You are on page 1of 18

UNIT 1: INTRODUCTION

Ecommerce
Ecommerce or electronic commerce, a subset of ebusiness, is the purchasing, selling, and
exchanging of goods and services over computer networks (such as the Internet) through
which transactions or terms of sale are performed electronically.
Contrary to popular belief, ecommerce is not just on the Web.

Types of Ecommerce
Ecommerce can be broken into four main categories: B2B, B2C, C2B, and C2C.
1. B2B (Business-to-Business)
Companies doing business with each other such as manufacturers selling to
distributors and wholesalers selling to retailers.
2. B2C (Business-to-Consumer)
typically through catalogues utilizing shopping cart software.
3. C2B (Consumer-to-Business)
A consumer posts his project with a set budget online and companies review the
consumer's requirements and bid on the project. The consumer reviews the bids and
selects the company that will complete the project. This is aka e-lancing.
4. C2C (Consumer-to-Consumer)
There are many sites offering free classifieds, auctions, and forums where individuals
can buy and sell thanks to online payment systems. E.g. ebay
NOTE –

• Companies using internal networks to offer their employees products and services
online are engaging in B2E (Business-to-Employee) ecommerce.
• G2G (Government-to-Government), G2E (Government-to-Employee), G2B
(Government-to-Business), B2G (Business-to-Government), G2C (Government-to-
Citizen), C2G (Citizen-to-Government) are other forms of ecommerce that involve
transactions with the government--from procurement to filing taxes to business
registrations to renewing licenses.

• Inter-organizational e-commerce – B2B Ecommerce


• Intra-organizational e-commerce – within a business
Driving forces of ecommerce
The evolution and growth of e-commerce can be attributed to a combination of
technological, marketing and economic forces.
1. E-commerce enables businesses to interact with suppliers, customers and with
players in the distribution channel at a lower cost.

2. The cost of installing and maintaining a website is much cheaper than owning a
physical store.

3. E-commerce generates greater profits due to less human intervention, lower


overhead cost, few clerical errors and more efficiency.

4. The cost of advertising is cheaper and provides access to global market at low cost.

5. Reduction in communication cost and technological infrastructure expense drive


business towards e-business

Technological forces that drives ecommerce


1. Technological advances have made business communication faster, easier,
economical and efficient.
2. Technological changes have given confidence to consumers to make electronic
payments in settlement of financial obligations.

Market forces that drives ecommerce


1. Business organizations are able to reach international markets by using electronic
medium for enhanced customer support and service.
2. E-commerce enables customers to make product comparison, place orders, track
orders and make payments at ease.
3. E-commerce also allows the customers to choose and order products according to
their personal and unique specifications.
4. The growing internet population stimulates business to switch over from an
additional business to e-business.
5. The great variety of commodities available online and reliable payment methods are
regarded as contributors to the increase of e-business.
6. Consumers often prefer shopping on the internet due to convenience and the
changes in consumer behaviour pulls consumer towards e-commerce.
E Commerce Industry Framework
It refers to software frameworks that offers an environment for building e-commerce
applications quickly. E-Commerce frameworks are flexible enough to adapt them to
your specific requirements.
As result, they are suitable for building virtually all kinds of online shops and e-
commerce related (web) applications.

Electronic Data Interchange


EDI is an electronic way of transferring business documents in an organization
internally, between its various departments or externally with suppliers, customers,
or any subsidiaries.
By automating paper-based transactions, organizations can save time and eliminate costly
errors caused by manual processing.

UNIT 2: Network Infrastructure for


ECommerce

Informative Superhighway (I-Way)

The information super highway may be defined as a high capacity, electronic pipeline to a
consumer or business premise that is capable of simultaneously supporting a large number
of e-commerce applications and providing interactive connectivity between users and
services.
The I-way has emerged as the basic network infrastructure for all types of e-commerce
activities due to its capability to provide integrate voice, data and video services.

Components of the I-way

1. Network access equipment -


which is at the consumer end and enables the consumer to access the network.
It consists of the hardware such as computers, modems, routers, switches for
computer networks, set-top boxes for television networks and software platforms
such as browsers and operating systems.

2. Access road or media -


provides the communication backbone for the transmission of data and information.
The access providers may be differentiated into four categories:
1. Telecom based
The telecom industry provides both long distance and local telephone services
for e-commerce applications.
Advantages:
a. It is capable of handling millions of simultaneous calls.
b. It provides accurate usage tracking and billing.
Limitations:
a. Lack of digital transmission capability
b. Uneven capacity distribution

2. Cable TV based
The cable TV network provides a popular media for pushing high speed data to
homes.

3. Wireless based
The wireless operators are typically radio. The rapid growth in technology has
impacted the wireless industry in a number of ways:
a. Apart from the voice calls, the cellular technology today has also
facilitated short messaging services (SMS) using alphanumeric display and
the multimedia services.
b. Internet connectivity using the cellular networks has been made possible.
c. The cellular networks using the analog technology are now upgrading to
digital networks to provide greater capacity at lower costs as well as
increase the quality and functionality of the cellular network.
d. Applications have been developed to facilitate mobile workers to
exchange messages and data from their offices while on the road.

4. The internet
The internet forms a well-known component of the global information
distribution network. It targets a wide range of e-commerce applications such as
video on demand, home shopping, e-mail, edi, information publishing,
information retrieval, video conferencing and many more.

All the components of the I-way together provide a network infrastructure for the e-
commerce activities. This requires the use of common standards and installing gateways
between various networks. A final requirement is the hardware and software to move huge
amounts of data effortlessly over the complex network.

Global information distribution networks -


provides the infrastructure for connecting across the countries and continents.
They include networks such as the long-distance telephone lines, the satellite networks and
internet.
UNIT5 Electronic Payments

E-Payment System –
E-payment systems are central to online business process as companies look for ways to
serve customers faster and at lower cost. Emerging innovations in the payment for goods
and services in ecommerce promise to offer a wide range of new business opportunities.

E-payment systems and e-commerce are highly linked given that online consumers must
pay for products and services. Clearly, payment is an integral part of the mercantile process
and prompt payment is crucial. If the claims and debits of the various participants
(consumers, companies and banks) are not balanced because of payment delay, then the
entire business chain is disrupted. Hence, an important aspect of e-commerce is prompt and
secure payment, clearing, and settlement of credit or debit claims.

Types of E-Payment Systems –


E-payment systems are proliferating in banking, retail, health care, online markets, and even
government—in fact, anywhere money needs to change hands.
Organizations are motivated by the need to deliver products and services more cost
effectively and to provide a higher quality of service to customers

The emerging e-payment technology is labelled electronic funds transfer (EFT).


EFT is defined as "any transfer of funds initiated through an electronic terminal telephonic
instrument, or computer or magnetic tape so as to order, instruct, or authorize a financial
institution.

EFT can be segmented into three broad categories:


1. Banking and financial payments
i. Large-scale or wholesale payments (e.g., bank-to-bank transfer)
ii. Small-scale or retail payments (e.g., ATMs)
iii. Home banking (e.g., bill payment)
2. Retailing payments
i. Credit Cards (e.g., VISA or MasterCard)
ii. Private label credit/debit cards (e.g., J.C. Penney Card)
iii. Charge Cards (e.g., American Express)
3. Online ecommerce payments
i. Token-based payment systems
a) E-cash (e.g., DigiCash)
b) Electronic checks (e.g., NetCheque)
c) Smart cards or debit cards (e.g., Mondex Electronic Currency
Card)
ii. Credit card-based payments systems
a) Encrypted Credit Cards (e.g., World Wide Web form-based
encryption)
b) Third-party authorization numbers (e.g., First Virtual)
E-Cash –
E-cash is a general term that describes the attempts of several companies to create value
storage and exchange system that operates online in much the same way that government-
issued currency operates in the physical world.

• There are many ways that exist for implementing an e-cash system, all must
incorporate a few common features.
• E-cash is based on cryptographic systems called "digital signatures”.
• This method involves a pair of numeric keys: one for locking (encoding) and the other
for unlocking (decoding)
• E-cash must have the following four properties –
o Monetary value
o Inter-operability (i.e. ability of a system to work with or use the parts or
equipment of another system)
o Retrievability
o Security

Concerns about electronic payment methods include:


o Privacy
o Security
o Independence
o Portability

E-cash Storage –

Two methods –
1. Online
a. Individual does not have possession personally of e-cash
b. Trusted third party, e.g., e-banking, bank holds customers' cash accounts
2. Offline
a. Customer holds cash on smart card or electronic wallet
b. Fraud and double spending require tamper-proof encryption

The purchase of e-cash from an online currency server (or bank) involves two steps:
o Establishment of an account
o Maintaining enough money in the account to bank the purchase.

Once the tokens are purchased, the e-cash software on the customer's PC stores digital
money undersigned by a bank.
The users can spend the digital money at any shop accepting e-cash, without having to open
an account there or having to transmit credit card numbers.
As soon as the customer wants to make a payment, the software collects the necessary
amount from the stored tokens.
Electronic Checks –
It is another form of electronic tokens. They are an alternative to paper checks, designed to
process payments digitally.
Buyers must register with third-party account server before they are able to write electronic
checks. The account server acts as a billing service.
eChecks typically take between 24 and 48 hours to verify and between 3-6 business days for
funds to be withdrawn and deposited into the respective accounts. The reason eChecks are
not processed instantaneously is that they use a third-party system (ACH) to initiate the EFT.
ACH conducts these transfers in batches, rather than one by one, so it can take a few days
to actually see money move.

E-banking
Electronic banking can be defined as the use of electronic delivery channels for banking
products and services.
It is a subset of electronic finance.
The most important electronic delivery channels are the Internet, wireless communication
networks, automatic teller machines (ATMs), and telephone banking.
The term transactional e-banking is also used to distinguish the use of banking services from
the mere provision of information
Electronic banking services are offered in two main ways:
1. Combination of traditional and electronic delivery channels
2. Banks offering their products and services predominantly through electronic
distribution channels without having a branch network are called “virtual banks”,
“branchless” or “Internet only” banks.

Advantages –
1. Reduction in inconvenience
2. Reduced time taken to do an operation
3. Reduced per transaction cost
4. Enhanced customer service
5. Raised long term returns by providing
anytime anywhere banking to customers

Concerns –
1. Govt access
2. Fraud
3. Lack of info security
Types of Internet banking
1. Web-based banking through internet
a) Informational Websites –
i. Such services are known as first level of e-banking.
ii. Through such services, bank provides marketing information
regarding banking products and services on a standalone server.
iii. It has very low degree of risk as there is no connection between
server and bank.
b) Communicative Websites –
i. In this system there is very less scope of communication between
banking system and e-banking users.
ii. This communication is only to the extent of e-mail, account
balance enquiry, loan application or static file updates.
iii. This system is not having fund transfer facility.
c) Advanced Transactional Websites –
i. This form of e-banking enables e-banking users to transfer their
fund electronically, make payment of utility bills and conduct other
banking transaction online.

2. Dial-up banking
i. consumer uses a modem to dial up to a bank's server to access bank
account.
ii. There is a special type of dial-up banking operated by private banks
between a banking institution and its corporate clients, known as
Extranet.

Information & Communication Technology (ICT)


o Use of Information & Communication Technology (ICT) is the latest mode of
managing data electronically.
o The advancement of ICT specifically in the utilization rate of internet facility resulted
in enhancement of production capacity and increase in fund flow all over the globe.
Subsequently, it created a cut-throat competitive environment internationally and that
lead to challenge of satisfying the customers who are now more aware and educated
than earlier.
o Due to the globalization, the distance between customers and service providers is
become irrelevant.
o It is well observed that ICT affected the entire financial industry through simplifying
enquiry process, better operating speed and providing efficient delivery
Credit Card
Credit card is small plastic card with a unique number attached with an account. It has also a
magnetic strip embedded in it which is used to read credit card via card readers. When a
customer purchases a product via credit card, credit card issuer bank pays on behalf of the
customer and customer has a certain time period after which he/she can pay the credit card
bill. It is usually credit card monthly payment cycle.

Debit Card
Debit card, like credit card, is a small plastic card with a unique number mapped with the
bank account number. The major difference between a debit card and a credit card is that in
case of payment through debit card, the amount gets deducted from the card's bank account
immediately and there should be sufficient balance in the bank account for the transaction
to get completed; whereas in case of a credit card transaction, there is no such compulsion.

Smart Card
Smart card is again similar to a credit card or a debit card in appearance, but it has a small
microprocessor chip embedded in it. It has the capacity to store a customer’s work-related
and/or personal information. Smart cards are also used to store money and the amount gets
deducted after every transaction.
Smart cards can only be accessed using a PIN that every customer is assigned with. Smart
cards are secure, as they store information in encrypted format and are less
expensive/provides faster processing. Mondex and Visa Cash cards are examples of smart
cards.

