You are on page 1of 27

CYBER SECURITY &

WEB BASED TOOL FOR


E-COMMERCE
CYBER SECURITY

• Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.
Terms in cyber security

• Network security is the practice of securing a computer network from intruders, whether
targeted attackers or opportunistic malware.
• ·Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect. Successful
security begins in the design stage, well before a program or device is deployed.
• Information security protects the integrity and privacy of data, both in storage and in transit.
• Operational security includes the processes and decisions for handling and protecting data
assets. The permissions users have when accessing a network and the procedures that
determine how and where data may be stored or shared all fall under this umbrella.
Types of cyber threats

• Cybercrime includes single actors or groups targeting systems for financial


gain or to cause disruption.
• Cyber-attack often involves politically motivated information gathering.
• Cyberterrorism is intended to undermine electronic systems to cause panic
or fear.
CYBER CRIMES

• Cybercrime is criminal activity that either targets or uses a computer, a computer network
or a networked device.
• Most, but not all, cybercrime is committed by cybercriminals or hackers who want to
make money. Cybercrime is carried out by individuals or organizations.
• Some cybercriminals are organized, use advanced techniques and are highly technically
skilled. Others are novice hackers.
• Rarely, cybercrime aims to damage computers for reasons other than profit. These could
be political or personal.
Types of cybercrime

• Email and internet fraud.


• Identity fraud (where personal information is stolen and used).
• Theft of financial or card payment data.
• Theft and sale of corporate data.
• Ransomware attacks (a type of cyberextortion).
• Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
WEB BASED TOOLS FOR E-COMMERCE

• https://slideplayer.com/slide/5244170/
COMPUTER SECURITY CLASSIFICATION
COPY RIGHT

• the exclusive and assignable legal right, given to the originator for a fixed number of
years, to print, publish, perform, film, or record literary, artistic, or musical material.
• Under section 13 of the Copyright Act 1957, copyright protection is conferred on literary
works, dramatic works, musical works, artistic works, cinematograph films and sound
recording.
• Ecommerce has a risk that others can copy either the features, or content, of your website.
INTELLECTUAL PROPERTY 

• Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic
works; designs; and symbols, names and images used in commerce.
• Intellectual property rights are the rights given to persons over the creations of their minds.
They usually give the creator an exclusive right over the use of his/her creation for a certain
period of time.
• The essence of IP in India is well established at all levels i.e Statutory, Administrative and
Judicial. India in its meeting with World Trade Organization had ratified an agreement which is
in relation to Trade Aspects of Intellectual Property Rights (TRIPS) which was enforced on 1st
January 1995.
• IP is protected in law by, for example, patents, copyright and trademarks, which enable people
to earn recognition or financial benefit from what they invent or create.
ELEMENTS GRANTED PROTECTION IN
INTELLECTUAL PROPERTY
• E-Commerce systems, search engines or other technical Internet tools is granted protection under Patents or utility models.
• Software includes the text-based HTML code which are used in websites and it is vested with a shield under Copyrights Act
or patents law, depending upon national law.
• Website design is protected under copyright.
• All the website content in the form of written material, photographs, graphics, music and videos are protected under
Copyrights.
• Databases can be protected by copyright or by sui generis database laws.
• Business Names, Logos, Product names, domain names and other signs posted on the website are covered under Trademarks.
• Computer generated Graphic Symbols, displays, graphic user interfaces (GUIs) & even webpages are protected under
Industrial Design Law.
AUTHENTICATION

• Cryptography can provide two types of authentication services:


1. Integrity authentication can be used to verify that non-modification has occurred to the
data.
2. Source authentication can be used to verify the identity of who created the information,
such as the user or system.
• Digital signatures or message authentication codes are used most often to provide
authentication services. Key-agreement techniques might also be used to provide this
service.
OFFENCES AND CYBER-CRIMES

• The Indian Law does not define the term ‘cybercrime’. It is neither defined in the 
Information Technology Act, 2000 nor in the I.T. Amendment Act, 2008 nor in any other
legislation of India. In fact, the Indian Penal Code still does not use the term ‘cybercrime’
even after its amendment by the Information Technology (Amendment) Act, 2008.
• cybercrime can be defined as any criminal activity directly related to the use of computers and the internet, such
as illegal trespass into the computer system or database of another, manipulation or theft of stored or online data,
hacking, phishing, cyber warfare, spreading computer viruses etc.
• In simple words, any offence or crime in which a computer is used for committing that crime.
CLASSIFICATION OF CYBER CRIMES
CYBER CRIMINALS

