SlideShare a Scribd company logo
1 of 12
Internet
 Security
 & Cyber
 Laws
 (ISCL)     *BY-> Mukund Vinayak
                  10-CSA
*

 Virtual Organization
 Business Transaction on WEB
 Security Threats to e-Commerce
Before…       we get started lets have a
small introduction to e-Commerce!
*

e-Commerce is electronic commerce is the process
of buying and selling or exchanging of products and
services and information.


TYPES OF e-COMMERCE:


1.B2B e-COMMERCE            2. B2C e-COMMERCE
3.C2B e-COMMERCE            4. C2C e-COMMERCE
* Speed           * Hidden Cost
* No Boundaries   * Network Unreliability
* Cost Saving     * Lack Of Security
*

Threats are dangerous because they can
create obstruction in proper functioning of
the application which they are meant for


There can be following types of threats
possible:
1.   Client threats
2.   Communication channel threats
3.   Server threats
                                              2B continue..
Client Threats:
       1. Active Content
       2. Malicious Codes
       3. Server-side Masquerading

Communication channel threats:
     1. Confidentiality Threat
     2. Integrity Threat
     3. Availability Threats

Server Threats:
       1. Password Hacking
       2. CGI threat
       3. Web server threat
*

VO is used to describe a network of independent
firms that join together, often temporarily, to
produce a service or product.




                                             2B continue..
*Customizable             *High Cost
*Service range is large   *Legal Problem
*It can satisfies         *Cultural Problem
 constantly changing
 customers and
 market requirements
*
They consist of following major events:
1.   Search of product to be purchased or buyer
     to buy product from us.
2.   Price Negotiation: It is the common step
     from both sides
3.   Delivery of Product
4.   Payment: The most Important part of any
     transaction and need to be implement
     carefully.
ISCL ;virtual org ; bussines transaction; e-commerce

More Related Content

Similar to ISCL ;virtual org ; bussines transaction; e-commerce

OWASP Top 10 - Insecure Communication
OWASP Top 10 - Insecure CommunicationOWASP Top 10 - Insecure Communication
OWASP Top 10 - Insecure CommunicationGayan Weerarathna
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Heather Vargas
 
Security Controls Over E-Commerce
Security Controls Over E-CommerceSecurity Controls Over E-Commerce
Security Controls Over E-CommerceAnkit Gupta
 
E commerce- securing the business on internet
E commerce- securing the business on internetE commerce- securing the business on internet
E commerce- securing the business on internetSandhi Shivanya
 
IRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in NigeriaIRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in NigeriaIRJET Journal
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityNeeraj Negi
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)IMRAN KHAN
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...eSAT Publishing House
 
E commerce for tybcom introduction
E commerce for tybcom introductionE commerce for tybcom introduction
E commerce for tybcom introductionAditya
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final pptreemalmarri
 
Future of Supply Chain with AI and Blockchain in the Semiconductor Industry
Future of Supply Chain with AI and Blockchain in the Semiconductor IndustryFuture of Supply Chain with AI and Blockchain in the Semiconductor Industry
Future of Supply Chain with AI and Blockchain in the Semiconductor IndustryChristophe Begue
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber lawYagnesh Garud
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 

Similar to ISCL ;virtual org ; bussines transaction; e-commerce (20)

OWASP Top 10 - Insecure Communication
OWASP Top 10 - Insecure CommunicationOWASP Top 10 - Insecure Communication
OWASP Top 10 - Insecure Communication
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
E-commerce
E-commerceE-commerce
E-commerce
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Module 10 e security-en
Module 10 e security-enModule 10 e security-en
Module 10 e security-en
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )
 
E commerce
E commerceE commerce
E commerce
 
Security Controls Over E-Commerce
Security Controls Over E-CommerceSecurity Controls Over E-Commerce
Security Controls Over E-Commerce
 
E commerce- securing the business on internet
E commerce- securing the business on internetE commerce- securing the business on internet
E commerce- securing the business on internet
 
IRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in NigeriaIRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in Nigeria
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
 
E commerce for tybcom introduction
E commerce for tybcom introductionE commerce for tybcom introduction
E commerce for tybcom introduction
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Future of Supply Chain with AI and Blockchain in the Semiconductor Industry
Future of Supply Chain with AI and Blockchain in the Semiconductor IndustryFuture of Supply Chain with AI and Blockchain in the Semiconductor Industry
Future of Supply Chain with AI and Blockchain in the Semiconductor Industry
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 

Recently uploaded

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 

Recently uploaded (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 

ISCL ;virtual org ; bussines transaction; e-commerce

  • 1.
  • 2. Internet Security & Cyber Laws (ISCL) *BY-> Mukund Vinayak 10-CSA
  • 3. *  Virtual Organization  Business Transaction on WEB  Security Threats to e-Commerce
  • 4. Before… we get started lets have a small introduction to e-Commerce!
  • 5. * e-Commerce is electronic commerce is the process of buying and selling or exchanging of products and services and information. TYPES OF e-COMMERCE: 1.B2B e-COMMERCE 2. B2C e-COMMERCE 3.C2B e-COMMERCE 4. C2C e-COMMERCE
  • 6. * Speed * Hidden Cost * No Boundaries * Network Unreliability * Cost Saving * Lack Of Security
  • 7. * Threats are dangerous because they can create obstruction in proper functioning of the application which they are meant for There can be following types of threats possible: 1. Client threats 2. Communication channel threats 3. Server threats 2B continue..
  • 8. Client Threats: 1. Active Content 2. Malicious Codes 3. Server-side Masquerading Communication channel threats: 1. Confidentiality Threat 2. Integrity Threat 3. Availability Threats Server Threats: 1. Password Hacking 2. CGI threat 3. Web server threat
  • 9. * VO is used to describe a network of independent firms that join together, often temporarily, to produce a service or product. 2B continue..
  • 10. *Customizable *High Cost *Service range is large *Legal Problem *It can satisfies *Cultural Problem constantly changing customers and market requirements
  • 11. * They consist of following major events: 1. Search of product to be purchased or buyer to buy product from us. 2. Price Negotiation: It is the common step from both sides 3. Delivery of Product 4. Payment: The most Important part of any transaction and need to be implement carefully.