels.
Changing Consumer Behavior:
Consumers are increasingly shifting their attention to digital platforms, making
traditional methods less effective in reaching target audiences.
Increased Competition:
The rise of digital marketing has increased competition, making it harder for
traditional methods to stand out and capture attention.
Decline of Traditional Media:
The consumption of traditional media like print newspapers and magazines is
declining, further reducing the reach of traditional marketing.
Internet Marketing:
Internet marketing, often known as online marketing, uses digital platforms and
methods to promote brands by focusing on their target markets. It is a form of
marketing that uses the Internet to promote a brand, product, or service via social
media, search, email, and other digital channels. The goal of internet marketing is to
increase traffic to the advertiser's website through a number of methods.
Some examples of Internet Marketing are:
1. Website Content and Design:
The method of creating and spreading content in order to bring in and keep
customers is known as content marketing. Instead of focusing on selling, it
concentrates on client communication, which is usually more well-liked.
2. Email Marketing:
Email marketing is the process of sending direct marketing communications to
consumers via email in an effort to attract new clients and keep hold of current ones.
It's one of the most economical forms of marketing and may be used to target both a
large customer base and a highly specific one.
3. Social Media:
Social media marketing refers to the use of social media websites to promote a
business and its goods and services. It attempts to increase brand recognition,
enhance consumer interaction, build loyalty, and produce leads for sales. Paid
advertising and organic marketing are both components of social media marketing
strategy.
4. SEO:
SEO is the process of upgrading a website and digital content to increase its organic
or "natural" placement in search rankings. A website is more likely to be viewed by a
potential consumer if it ranks higher in search results. Effective SEO efforts need
thorough keyword research as well as the ability to develop high-quality, useful
content utilizing the selected keywords. Using relevant keywords, link-building,
making your website mobile-friendly to improve user experience, and voice search
optimization are some best practices for SEO that increase conversion rate.
5. Video and Podcasting:
Videos and podcasts are other methods to give your marketing strategy some
personality. They enable businesses to convey informative content and engage
audiences by using storytelling techniques.
6. Influencer Marketing:
Influencer marketing is the process of working with influencers to advertise your
brand's messages, products, or services. Influencer marketing is a mixture of both old
ways and new ways of marketing strategies. It takes the idea of a celebrity
endorsement into a content marketing campaign for today's time.
E-SCM:
E-SCM" stands for e-Supply Chain Management. It refers to using digital technologies
to manage and optimize the entire supply chain process, from sourcing raw materials
to delivering finished products to customers. E-SCM aims to improve efficiency,
reduce costs, and enhance transparency within the supply chain.
E-SCM encompasses various aspects of the supply chain, including:
1. Sourcing: Using digital tools to find and select suppliers, negotiate contracts, and
manage relationships.
2. Production: Optimizing manufacturing processes, managing inventory, and
ensuring timely production.
3. Warehousing: Using electronic systems to manage warehouse operations, track
inventory, and ensure efficient storage.
4. Logistics: Utilizing electronic tools to manage transportation, shipping, and
delivery of goods.
5. Distribution: Managing the final delivery of products to customers, including
order fulfilment and returns.
Benefits of E-SCM:
1. Increased Efficiency: Automating processes, reducing manual tasks, and
improving overall efficiency.
2. Cost Reduction: Minimizing waste, reducing inventory holding costs, and
optimizing transportation.
3. Improved Transparency: Providing real-time visibility into the entire supply
chain, from sourcing to delivery.
4. Enhanced Customer Satisfaction: Accurate delivery timelines, seamless order
tracking, and efficient returns.
5. Better Collaboration: Facilitating communication and data sharing between
different stakeholders in the supply chain.
MODULE – 6
MOBILE COMMERCE
WIRELESS APPLICATION PROTOCOL:
The Wireless Application Protocol (WAP) is a packet-switching protocol that is used to
access wireless data over most mobile wireless networks. WAP operates within an open
environment, and it can be created on any type of operating system. It is the preferred
method of delivering information to mobile users. The WAP datagram protocol is the core
interface of WAP architecture, which manages the transfer layer protocols of Internet
models and facilitates communications between mobile wireless networks and platforms
independent of upper-layer protocols.
ADVANTAGES OF WAP:
WAP is a technology that moves very quickly.
The technology is open-source and completely free.
Multiple platforms can be used to implement it.
Real-time data can be sent/received using WAP.
WAP is supported by the majority of modern mobile phones and devices.
DISADVANTAGES OF WAP:
In WAP, the connection speed is slow, and the availability is limited.
Internet access is very sparse in some areas, and in some other areas, it is completely
unavailable.
The system is less secure.
User interfaces (UI) are small in WAP.
Table tags:-
Ordered lists:-
An ordered list starts with the <ol> tag. Each list item starts with the <li> tag.
Description lists:-
A description list is a list of terms, with a description of each term.
The <dl> tag defines the description list, the <dt> tag defines the term (name), and
the <dd> tag describes each term: