(a) Cyber Threats and its Types:
Cyber threats refer to potential malicious attacks or harmful activities that target computers,
networks, or data systems, with the intent to steal, damage, or disrupt.
Types of Cyber Threats:
1. Malware – Viruses, worms, trojans that harm systems.
2. Phishing – Fake emails/websites to steal information.
3. Ransomware – Locks user data until ransom is paid.
4. Denial of Service (DoS) – Overloads systems to make them unavailable.
5. Spyware – Secretly monitors user activity.
---
(b) Software Development Life Cycle (SDLC):
SDLC is a systematic process used by developers to design, develop, test, and deploy
software.
Phases of SDLC:
1. Requirement Gathering – Understand client needs.
2. Design – Plan system architecture.
3. Development – Write code.
4. Testing – Find and fix bugs.
5. Deployment – Deliver software to users.
6. Maintenance – Ongoing updates and bug fixes.
---
(c) Virtual Currency:
Virtual currency is a digital form of money that is unregulated and exists only in electronic form.
It is not issued by any central authority.
Examples: Bitcoin, Ethereum.
Key Features:
- Used for online transactions.
- Stored in digital wallets.
- Based on blockchain technology.
- Can be traded or mined.
---
(d) Web Hosting and its Types:
Web hosting is a service that allows individuals and organizations to make their websites
accessible via the Internet.
Types of Web Hosting:
1. Shared Hosting – Multiple sites on one server.
2. VPS Hosting – Virtual private space on a shared server.
3. Dedicated Hosting – One server for one website.
4. Cloud Hosting – Resources spread across multiple servers.
5. Reseller Hosting – Buy hosting in bulk and resell to others.
---
(e) Architectural Framework of E-Commerce:
It refers to the structural design that supports all the components of an e-commerce system.
Main Components:
1. Client Layer – User interface (website or app).
2. Web Server Layer – Handles requests and serves web pages.
3. Application Layer – Business logic and transaction handling.
4. Database Layer – Stores customer and product data.
5. Security Layer – Manages encryption, authentication, and secure transactions.
This framework ensures smooth online operations, customer interaction, order processing, and
secure data handling.