This document outlines topics related to e-commerce and cyber security including explaining the framework of e-commerce, supply chain management, transaction models, B2C transactions, online payment processes, email fraud, denial of service attacks, cyber squatting, cyber stalking, DHCP, hackers and sensitive data, ethical hacking, SQL injection, firewalls, SSL, QR codes, e-cash, intellectual property rights, and credit card crimes. It provides an overview of key concepts and issues within e-commerce and cyber security.
This document outlines topics related to e-commerce and cyber security including explaining the framework of e-commerce, supply chain management, transaction models, B2C transactions, online payment processes, email fraud, denial of service attacks, cyber squatting, cyber stalking, DHCP, hackers and sensitive data, ethical hacking, SQL injection, firewalls, SSL, QR codes, e-cash, intellectual property rights, and credit card crimes. It provides an overview of key concepts and issues within e-commerce and cyber security.
This document outlines topics related to e-commerce and cyber security including explaining the framework of e-commerce, supply chain management, transaction models, B2C transactions, online payment processes, email fraud, denial of service attacks, cyber squatting, cyber stalking, DHCP, hackers and sensitive data, ethical hacking, SQL injection, firewalls, SSL, QR codes, e-cash, intellectual property rights, and credit card crimes. It provides an overview of key concepts and issues within e-commerce and cyber security.
2. Write a note on SCM. 3. Explain global information distribution networks. 4. Explain transaction models of e-commerce. 5. Explain about B2C transactions with proper example. 6. Explain online payment process using third party processor. 7. What is e-mail fraud? Explain various forms of e-mail frauds. 8. Write a note on various DOS attacks. 9. Write a note on cyber squatting & cyber stalking. 10. Write a note on DHCP. 11. Explain hackers with it’s type. 12. Explain sensitive data with it's prevention. 13. Explain ethical hacking with it’s phases. 14. Write a note on SQL injection. 15. Write a note on firewall.