SlideShare a Scribd company logo
1 of 8
FUNDAMENTALS OF E COMMERCE
UNIT 5
SECURITY ISSUE OF E COMMERCE
Prof. (Dr) Kanchan Kumari
SECURITY ISSUES OF E-COMMERCE:
SECURITY ISSUES OF E-COMMERCE
FIREWALL
• Firewalls are network security systems that prevent unauthorized access to a network.
It can be a hardware or software unit that filters the incoming and outgoing traffic
within a private network, according to a set of rules to spot and prevent cyberattacks.
Firewalls are used in enterprise and personal settings
• A firewall is a computer network security system that restricts internet traffic in, out, or
within a private network. This software or dedicated hardware-software unit functions
by selectively blocking or allowing data packets.
• For example, a firewall rule may say to drop all traffic incoming to port 22, which is
commonly used to log in to computers remotely using SSH (secure shell). In this case,
when a packet arrives with the destination port of 22, the firewall will ignore it and fail
to deliver it to the source IP.
E-LOCKING
• An electronic lock (or electric lock) is a locking device which operates by means of electric current.
Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to
the lock.
• An electromagnet attracting a conductor with a force large enough to prevent the door from being
opened. In a more detailed examination, the device makes use of the fact that a current through
one or more loops of wire (known as a solenoid) produces a magnetic field.
• Electronic locks are ideal for use with access control systems. Cutting and issuing physical keys to
individuals is expensive, time-consuming, and inefficient. With electronic access control systems,
'keys' can be a huge of range of things: A code that is entered into a keypad.
ENCRYPTION
• Encryption is a way of scrambling data so that only authorized parties can
understand the information. In technical terms, it is the process of converting
human-readable plaintext to incomprehensible text, also known as ciphertext.
• Encryption is a key component in protecting data stored in the cloud, and is used by
cloud backup services to secure and protect user data from unauthorized access.
CYBER LAWS
• Cyber law, also known as internet law or digital law, signifies the legal regulations
and frameworks governing digital activities. It covers a large range of issues,
including online communication, e-commerce, digital privacy, and the prevention
and prosecution of cybercrimes.
• If an individual commits an act that violates the rights of a person in cyberspace,
then it is treated as a cyberspace violation and punishable under the provisions of
cyber laws. Since cyberspace is completely different from the physical world,
traditional laws are not applicable here.
THANK YOU
Dr. Kanchan Kumari

More Related Content

Similar to BBA 603 UNIR 5 FOE security issue of Ecommerce dr kanchan.pptx

network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxMijanurSepai1
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ finalpg13tarun_g
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)Zara Nawaz
 
cisco security training
cisco security trainingcisco security training
cisco security trainingqosnetworking
 

Similar to BBA 603 UNIR 5 FOE security issue of Ecommerce dr kanchan.pptx (20)

Cyber security
Cyber securityCyber security
Cyber security
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
network_security_ppt[1].pptx
network_security_ppt[1].pptxnetwork_security_ppt[1].pptx
network_security_ppt[1].pptx
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
Firewalls
FirewallsFirewalls
Firewalls
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Unit 3
Unit 3Unit 3
Unit 3
 
Firewalls
FirewallsFirewalls
Firewalls
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
cisco security training
cisco security trainingcisco security training
cisco security training
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 

More from Prof. Kanchan Kumari

unit 4 deta analysis bbaY Dr kanchan.pptx
unit 4 deta analysis bbaY Dr kanchan.pptxunit 4 deta analysis bbaY Dr kanchan.pptx
unit 4 deta analysis bbaY Dr kanchan.pptxProf. Kanchan Kumari
 
unit 4 deta analysis bbaY Dr kanchan.pptx
unit 4 deta analysis bbaY Dr kanchan.pptxunit 4 deta analysis bbaY Dr kanchan.pptx
unit 4 deta analysis bbaY Dr kanchan.pptxProf. Kanchan Kumari
 
BBA 205 BE UNIT 4 ROLE OF GOVERNMEN DR KANCHAN.pptx
BBA 205 BE UNIT 4 ROLE OF GOVERNMEN DR KANCHAN.pptxBBA 205 BE UNIT 4 ROLE OF GOVERNMEN DR KANCHAN.pptx
BBA 205 BE UNIT 4 ROLE OF GOVERNMEN DR KANCHAN.pptxProf. Kanchan Kumari
 
