Professional Documents
Culture Documents
Topic
What is Commerce ?
What is E-Commerce ?
Traditional Business Vs Direct Selling
Why use E-Commerce ?
Brief history of E-commerce ?
The process of E-Commerce
Types of E-Commerce
PROS and CONS of E-COMMERCE
E-commerce Security
WHAT IS COMMERCE?
Commerce is a division of trade or production which
deals with the exchange of goods and services from
producer to final consumer.
…….?
REDUCES TRANSACTION COSTS
BUSINESS-TO-CONSUMER
BUSINESS-TO-EMPLOYEE (B2E)
Business-to-employee (B2E) electronic commerce
uses an intrabusiness network which allows
companies to provide products and/or services
to their employees. Typically, companies use B2E
networks to automate employee-related corporate
processes.
CONSUMER-TO-CONSUMER (C2C)
There are many sites offering free classifieds, auctions,
and forums where individuals can buy and sell thanks to
online payment systems like PayPal where people can
send and receive money online with ease. eBay's auction
service is a great example of where person-to-person
transactions take place everyday since 1995.
PROS AND CONS
OF
E-COMMERCE
PROS
No checkout queues.
Reduce prices.
Youcan shop anywhere in the
world.
Easy access 24 hours a day.
Wideselection to cater for all
consumers.
CONS
Unable to examine products
personally
Not everyone is connected to
the Internet
There is the possibility of credit
card number theft
On average only 1/9th of stock
is available on the net
To be continued…
E-COMMERCE
SECURITY
The Cybercrimes
What is Cyber?
35
Republic Act No. 10175 Cybercrime Prevention Act of 2012
36
Republic Act No. 10173 Data Privacy Act of 2012
37
COMMON FORMS OF CYBERCRIMES :
38
Plagiarism An act or instance of using or closely imitating the language and
thoughts of another author without authorization.
Computer Addiction
Offline: generally used when speaking about excessive gaming behavior,
which can be practiced both offline and online.
Online: Also known as “Internet Addiction”, gets more attention in general from
scientific research than offline computer addiction, mainly because most cases
of computer addiction are related to the excessive use of the Internet.
Virtual Self -The persona you create about yourself virtually.
39
CRIMINAL ACTIVITIES
Hacking
Unauthorized access of or interference with computer systems,
servers, or other information and communication systems
▪ Unauthorized access to corrupt, alter, steal, or destroy electronic
data using computers or other information and communication
systems without the computer or system owner’s knowledge and
consent
▪ The introduction of computer viruses resulting in the corruption,
alteration, theft, or loss of such data
▪ Illegal Access
40
Illegal Interception
Data Interference
System Interference
Misuse of Devices
Infection of IT Systems with Malware – if the act is committed
against critical infrastructure of the Philippines the, penalty is
between 12-20 years reclusion temporal
Six years up to twelve years of imprisonment also known as
prison mayor.
41
Computer-related forgery, fraud and/or identity theft
An attempt to obtain sensitive information such as
usernames, passwords, and credit card details and
(indirectly money), often for malicious reasons.
Phishing
Pharming
Spam
42
Electronic theft
Illegal Downloading
Obtaining files that you do not have the right to use from the
internet.
Digital Piracy
Practice of illegally copying and selling digital music, video,
computer software, etc.
Copyright Infringement
Penalty of Php 50,000 – 500, 000 and or prison mayor
43
Cyber bullying
The use of electronic communication to
44
Cyber Defamation
Is an unprivileged false statement of
fact which tends to harm the reputation
of a person or company.
Penalty of 6-12 years of imprisonment or
prison mayor.
45
The Internet Threats
46
Hacking
48
Malware
49
What it can do:
Intimidate you with scareware, which is usually a pop-up message
that tells you your computer has a security problem or other false
information.
Reformat the hard drive of your computer causing you to lose all
your information.
Alter or delete files.
Steal sensitive information.
Send emails on your behalf.