E-Money
E-Money transactions refer to situation where payment is done over the network and the
amount gets transferred from one financial body to another financial body without any
involvement of a middleman. E-money transactions are faster, convenient, and saves a lot
of time.
Online payments done via credit cards, debit cards, or smart cards are examples of e-money
transactions. Another popular example is e-cash. In case of e-cash, both customer and
merchant have to sign up with the bank or company issuing e-cash.
UNIT5 Intra-organizational Ecommerce
We define internal commerce as using methods and pertinent technologies for supporting
internal business processes between individuals, departments, and collaborating
organizations.
It is of two types – Public and Private Ecommerce

The term Information System (IS) refers to a system of people, data records and activities
that process the data and information in an organization, and it includes the organization's
manual and automated processes.
Information architecture (IA) is the art of expressing a model or concept of information
used in activities that require explicit details of complex systems.
Cross-functional management (CFM) manages business processes across the traditional
boundaries of the functional areas.

Macro-Forces and Internal Commerce


Macro forces and internal commerce highlights the changes taking place in organization
structure and explores how technology and other economic forces are moulding
arrangements within firms. The common focus in most of these modern management
particles is the use of technology for improving efficiency and eliminating wasteful tasks in
business operations.
Efficient operations of the macro forces and internal commerce are –
• Total quality management
• Business process improvement or business process reengineering

Global Markets
It is marketing on a worldwide scale reconciling or taking commercial advantage of global
operational differences, similarities and opportunities in order to meet global objectives.
When a company becomes a global marketer, it views the world as one market and creates
products that will only require weeks to fit into any regional marketplace. Marketing decisions
are made by consulting with marketers in all the countries that will be affected. The goal is to
sell the same thing the same way everywhere.
The Four elements of global marketing of marketing –
1. Product: create a single product and only have to tweak elements for different
markets.
2. Price: Price will always vary from market to market.
3. Placement: How the product is distributed is also a country-by-country decision
influenced by how the competition is being offered to the target market.
4. Promotion: Integrated marketing is the goal.

Advantages –
1) Scale in production and distribution
2) Power and scope
3) Consistency in brand image
4) Ability to leverage good ideas quickly and efficiently
5) Uniformity of marketing practices
6) Helps to establish relationships outside of the "political arena“
Disadvantages –
1) Differences in consumer needs, wants, and usage patterns for products
2) Differences in consumer response to marketing mix elements.
3) Differences in brand and product development and the competitive environment.
4) Differences in administrative procedures
5) Differences in product placement.

Market Research –
It involves the identification, collection, analysis, and dissemination of information. It is
conducted to assist management in decision making.

Characteristics –
1) It is systematic and objective
2) Methodologically sound, well documented, and, as much as possible, planned in
advance.
3) Uses the scientific method in that data are collected and analysed to test prior
notions or hypotheses.

Organisational Structure
It is a mostly hierarchical concept of subordination of entities that collaborate and contribute
to serve one common aim.
The structure of an organization is usually set up in one of a variety of styles, dependent on
their objectives and ambience. It allows the expressed allocation of responsibilities for
different functions and processes to different entities.
Common success criteria for organizational structures are –
1) Decentralized reporting
2) Flat hierarchy
3) High transient speed
4) High transparency

Hierarchically structured organization where all management activities are controlled by a


centralized management staff. It has two problems –
1. creates boundaries that discourage employees in different departments from
interacting with one another
2. departmental goals are typically set in a way that could cause friction among
departments

A vertical market is a market which meets the needs of a particular industry


A horizontal market is a market which meets a given need of a wide variety of industries,
rather than a specific one.
Virtual organization is defined as being closely coupled upstream with its suppliers and
downstream with its customers. It has been variously referred to as network organizations,
organic networks, hybrid networks and value-adding partnership.
The main goal of electronic brokerages organization is to increase the efficiency of the
internal marketplace. The main goal is to increase the efficiency of the internal marketplace.
A vision of speeding up or automating routine business tasks has come to be known as
“work-flow automation. The goal of work-flow automation is to offer more timely, cost-
effective, and integrated ways to make decisions. Typically, work-flows are decomposed into
steps or tasks, which are task oriented. Another way of looking at work-flow is to determine
the amount of cross-functional activity.

Mass customization
Mass customization, in marketing, manufacturing, and management, is the use of flexible
computer-aided manufacturing systems to produce custom output. It is the new frontier in
business competition for both manufacturing and service industries.
Four types of mass customization –
1. Collaborative customization - Firms talk to individual customers to determine the
precise product offering that best serves the customer's needs.
2. Adaptive customization - Firms produce a standardized product, but this product is
customizable in the hands of the end-user.
3. Transparent customization - Firms provide individual customers with unique
products, without explicitly telling them that the products are customized.
4. Cosmetic customization - Firms produce a standardized physical product, but
market it to different customers in unique ways.

