SlideShare a Scribd company logo
Welcome to Our Journey in Information
Security, Cybercrime, and E-Commerce
Presenters:
 Md. Uodoy Hossan Rafi (ID: 221-15-5494)
 Kouser Ahamed (ID: 221-15-5643)
Information Security
and Cybercrime
Explore the vital role of computer systems and the security challenges we
face in the digital age.
Computer Applications in the Society
Computers are essential tools used across diverse sectors of society.
 Education/Research: Enabling remote learning, data analysis, and innovation
 Government: Powering public services, records management, and policy decisions
 Finance: Streamlining transactions, risk analysis, and fraud detection
 Science: Accelerating scientific discoveries, modeling, and data visualization
 Healthcare: Transforming patient care, diagnostics, and medical research
 Publishing: Revolutionizing content creation, distribution, and accessibility
 Travel: Enhancing booking, navigation, and customer experiences
 Industry: Driving automation, optimization, and data-driven decision making
Security Challenges and
Vulnerabilities
Cybersecurity risks escalate as technology becomes indispensable.
Phishing attempts deceive users into revealing sensitive data
Hacking breaches systems to steal or compromise information
Malware (viruses, worms, trojans) infects and disrupts devices
Hackers and Computer
Crime
Hackers exploit technical expertise to breach computer systems without
authorization, classified as black hat, white hat, or gray hat based on
motivations.
Computer crimes involve illegal activities using computers or networks,
such as spoofing identities, sniffing confidential data, and phishing for
sensitive information.
Evidence of computer crimes is gathered through forensic analysis and
electronic records.
Cyber Crime
Cybercrime involves using computer devices and the internet to cause harm, including reputational,
physical, or mental damage.
 Misuse of computer devices
 Computer-related forgery
 Computer-related fraud
 Child Pornography
Hacker Targets: Financial data, intellectual property, personal data, and system access for theft,
modification, sale, blackmail, and sabotage.
Technologies and Tools for Protecting
Information Resources
Firewall: Combination of hardware and software that blocks unauthorized access to private networks.
Encryption: Transforms text or data into secure ciphertext that is unreadable to intruders.
Antivirus/Antispyware: Detects, prevents, and removes malware infections on computers.
E-Commerce
E-commerce enables global transactions, transforming business and
consumer behaviors with the rise of the internet.
Unique features of E-Commerce
Ubiquity: Internet technology available anytime, anywhere - at work, home, and on the go.
Global reach: Transcends national boundaries, connecting businesses and consumers worldwide.
Universal standards: Relies on a single set of internet technology standards for seamless
integration.
Richness: Supports dynamic content like video, audio, and text for immersive user experiences.
Interactivity: Enables two-way interaction between businesses and consumers.
Information density: Provides vast amounts of quality information to all market participants.
Personalization/Customization: Allows tailoring of messages and products to individual customer
preferences.
Social technology: Promotes user-generated content and social networking for deeper engagement.
Digital Marketing
Digital marketing leverages online platforms, mobile, social media, and
search engines to engage consumers through innovative strategies that
differ from traditional marketing methods.
5Ds of Digital Marketing
Devices: Audiences interact with brands across smartphones, tablets, computers, TVs, and gaming
consoles.
Platforms: Major online hubs like Facebook, Google, Twitter, and LinkedIn enable browser-based
and app interactions.
Media: Communication channels include advertising, email, search engines, and social networks.
Data: Audience profiles and interactions are tracked, with legal protections in many countries.
Technology: Marketing tools power interactive experiences on websites, apps, and email campaigns.
E-Commerce Categories
E-commerce can be categorized based on who is buying and selling. This includes Business-to-business
(B2B), Business-to-consumer (B2C), Consumer-to-consumer (C2C), and Consumer-to-Business (C2B).
Each category involves different types of transactions and examples.
B2B: Businesses selling products or services to other businesses. Example: An office supply
company sells bulk printer cartridges and paper.
B2C: Businesses selling products or services directly to individual consumers. Example: Amazon
sells a variety of products through their website.
C2C: Consumers selling products or services to other consumers. Example: Individuals selling used
video games on eBay.
C2B: Consumers selling products or services to businesses. Example: A photographer selling stock
photos to a website.
Thank You for Joining information
Security and Cybercrime and E-
Commerce Journey!

