E commerce 2008 section-b
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
65
On Slideshare
65
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. 2008 SECTION-B 1. DISCUSS THE ADVANTAGE OF E-BUSINESS OVER TRADITIONAL BUSINESS  With the help of E-Business one can develop a more cost-effective Communication and Marketing Strategy - The most obvious advantage of "upgrading" to e-business is that it gives you a vital web presence.  You can reach New Markets World Wide - The internet offers exciting ways of reaching new markets that could only be dreamed of in the past.  You can cut Advertising and Marketing Costs - Online advertising is not only more efficient, but it is often less expensive than traditional advertising. After sales training expenses can also be reduced by utilizing online seminars, training videos and tutorials.  You can streamline the Ordering Process by taking orders online - Implementing an online ordering system allows you to eliminate manual paper work or telephone order taking.  You don’t have to hire a fancy looking shop  You don’t have to hire salesmen  You may take orders at midnight  Another great advantage of an e-business over traditional business is that it can easily find and market to a specific niche or segment, which results in a higher conversion of sales. Traditional businesses are forced to choose correct locations to attract their desired customer base.  The most significant difference is that e-businesses cost very little upfront when compared to traditional businesses. Starting a business on the Internet does not have the burden of a physical storefront and any expenses that accompany it. 2. LIST THE COMPUTER CRIMES. DISCUSS ANY TWO OF THEM Computer crime has been defined broadly as a criminal act that has been committed using a computer as the principal tool. Some of the computer crimes are:-  Hacking  Identity theft  Internet gambling  Child pornography
  • 2. Hacking:- The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used. In particular, the web pages here refer to "hackers" simply because our web-server logs show that everyone who reaches these pages are using the second definition as part of their search criteria. Identity theft:- The concept is simple: someone gains access to your personal information and uses it for their own benefit. This could range from a black-hat hacker stealing your online banking account login and password to getting access to your social security number and using it to pretend to be you. Such people can make themselves a lot of money with your personal information, and screw you over in the process Internet gambling:- It offers all forms of gambling to every online household 24 hours a day. Via the Internet, betters can indulge in casino-style gambling, such as blackjack, poker, slot machines and roulette. They can bet on sports, horse or dog races, lotteries, bingo, tournaments, election results, sweepstakes and more. Many observers believe that online trading in the stock market, especially so-called “day trading,” is nothing more than gambling on stock market performance. Child pornography:- It’s tragic, but the Internet is often used to exploit children. What’s perhaps even sicker is that people make money doing this. 3. EXPLAIN THE MALICIOUS CODE AND ITS TYPE Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, spyware, adware, backdoors, and malicious active content. Types of malicious code:-  Viruses: A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made.   Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process.
  • 3.  Spyware is a type of malicious program installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect.  Worms: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers  Trojan Horses: hide malicious intent inside a host program that appears to do something useful  Attack scripts: programs written by experts to exploit security weaknesses, usually across the network  Java attack applets: programs embedded in Web pages that gain foothold through a browser  ActiveX controls: program components that allow malicious code fragment to control applications or the OS 4. WHAT IS DIGITAL SIGNATURE? HOW IT IS OBTAINED? A digital signature is an electronic, encrypted, stamp of authentication on digital information such as e-mail messages, macros, or electronic documents. A signature confirms that the information originated from the signer and has not been altered. HOW IT IS OBTAINED? 5. WHAT IS FIREWALL? EXPLAIN A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. A firewall can either be software-based or hardware-based and is used to keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted
  • 4. There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates. A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall. Computer security borrows this term from firefighting, where it originated. In firefighting, a firewall is a barrier established to prevent the spread of fire.