0% found this document useful (0 votes)
11 views18 pages

Ec Ca

The document discusses electronic commerce and is divided into 5 units. Unit 1 covers the fundamentals of e-commerce including the difference between e-business and e-commerce. It also discusses the electronic commerce framework and anatomy of e-commerce applications. Unit 2 covers network security. Unit 3 discusses the world wide web. Unit 4 is about electronic data interchange and unit 5 is about applets.

Uploaded by

tn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views18 pages

Ec Ca

The document discusses electronic commerce and is divided into 5 units. Unit 1 covers the fundamentals of e-commerce including the difference between e-business and e-commerce. It also discusses the electronic commerce framework and anatomy of e-commerce applications. Unit 2 covers network security. Unit 3 discusses the world wide web. Unit 4 is about electronic data interchange and unit 5 is about applets.

Uploaded by

tn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

E – commerce

UNIT – I:Fundamentals of E-Commerce Hours:9

Electronic Commerce Framework, Traditional Vs. Electronic Business Application,The Anatomy of E-


Commerce Applications. Network infrastructure for E-Commerce – Components of the I-way – Global
Information Distribution Networks – Public policy issues shaping the I – way. Network Access Equipment

UNIT – II: Network Security Hours:9

The internet as a Network Infrastructure, Network Security and Firewalls – Client Server Network Security
– Firewalls and Network Security – Data and Message Security – Encrypted Documents and Electronic
Mail.

UNIT – III: World Wide Web Hours:9

Electronic Commerce and World Wide Web, Consumer Oriented E-Commerce, Electronic Payment
Systems

UNIT – IV: Electronic Data Interchange Hours:9

Electronic Data Interchange (EDI), EDI application in business, EDI and E- commerce – EDI
implementation. Intra-organizational Electronic Commerce – Supply Chain Management.

UNIT – V:Applets Hours:9

Corporate Digital Library – Advertising and marketing on the Internet – E-Commerce Catalogs or
Directories- On demand Education and Digital Copyright – Applets, Browsers & Software Agents.

Unit I

1.1. Meaning of E-Commerce:

E-Commerce is defined as those commercial transactions carried out using the Electronic means, in which
goods Or services are delivered either electronically or in their Tangible or intangible form.

Examples of E-Commerce:

(a) Online shopping:


Buying and selling goods on the internet is one of the most popular examples of Ecommerce.

(b) Electronic payments:


When we are buying goods online, there needs to be a mechanism to pay online too. That Is where the
payment Processors and payment gateways come into the picture. Electronic Payments reduce the
inefficiency associatedWith writing the Cheque books. It also does Away with many of the safety issues
that arise due to the payments Made in currency Notes.

1.2. Main difference between E-Business and E-Commerce :


E-BUSINESS
E-Business covers the online transactions, but Also extends to all the internet Based Transactions with the
business partners, Suppliers and customers like: Selling directly To the consumers, manufacturers and
suppliers; Monitoring and exchanging information; Auctioning surplus inventory; Collaborative Product
design. These online interactions are Aimed at improving Or transforming the Business processes and
efficiency. An E-Business status is Received when we handle E-Commerce refers to the online transactions
(i.e.) buying and selling of goods and/or Services over the internet. he business using phone calls, E-Mail
orders, Postal orders, and also the online activities.

E-Commerce
E-Commerce refers to The online transactions (i.e.) buying and selling Of goods and/or Services Over the
internet.