Supply Chain Management


Supply chain consists of all parties involved, directly or indirectly in fulfilling a customer
request.
Supplier -> Manufacturer -> Distributer -> Retailer -> Customer

Supply chain management (SCM) is the management of a network of interconnected


business involved in the ultimate provision of product and service packages required by end
customers.
It spans all movement and storage of raw materials, work-in process inventory, and finished
goods from point-of-origin to point-of-consumption.
The organizations that make up the supply chain are “linked” together through physical
flows and information flows.

1. Physical Flows - it involves the transformation, movement, and storage of goods and
materials.

2. Information Flows – it allows the various supply chain partners to coordinate their
long-term plans, and to control the day-to-day flow of goods and materials up and
down the supply chain.

Management Components –

• Planning and control


• Work structure
• Organization structure
• Product flow facility structure
• Information flow facility structure
• Management methods
• Power and leadership structure
• Risk and reward structure
• Culture and attitude

Reverse Supply Chain - Reverse logistics is the process of planning, implementing and
controlling the efficient, effective inbound flow and storage of secondary goods and related
information opposite to the traditional supply chain direction for the purpose of recovering

Functions –
1. Management of supplies
2. Management of raw material
3. Transport management
4. Cost management
5. Inventory management
6. Distributing and Return management
7. Customer Satisfaction

CRM (Customer Relationship Management)


CRM stands for Customer Relationship Management. It's a technology used to manage
interactions with customers and potential customers. A CRM system helps organizations
build customer relationships and streamline processes so they can increase sales, improve
customer service, and increase profitability.
Customer relationship management (CRM) systems allow companies to analyse their past,
current, and future customers on a variety of levels. CRM is essential for any business,
including e-commerce sites, because it allows them to grow and succeed.

The importance of CRM for e-commerce sites

CRM has impacted e-commerce sites by becoming an essential part of a business’s


success. One study found that interactively collecting and condensing customer data helps
to build a company’s e-CRM capability, which ultimately leads to their corporate success. It
is safe to say that going forward, CRM platforms created specifically for e-commerce (as well
as implementing a scalable e-commerce solution) may very well be a necessity for web-
based businesses.

Failing to understand the importance of CRM for your e-commerce site could result in the
loss of a multitude of benefits, including but not limited to:

• A better understanding of supply and demand;


• Seeing if your customers are able to navigate your site without any issues;
• Better customer service;
• Easy check out processes;
• A decrease in loss and costs (due to the ability to better record customer sales);
• Having the ability to create advertisements that are aimed at your target audience.
Mobile Commerce
Mobile commerce, also known as m-commerce, involves using wireless handheld devices
like cellphones and tablets to conduct commercial transactions online, including the
purchase and sale of products, online banking, and paying bills.

Mobile computing and Applications


Mobile Computing is a technology that allows transmission of data, voice and video via a
computer or any other wireless enabled device without having to be connected to a fixed
physical link. The main concept involves −

• Mobile communication
• Mobile hardware
• Mobile software

Following is a list of some significant fields in which mobile computing is generally applied:

o Web or Internet access.


o Global Position System (GPS).
o Emergency services.
o Entertainment services.
o Educational services.

WAP ( Wireless Application Protocol)


Wireless Application Protocol (WAP) is a specification for a set of communication protocols
to standardize the way wireless devices, such as mobile phones and radio transceivers, can
be used for internet access, including email, the web, newsgroups and instant messaging.
While internet access was possible before the introduction of WAP, different manufacturers
have used varying technologies; WAP promises to exchange and make use of information
between these technologies.

WAP model and layers


The WAP model works similar to the traditional client-server model but uses an additional
WAP gateway as an intermediary between the client and server. This gateway translates the
WAP device request, from a microbrowser, into an HTTP URL request and sends it to the
server over the internet.
When the server returns a response, the WAP gateway processes and sends the webpage to
the WAP mobile device as a WML file that is compatible with microbrowsers.

The WAP standard describes the following protocol stack for interoperability of WAP devices,
equipment, software and other technologies, including:

• Wireless Application Environment (WAE) for mobile device specifications and


programming languages such as WML.

• Wireless Session Protocol (WSP), which manages connection suspensions and


reconnections.

• Wireless Transaction Protocol (WTP), which manages transaction support for requests and
responses to servers.

• Wireless Transport Layer Security (WTLS) for managing privacy, authentication and data
integrity through public key cryptography.