• Cybercriminals hack and infiltrate computer systems with malicious intent, while hackers
only seek to find new and innovative ways to use a system, be it for good or bad.
WEB BASED TOOLS FOR E-COMMERCE
INTERNET UTILITY PROGRAMMES-HTML AND
XML
• https://slideplayer.com/slide/5721226/
SEARCH ENGINE OPTIMIZATION

• SEO stands for “search engine optimization.” In simple terms, it means the process of improving
your site to increase its visibility for relevant searches.
• Search engines such as Google and Bing use bots to crawl pages on the web, going from site to
site, collecting information about those pages and putting them in an index.
• content quality and keyword research are key factors of content optimization, and crawlability and
mobile-friendliness are important site architecture factors.
• https://www.shopify.in/blog/ecommerce-seo-beginners-guide#:~:text=What%20is%20ecommerce
%20SEO%20and,like%20Google%2C%20Bing%20and%20Yahoo.&text=But%20the%20higher
%20the%20page,the%20traffic%20you'll%20generate.
WEB BASED MARKETING

• Marketing that done via the internet (online), is often called as web marketing or online
marketing.
• More people prefer to do web marketing now because it’s less expensive.
• Some kind of web marketing even free to do. For example, you can start a blog or upload
your video on Youtube for free.
TYPES OF WEB MARKETING

• SEO is a process to improve a site’s rank in the search result with various kind of
methods.
• Email marketing
• Pay per click ads or PPC is a type of web marketing where the advertisers will pay a fee
everytime someone clicks on their ads. 
• Blog marketing is the process to reach your target market with a blog.
• Video marketing such as YouTube
• Social media marketing
• Content marketing
DIRECTORY REGISTRATION

• Directory registration is one of the best internet marketing tools on the market and most of the time it’s
FREE. 
• This simple task of making sure your name, address, phone number and category is correct on multiple
digital venues may push your site to the top
• Benefits of Getting Listed Correctly
• Gives search engines clear information on your company.
• Builds high quality links to your site.
• Gains exposure to new prospects through increased online visibility.
• Increases reviews by using reputation management systems on major directories.
• Increases page indexing on major search engines.
ONLINE ADVERTISEMENTS

• Online advertising, also known as online marketing, Internet advertising, digital


advertising or web advertising, is a form of marketing and advertising which uses
the Internet to deliver promotional marketing messages to consumers.
PORTABLES AND INFO MECHANICS

• A laptop, laptop computer, notebook computer and smart phones is a small,


portable personal computer (PC) with a screen and alphanumeric keyboard.
• Laptops combine all the input/output components and capabilities of a desktop computer,
including the display screen, small speakers, a keyboard, data storage device, sometimes
an optical disc drive, pointing devices (such as a touchpad or pointing stick), with an
operating system, a processor and memory into a single unit. Most modern laptops feature
integrated webcams and built-in microphones, while many also have touchscreens.
• With the increase in the popularity of laptops, many brands started competing with each
other regarding providing the best laptop that can perform all the functions that are
performed by a traditional desktop computer.
• The laptops are continuously being used in companies where they are engaged in many productive tasks
such as web marketing etc.
• The laptops make all the tasks easier that are required to be done in office such as presentation, report
generation, documentation,
• It is the best place where the important information of the business can be stored for a longer period.
• The laptops save the person from the paperwork. It has effectively reduced the space because now any
person working with those papers is not required to put them in bulk and large cabinets.
• The communication has become easier with the help of a laptop. The businesses now stay in touch
with each other through instant messenger, video calling, and many other features.
WEBSITE DESIGN ISSUES

1. Poor or dated visual design


2. Slow upload speed
3. Lack of quality images
4. Clutter  
5. Poor or confusing user journey
6. Low standard of written content
7. Poor standard of SEO
8. Hidden details or no obvious point of contact
9. Security issues and certification problems
10. Badly integrated

You might also like