1.3. Electronic Commerce Framework:


• E-Commerce application will be built on the existing technology infrastructure –A myriad of computer
Communication networks Communication software forming Information super highway. Building blocks
of the infrastructure:
Common business services for facilitating the buying and selling process
• Messaging & information distribution as a means of sending and retrieving information
• Multimedia content & network publishing, for creating a product &
a means to communicate about it
• The information superhighway- the very foundation-for providing the high way system along which all
e-commerce must travel
The two pillars supporting all e-commerce applications & infrastructure

1. Public policy to govern issues such as universal access,privacy and information pricing.
2. Technical standards to dictate the nature of information publishing ,user interfaces and transport in the
interest of compatibility across the entire network Any successful e-commerce will require the I-way
infrastructure in the same way that regular commerce needs interstate highway network to carry goods from
one point to another I-way will be a mesh of interconnected data highways of many forms
Telephone,wires,cable TV wire Radio-based wireless-cellular & satellite
Movies=video + audio

Digital games=music + video + software


Electronic books=text + data + graphics + music + photographs + video

 In the electronic ‗highway system‘ multimedia content is stores in the for of electronic documents
 These are often digitized
 On the I-way messaging software fulfills the role, in any no. of forms: email, EDI, or point-to-point file
transfersEncryption & authentication methods to ensure security
 Electronic payment schemes developed to handle complex transactionsThese logistics issues are difficult
in long-established transportation.
1.4. Comparison of Traditional commerce and E-commerce
1.5. ANATOMY OF E-COMMERCE APPLICATIONS

E-Commerce applications are:

1. Multimedia Content for E-Commerce Applications

2. Multimedia Storage Servers & E-Commerce Applications

i. Client-Server Architecture in Electronic Commerce

ii. Internal Processes of Multimedia Servers

iii. Video Servers & E-Commerce


3. Information Delivery/Transport & E-Commerce Applications

4. Consumer Access Devices

1.Multimedia Content for E-Commerce Applications

• Multimedia content can be considered both fuel and traffic for electronic commerce Applications.
• The technical definition of multimedia is the use of digital data in more than one format, Such as the
combination of text, audio, video, images, graphics, numerical data, Holograms, and animations in a
computer file/document.
• Multimedia is associated with Hardware components in different networks.
• The Accessing of multimedia content depends on the hardware capabilities of the Customer.

2. Multimedia Storage Servers & E-Commerce Applications:

• E-Commerce requires robust servers to store and distribute large amounts of digital content To consumers.
• These Multimedia storage servers are large information warehouses capable of handling Various content,
ranging from books, newspapers, advertisement catalogs, movies, games, & X-ray images.
• These servers, deriving their name because they serve information upon request, must Handle large-scale
distribution, guarantee security, & complete reliability

1. Client-Server Architecture in Electronic Commerce

• All e-commerce applications follow the client-server model


• Clients are devices plus software that request information from servers or interact known As message
passing
• Mainframe computing , which meant for “dump”
• The client server model, allows client to interact with server through request-reply sequence governed by
a paradigm known as message passing.

• The server manages application tasks, storage & security & provides scalability-ability to Add more
clients and client devices (like Personal digital assistants to Pc’s. See in fig.

2. Internal Processes of Multimedia Servers

• The internal processes involved in the storage, retrieval & management of multimedia Data objects are
integral to e-commerce applications.
• A multimedia server is a hardware & software combination that converts raw data into Usable information
& then dishes out.
• It captures, processes, manages, & delivers text, images, audio & video.
• It must do to handle thousands of simultaneous users.
• Include high-end symmetric multiprocessors, clustered architecture, and massive parallel Systems.
3. Video Servers & E-Commerce
The electronic commerce applications related to digital video will include

3.1. Telecommunicating and video conferencing


3.2. Geographical information systems that require storage & navigation over maps
3.3. Corporate multimedia servers
3.4. Postproduction studios
3.5. Shopping kiosks.

• Consumer applications will include video-on-demand.