BBA 205 UNIT 3 INDUSTRIAL POLICY dr kanchan.pptx
BBA 205 UNIT 3 INDUSTRIAL POLICY dr kanchan.pptxBBA 205 UNIT 3 INDUSTRIAL POLICY dr kanchan.pptx
BBA 205 UNIT 3 INDUSTRIAL POLICY dr kanchan.pptxProf. Kanchan Kumari
 
Digital Marketing UNIT 2 SEO dr kanchan.pptx
Digital Marketing UNIT 2 SEO dr kanchan.pptxDigital Marketing UNIT 2 SEO dr kanchan.pptx
Digital Marketing UNIT 2 SEO dr kanchan.pptxProf. Kanchan Kumari
 
BBA 205 BE UNIT 2 economic systems prof dr kanchan.pptx
BBA 205 BE UNIT 2 economic systems prof dr kanchan.pptxBBA 205 BE UNIT 2 economic systems prof dr kanchan.pptx
BBA 205 BE UNIT 2 economic systems prof dr kanchan.pptxProf. Kanchan Kumari
 
BBA 205 BUSINESS ENVIRONMENT UNIT I.pptx
BBA 205 BUSINESS ENVIRONMENT UNIT I.pptxBBA 205 BUSINESS ENVIRONMENT UNIT I.pptx
BBA 205 BUSINESS ENVIRONMENT UNIT I.pptxProf. Kanchan Kumari
 
BBA 603 FOE UNIT 2 INTERNET DR KANCHAN.pptx
BBA 603 FOE UNIT 2 INTERNET DR KANCHAN.pptxBBA 603 FOE UNIT 2 INTERNET DR KANCHAN.pptx
BBA 603 FOE UNIT 2 INTERNET DR KANCHAN.pptxProf. Kanchan Kumari
 
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptxBBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptxProf. Kanchan Kumari
 
IMC unit 3design & execution of advertisements prof dr kanchan.pptx
IMC unit 3design & execution of advertisements prof dr kanchan.pptxIMC unit 3design & execution of advertisements prof dr kanchan.pptx
IMC unit 3design & execution of advertisements prof dr kanchan.pptxProf. Kanchan Kumari
 
managerial economics unit 3 prof dr Kanchan.pptx
managerial economics unit 3 prof dr Kanchan.pptxmanagerial economics unit 3 prof dr Kanchan.pptx
managerial economics unit 3 prof dr Kanchan.pptxProf. Kanchan Kumari
 
IBLT UNIT 1 PART 1 PROF DR KANCHAN.pptx
IBLT UNIT 1 PART 1 PROF DR KANCHAN.pptxIBLT UNIT 1 PART 1 PROF DR KANCHAN.pptx
IBLT UNIT 1 PART 1 PROF DR KANCHAN.pptxProf. Kanchan Kumari
 
Business Analytics unit 1 prof dr kanchan.pptx
Business Analytics unit 1 prof dr kanchan.pptxBusiness Analytics unit 1 prof dr kanchan.pptx
Business Analytics unit 1 prof dr kanchan.pptxProf. Kanchan Kumari
 
CCBM UNIT 2 intro to culture prof Dr. kanchan.pptx
CCBM UNIT 2 intro to culture prof Dr. kanchan.pptxCCBM UNIT 2 intro to culture prof Dr. kanchan.pptx
CCBM UNIT 2 intro to culture prof Dr. kanchan.pptxProf. Kanchan Kumari
 
CROSS CULTURAL BUSINESS MANAGEMENT UNIT 1 prof dr kanchan.pptx
CROSS CULTURAL BUSINESS MANAGEMENT UNIT 1 prof dr kanchan.pptxCROSS CULTURAL BUSINESS MANAGEMENT UNIT 1 prof dr kanchan.pptx
CROSS CULTURAL BUSINESS MANAGEMENT UNIT 1 prof dr kanchan.pptxProf. Kanchan Kumari
 
IMC UNIT 2 advertisement media prof dr kanchan.pptx
IMC UNIT 2 advertisement media prof dr kanchan.pptxIMC UNIT 2 advertisement media prof dr kanchan.pptx
IMC UNIT 2 advertisement media prof dr kanchan.pptxProf. Kanchan Kumari
 
Integrated marketing communication unit 1prof dr kanchan.pptx
Integrated marketing communication unit 1prof dr kanchan.pptxIntegrated marketing communication unit 1prof dr kanchan.pptx
Integrated marketing communication unit 1prof dr kanchan.pptxProf. Kanchan Kumari
 
managerial economics profkanchan unit 2.pptx
managerial economics profkanchan unit 2.pptxmanagerial economics profkanchan unit 2.pptx
managerial economics profkanchan unit 2.pptxProf. Kanchan Kumari
 