More Related Content

Similar to Welcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptx

International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
HateMe9
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Legal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social ImplicationsLegal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social Implications
SabahtHussein
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
gadisaAdamu
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
Kayisa Herman Dube
 
digital world
digital worlddigital world
digital world
sagarkohli856
 
digital.pdf
digital.pdfdigital.pdf
digital.pdf
sagarkohli856
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
Microsoft Österreich
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
SonaliG6
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecurity
SonaliG6
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
ICCNS
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
politegcuf
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
EMC
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
Cybercrime
CybercrimeCybercrime
Cybercrime
MobeenaJavid
 
Cyber Security in the Modern World 1.pdf
Cyber Security in the Modern World 1.pdfCyber Security in the Modern World 1.pdf
Cyber Security in the Modern World 1.pdf
offensoSEOwork
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
meisaina
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
meisaina
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 

Similar to Welcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptx (20)

International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Legal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social ImplicationsLegal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social Implications
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
digital world
digital worlddigital world
digital world
 
digital.pdf
digital.pdfdigital.pdf
digital.pdf
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecurity
 
DigitalCitizenshipPresentation
DigitalCitizenshipPresentationDigitalCitizenshipPresentation
DigitalCitizenshipPresentation
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security in the Modern World 1.pdf
Cyber Security in the Modern World 1.pdfCyber Security in the Modern World 1.pdf
Cyber Security in the Modern World 1.pdf
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 

Recently uploaded

Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Welcome-to-Our-Journey-in-Information-Security-Cybercrime-and-E-Commerce.pptx

  • 1. Welcome to Our Journey in Information Security, Cybercrime, and E-Commerce Presenters:  Md. Uodoy Hossan Rafi (ID: 221-15-5494)  Kouser Ahamed (ID: 221-15-5643)
  • 2. Information Security and Cybercrime Explore the vital role of computer systems and the security challenges we face in the digital age.
  • 3. Computer Applications in the Society Computers are essential tools used across diverse sectors of society.  Education/Research: Enabling remote learning, data analysis, and innovation  Government: Powering public services, records management, and policy decisions  Finance: Streamlining transactions, risk analysis, and fraud detection  Science: Accelerating scientific discoveries, modeling, and data visualization  Healthcare: Transforming patient care, diagnostics, and medical research  Publishing: Revolutionizing content creation, distribution, and accessibility  Travel: Enhancing booking, navigation, and customer experiences  Industry: Driving automation, optimization, and data-driven decision making
  • 4. Security Challenges and Vulnerabilities Cybersecurity risks escalate as technology becomes indispensable. Phishing attempts deceive users into revealing sensitive data Hacking breaches systems to steal or compromise information Malware (viruses, worms, trojans) infects and disrupts devices
  • 5. Hackers and Computer Crime Hackers exploit technical expertise to breach computer systems without authorization, classified as black hat, white hat, or gray hat based on motivations. Computer crimes involve illegal activities using computers or networks, such as spoofing identities, sniffing confidential data, and phishing for sensitive information. Evidence of computer crimes is gathered through forensic analysis and electronic records.
  • 6. Cyber Crime Cybercrime involves using computer devices and the internet to cause harm, including reputational, physical, or mental damage.  Misuse of computer devices  Computer-related forgery  Computer-related fraud  Child Pornography Hacker Targets: Financial data, intellectual property, personal data, and system access for theft, modification, sale, blackmail, and sabotage.
  • 7. Technologies and Tools for Protecting Information Resources Firewall: Combination of hardware and software that blocks unauthorized access to private networks. Encryption: Transforms text or data into secure ciphertext that is unreadable to intruders. Antivirus/Antispyware: Detects, prevents, and removes malware infections on computers.
  • 8. E-Commerce E-commerce enables global transactions, transforming business and consumer behaviors with the rise of the internet.
  • 9. Unique features of E-Commerce Ubiquity: Internet technology available anytime, anywhere - at work, home, and on the go. Global reach: Transcends national boundaries, connecting businesses and consumers worldwide. Universal standards: Relies on a single set of internet technology standards for seamless integration. Richness: Supports dynamic content like video, audio, and text for immersive user experiences. Interactivity: Enables two-way interaction between businesses and consumers. Information density: Provides vast amounts of quality information to all market participants. Personalization/Customization: Allows tailoring of messages and products to individual customer preferences. Social technology: Promotes user-generated content and social networking for deeper engagement.
  • 10. Digital Marketing Digital marketing leverages online platforms, mobile, social media, and search engines to engage consumers through innovative strategies that differ from traditional marketing methods.
  • 11. 5Ds of Digital Marketing Devices: Audiences interact with brands across smartphones, tablets, computers, TVs, and gaming consoles. Platforms: Major online hubs like Facebook, Google, Twitter, and LinkedIn enable browser-based and app interactions. Media: Communication channels include advertising, email, search engines, and social networks. Data: Audience profiles and interactions are tracked, with legal protections in many countries. Technology: Marketing tools power interactive experiences on websites, apps, and email campaigns.
  • 12. E-Commerce Categories E-commerce can be categorized based on who is buying and selling. This includes Business-to-business (B2B), Business-to-consumer (B2C), Consumer-to-consumer (C2C), and Consumer-to-Business (C2B). Each category involves different types of transactions and examples. B2B: Businesses selling products or services to other businesses. Example: An office supply company sells bulk printer cartridges and paper. B2C: Businesses selling products or services directly to individual consumers. Example: Amazon sells a variety of products through their website. C2C: Consumers selling products or services to other consumers. Example: Individuals selling used video games on eBay. C2B: Consumers selling products or services to businesses. Example: A photographer selling stock photos to a website.
  • 13. Thank You for Joining information Security and Cybercrime and E- Commerce Journey!