Take control of your computer and all the software running on it.
50
Pharming
51
What it can do:
Convince you that the site is real and legitimate by
spoofing or looking almost identical to the actual site down
to the smallest details. You may enter your personal
information and unknowingly give it to someone with
malicious intent.
52
Phishing
53
What it does:
Trick you into giving them information by asking you to
update, validate or confirm your account. It is often
presented in a manner than seems official and intimidating,
to encourage you to take action.
Provides cyber criminals with your username and
passwords so that they can access your accounts (your
online bank account, shopping accounts, etc.) and steal
your credit card numbers.
54
Ransomware
55
What it can do:
There are two common types of ransomware:
Lockscreen ransomware: displays an image that prevents you from accessing your
computer
Encryption ransomware: encrypts files on your system's hard drive and sometimes
on shared network drives, USB drives, external hard drives, and even some cloud
storage drives, preventing you from opening them
Ransomware will display a notification stating that your computer or data have been
locked and demanding a payment be made for you to regain access. Sometimes the
notification states that authorities have detected illegal activity on your computer, and
that the payment is a fine to avoid prosecution.
56
What you can do:
Do not pay the ransom. These threats are meant to scare and intimidate
you, and they do not come from a law enforcement agency. Even if you
submit payment, there is no guarantee that you will regain access to your
system.
If your computer has been infected (i.e. you are unable to access your
computer or your files have been encrypted), contact a reputable
computer technician or specialist to find out whether your computer can
be repaired and your data retrieved.
In order to lessen the impact of a ransomware infection, be sure to
regularly back-up your data with a removable external storage drive. It's
possible that your files might be irretrievable; having an up-to-date backup
could be invaluable.
57
Spam
58
What it can do:
Annoy you with unwanted junk mail.
Create a burden for communications service providers and
businesses to filter electronic messages.
Phish for your information by tricking you into following links or
entering details with too-goodto-be-true offers and promotions.
Provide a vehicle for malware, scams, fraud and threats to your
privacy
59
Spyware (Spyware & Adware)
▪ Spyware and adware are often used by third parties to infiltrate your
computer.
What it is:
▪ Software that collects personal information about you without you
knowing. They often come in the form of a ‘free' download and are
installed automatically with or without your consent. These are
difficult to remove and can infect your computer with viruses.
60
What it can do:
Collect information about you without you knowing about it
and give it to third parties. Send your usernames,
passwords, surfing habits, list of applications you've
downloaded, settings, and even the version of your
operating system to third parties.
Change the way your computer runs without your
knowledge.
Take you to unwanted sites or inundate you with
uncontrollable pop-up ads.
61
Trojan Horses
62
What it can do:
Delete your files.
Use your computer to hack other computers.
Watch you through your web cam.
Log your keystrokes (such as a credit card number you
entered in an online purchase). Record usernames,
passwords and other personal information.
63
Viruses
64
What they can do:
Send spam.
Provide criminals with access to your computer and contact lists.
Scan and find personal information like passwords on your computer.
Hijack your web browser.
Disable your security settings.
Display unwanted ads.
When a program is running, the virus attached to it could infiltrate your
hard drive and also spread to USB keys and external hard drives. Any
attachment you create using this program and send to someone else
could also infect them with the virus.
65
How will you know if your computer is infected?
Here are a few things to check for:
It takes longer than usual for your computer to start up, it restarts on its own or doesn't start up at
all.
It takes a long time to launch a program.
Files and data have disappeared.
Your system and programs crash constantly.
The homepage you set on your web browser is different (note that this could be caused by Adware
that has been installed on your computer).
Web pages are slow to load.
Your computer screen looks distorted.
Programs are running without your control.
If you suspect a problem, make sure your security software is up to date and run it to check for
infection. If nothing is found, or if you are unsure of what to do, seek technical help.
66
Wi-Fi Eavesdropping
67
Worms
68
END OF THE SLIDE
THANK YOU
69