• Wireless Datagram Protocol (WDP), which is an adaptation layer for consistent data
formats in the other layers, and it defines how data flows to the sender, from the receiver.

Client and Server model


A client and server networking model is a model in which computers such as servers provide
the network services to the other computers such as clients to perform a user-based tasks.
This model is known as client-server networking model.

The application programs using the client-server model should follow the given below
strategies:

o An application program is known as a client program, running on the local machine


that requests for a service from an application program known as a server program,
running on the remote machine.
o A client program runs only when it requests for a service from the server while the
server program runs all time as it does not know when its service is required.
o A server provides a service for many clients not just for a single client. Therefore, we
can say that client-server follows the many-to-one relationship. Many clients can use
the service of one server.
o Services are required frequently, and many users have a specific client-server
application program.
Client server security threats
• Malicious data or code in the form of Trojan Horses, Viruses, Worms and Deviant.
• Eavesdropping without proper authorization.
• Denial of services and alteration in the data packets received.
• Hackers use these tools to interrupt the activities of an e-commerce website.
• They can capture user details including password or make the site unavailable for an
undefined period of time.

Web Security –
E-commerce security is the guidelines that ensure safe transaction through the internet. It
consists of protocols that safeguard people who engage in online selling and buying of goods
and services.

• Confidentiality − Information should not be accessible to an unauthorized person. It


should not be intercepted during the transmission.
• Integrity − Information should not be altered during its transmission over the
network.
• Availability − Information should be available wherever and whenever required
within a time limit specified.
• Authenticity − There should be a mechanism to authenticate a user before giving
him/her an access to the required information.
• Non-Rejection − It is the protection against the denial of order or denial of payment.
Once a sender sends a message, the sender should not be able to deny sending the
message. Similarly, the recipient of message should not be able to deny the receipt.
• Encryption − Information should be encrypted and decrypted only by an authorized
user.
• Auditability − Data should be recorded in such a way that it can be audited for
integrity requirements.
Transaction security
An online transaction requires a customer to disclose sensitive information to the vendor in
order to make a purchase, placing him-self at significant risk. Transaction security is
concerned with providing privacy in transactions to the buyers and sellers and protecting the
client-server network from breakdowns and third-party attacks. It basically deals with –
• Client security:- Techniques and practices that protect user privacy and integrity of
the computing system.
• Server security:- Protect web server, software and associated hardware from break-
ins, vandalism and DOS attacks.
• Secure transactions:- Guarantee protection against eavesdropping and intentional
message modification.

Measures to ensure Security


Major security measures are following −
• Encryption − It is a very effective and practical way to safeguard the data being
transmitted over the network. Sender of the information encrypts the data using a
secret code and only the specified receiver can decrypt the data using the same or a
different secret code.
• Digital Signature − Digital signature ensures the authenticity of the information. A
digital signature is an e-signature authenticated through encryption and password.
• Security Certificates − Security certificate is a unique digital id used to verify the
identity of an individual website or user.
• Secure Hypertext Transfer Protocol (SHTTP) - SHTTP extends the HTTP internet
protocol with public key encryption, authentication, and digital signature over the
internet. Secure HTTP supports multiple security mechanism, providing security to
the end-users. SHTTP works by negotiating encryption scheme types used between
the client and the server.

Network Security
Network Security protects your network and data from breaches, intrusions and other
threats.
Network Security involves access control, virus and antivirus software, application security,
network analytics, types of network-related security (endpoint, web, wireless), firewalls,
VPN encryption and more.

Types of network security protections:-


• Network Segmentation:- Network segmentation defines boundaries between
network segments where assets within the group have a common function,
risk or role within an organization.

• Cloud Network Security

• Email Security

• Data Loss Protection

• Firewall - a special type of network security device or a software program


that monitors and filters incoming and outgoing network traffic based on a
defined set of security rules. It acts as a barrier between internal private
networks and external sources (such as the public Internet).

Final Exam –

4 MCQ on Ecommerce definitions


MCQ + FillUps + True/False combo 15 easy 3 medium 2 hard

2.5marks 4 out of 6
Technical Disadvantages of Ecomm
Ecomm vs traditional comms
Features of Ecomm
Advantages to society of Ecomm
Types of Business Model

5marks 4 out of 6
EDI and its components
Ways and means of Website Security
How to handle Abandoned Shopping Cart
Virtual Auction vs Reverse Auction
SCM role in B2B
B2B story example

You might also like