Integrated marketing communication unit 1prof dr kanchan.pptx
Integrated marketing communication unit 1prof dr kanchan.pptxIntegrated marketing communication unit 1prof dr kanchan.pptx
Integrated marketing communication unit 1prof dr kanchan.pptxProf. Kanchan Kumari
 
Managerial Economicsprofkanchan UNIT 1.pptx
Managerial Economicsprofkanchan UNIT 1.pptxManagerial Economicsprofkanchan UNIT 1.pptx
Managerial Economicsprofkanchan UNIT 1.pptxProf. Kanchan Kumari
 

More from Prof. Kanchan Kumari (20)

unit 4 deta analysis bbaY Dr kanchan.pptx
unit 4 deta analysis bbaY Dr kanchan.pptxunit 4 deta analysis bbaY Dr kanchan.pptx
unit 4 deta analysis bbaY Dr kanchan.pptx
 
unit 4 deta analysis bbaY Dr kanchan.pptx
unit 4 deta analysis bbaY Dr kanchan.pptxunit 4 deta analysis bbaY Dr kanchan.pptx
unit 4 deta analysis bbaY Dr kanchan.pptx
 
BBA 205 BE UNIT 4 ROLE OF GOVERNMEN DR KANCHAN.pptx
BBA 205 BE UNIT 4 ROLE OF GOVERNMEN DR KANCHAN.pptxBBA 205 BE UNIT 4 ROLE OF GOVERNMEN DR KANCHAN.pptx
BBA 205 BE UNIT 4 ROLE OF GOVERNMEN DR KANCHAN.pptx
 
BBA 205 UNIT 3 INDUSTRIAL POLICY dr kanchan.pptx
BBA 205 UNIT 3 INDUSTRIAL POLICY dr kanchan.pptxBBA 205 UNIT 3 INDUSTRIAL POLICY dr kanchan.pptx
BBA 205 UNIT 3 INDUSTRIAL POLICY dr kanchan.pptx
 
Digital Marketing UNIT 2 SEO dr kanchan.pptx
Digital Marketing UNIT 2 SEO dr kanchan.pptxDigital Marketing UNIT 2 SEO dr kanchan.pptx
Digital Marketing UNIT 2 SEO dr kanchan.pptx
 
BBA 205 BE UNIT 2 economic systems prof dr kanchan.pptx
BBA 205 BE UNIT 2 economic systems prof dr kanchan.pptxBBA 205 BE UNIT 2 economic systems prof dr kanchan.pptx
BBA 205 BE UNIT 2 economic systems prof dr kanchan.pptx
 
BBA 205 BUSINESS ENVIRONMENT UNIT I.pptx
BBA 205 BUSINESS ENVIRONMENT UNIT I.pptxBBA 205 BUSINESS ENVIRONMENT UNIT I.pptx
BBA 205 BUSINESS ENVIRONMENT UNIT I.pptx
 
BBA 603 FOE UNIT 2 INTERNET DR KANCHAN.pptx
BBA 603 FOE UNIT 2 INTERNET DR KANCHAN.pptxBBA 603 FOE UNIT 2 INTERNET DR KANCHAN.pptx
BBA 603 FOE UNIT 2 INTERNET DR KANCHAN.pptx
 
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptxBBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
BBA 603 FUNDAMENTAL OF E- COMMERCE UNIT 1.pptx
 
IMC unit 3design & execution of advertisements prof dr kanchan.pptx
IMC unit 3design & execution of advertisements prof dr kanchan.pptxIMC unit 3design & execution of advertisements prof dr kanchan.pptx
IMC unit 3design & execution of advertisements prof dr kanchan.pptx
 
managerial economics unit 3 prof dr Kanchan.pptx
managerial economics unit 3 prof dr Kanchan.pptxmanagerial economics unit 3 prof dr Kanchan.pptx
managerial economics unit 3 prof dr Kanchan.pptx
 
IBLT UNIT 1 PART 1 PROF DR KANCHAN.pptx
IBLT UNIT 1 PART 1 PROF DR KANCHAN.pptxIBLT UNIT 1 PART 1 PROF DR KANCHAN.pptx
IBLT UNIT 1 PART 1 PROF DR KANCHAN.pptx
 
Business Analytics unit 1 prof dr kanchan.pptx
Business Analytics unit 1 prof dr kanchan.pptxBusiness Analytics unit 1 prof dr kanchan.pptx
Business Analytics unit 1 prof dr kanchan.pptx
 
CCBM UNIT 2 intro to culture prof Dr. kanchan.pptx
CCBM UNIT 2 intro to culture prof Dr. kanchan.pptxCCBM UNIT 2 intro to culture prof Dr. kanchan.pptx
CCBM UNIT 2 intro to culture prof Dr. kanchan.pptx
 
CROSS CULTURAL BUSINESS MANAGEMENT UNIT 1 prof dr kanchan.pptx
CROSS CULTURAL BUSINESS MANAGEMENT UNIT 1 prof dr kanchan.pptxCROSS CULTURAL BUSINESS MANAGEMENT UNIT 1 prof dr kanchan.pptx
CROSS CULTURAL BUSINESS MANAGEMENT UNIT 1 prof dr kanchan.pptx
 
IMC UNIT 2 advertisement media prof dr kanchan.pptx
IMC UNIT 2 advertisement media prof dr kanchan.pptxIMC UNIT 2 advertisement media prof dr kanchan.pptx
IMC UNIT 2 advertisement media prof dr kanchan.pptx
 
Integrated marketing communication unit 1prof dr kanchan.pptx
Integrated marketing communication unit 1prof dr kanchan.pptxIntegrated marketing communication unit 1prof dr kanchan.pptx
Integrated marketing communication unit 1prof dr kanchan.pptx
 
managerial economics profkanchan unit 2.pptx
managerial economics profkanchan unit 2.pptxmanagerial economics profkanchan unit 2.pptx
managerial economics profkanchan unit 2.pptx
 
Integrated marketing communication unit 1prof dr kanchan.pptx
Integrated marketing communication unit 1prof dr kanchan.pptxIntegrated marketing communication unit 1prof dr kanchan.pptx
Integrated marketing communication unit 1prof dr kanchan.pptx
 
Managerial Economicsprofkanchan UNIT 1.pptx
Managerial Economicsprofkanchan UNIT 1.pptxManagerial Economicsprofkanchan UNIT 1.pptx
Managerial Economicsprofkanchan UNIT 1.pptx
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

BBA 603 UNIR 5 FOE security issue of Ecommerce dr kanchan.pptx

  • 1. FUNDAMENTALS OF E COMMERCE UNIT 5 SECURITY ISSUE OF E COMMERCE Prof. (Dr) Kanchan Kumari
  • 2. SECURITY ISSUES OF E-COMMERCE:
  • 3. SECURITY ISSUES OF E-COMMERCE
  • 4. FIREWALL • Firewalls are network security systems that prevent unauthorized access to a network. It can be a hardware or software unit that filters the incoming and outgoing traffic within a private network, according to a set of rules to spot and prevent cyberattacks. Firewalls are used in enterprise and personal settings • A firewall is a computer network security system that restricts internet traffic in, out, or within a private network. This software or dedicated hardware-software unit functions by selectively blocking or allowing data packets. • For example, a firewall rule may say to drop all traffic incoming to port 22, which is commonly used to log in to computers remotely using SSH (secure shell). In this case, when a packet arrives with the destination port of 22, the firewall will ignore it and fail to deliver it to the source IP.
  • 5. E-LOCKING • An electronic lock (or electric lock) is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. • An electromagnet attracting a conductor with a force large enough to prevent the door from being opened. In a more detailed examination, the device makes use of the fact that a current through one or more loops of wire (known as a solenoid) produces a magnetic field. • Electronic locks are ideal for use with access control systems. Cutting and issuing physical keys to individuals is expensive, time-consuming, and inefficient. With electronic access control systems, 'keys' can be a huge of range of things: A code that is entered into a keypad.
  • 6. ENCRYPTION • Encryption is a way of scrambling data so that only authorized parties can understand the information. In technical terms, it is the process of converting human-readable plaintext to incomprehensible text, also known as ciphertext. • Encryption is a key component in protecting data stored in the cloud, and is used by cloud backup services to secure and protect user data from unauthorized access.
  • 7. CYBER LAWS • Cyber law, also known as internet law or digital law, signifies the legal regulations and frameworks governing digital activities. It covers a large range of issues, including online communication, e-commerce, digital privacy, and the prevention and prosecution of cybercrimes. • If an individual commits an act that violates the rights of a person in cyberspace, then it is treated as a cyberspace violation and punishable under the provisions of cyber laws. Since cyberspace is completely different from the physical world, traditional laws are not applicable here.