• The figure which is of video–on demand consist video servers, is an link between the Content providers
(media) & transport providers (cable operators).
1.6. The Network Infrastructure for E-Commerce

Information Super Highway (I-Way):

• Electronic commerce needs a network infrastructure to transport the content-text, audio, video, graphics
etc.
• The network infrastructure that provides such a data transmission facility is called I-Way or information
super highway.
• Thus, information super highways can be defined as the high capacity, electronic and interactive pipeline
to the consumer or business premise that is capable of supporting large number of ecommerce applications
simultaneously.
• It is called interactive because it provides two-way communication between users and service providers
or between one user and another user.
• It is called high-capacity electronic pipeline because it must provide broadband link.
• Historically, the voice and data networks have evolved separately, with voice networks relying on circuit
switching and data networks using packet switching techniques.
• Thus, a business user requiring voice, data, and video conferencing services often had to use three separate
networks- a voice network, a data network, and a videoconferencing network.
• I-way provides integration solution to the shortcoming of the need to have separate network for voice,
data and video services respectively.
• Nowadays information super high way is emerged as basic network infrastructure for all ecommerce
activities due to its capability of providing integrated text, graphics, audio, and video services.

1.7. Components of the I-Way:


• Various components contained in I-way can be broadly divided into three categories: Consumer access
equipment, Access Roads or Media, and Global Information distribution network.

Consumer Access Equipments:


• These are the devices at consumer end and enables consumers to access the network. It consists of
hardware and software.
• Hardware component includes devices such as computers, modems, routers, switches etc. for computer
networks, set-top boxes, TV signal descramblers etc. for television networks, Cell phones etc. for cellular
networks and so on.
• And software systems installed in those hardware devices includes browsers, operating systems etc.
• The type of consumer access equipment used depends upon the communication mode used. These
equipments are also called customer premise equipments or terminal equipments.

Access Roads/Media (Local on Ramps)


• These are the network infrastructure that provides linkage between businesses, homes, and schools to
global information distribution network. This component is often called the last mile in telecommunication
industry.
• Access road providers can be divided into four categories: Telecom based, Cable TV based,
Wireless based, and Computer based online systems.
• Main function of access roads is to connect consumers with e-commerce applications.

Telecom Based Access Roads


• Telecom industries provides high speed electronic pipeline which is capable for carrying large volume of
audio, video, and text data.These industries provide network infrastructure for long distance and local
telephone communication.
• This network infrastructure is useful for ecommerce application to be connected with Global
Information Distribution Network.
• Main limitation of telecom-based access roads is that it continues to depend on analog transmission of
data although the industry is rapidly introducing advanced digital transmission technologies.
• However, most of the trunk lines are replaced with high-capacity optical fiber in recent days, local loops
are still connected by using copper wire. The customers are constrained with limited capacity of these wires.
• Thus, the telecom industries need to replace these copper wires with high-capacity optical fiber to handle
expected flood of information from ecommerce applications.
Cable TV Based Access Roads
• Cable television systems also provides high-capacity broadband network infrastructure to connect large
number of customers with their system.
• These systems adopt digital transmission of data and have a lot of unutilized capacity which can be useful
for transmitting information from ecommerce applications to customers.
• Cable TV based systems can be of two types: wired cable TV, wireless cable TV.
• In wired cable TV based systems connects customers mainly by using coaxial-cables. But in recent days
they are replacing trunk lines from optical fibers whereas local loops are based on coaxialcable links.
• This further strengthened the capacity of cable TV based network infrastructure and provides ecommerce
applications with more capacity links.
• Now, cable TV companies have started to use wireless communication to connect customer homes in cost
effective way rather than using optical fiber or coaxial cable-based interconnection.
• Direct Broadcast Satellite (DBS) is used for wireless cable TV transmission. It uses Super high frequency
(SHF) channels to transmit data over the air.
• These signals are received by special antennas mounted in roofs of subscribers and then it is distributed
within the building with help of coaxial cable.
• With help of DBS, it is easy to make cable TV in rural areas at affordable cost.
• Thus, emergence of wireless cable TV infrastructure makes it easy to provide ecommerce services in rural
areas also.
• Although there are lots of benefits of wireless cable TV network infrastructure, it also suffers from
limitations. For example, heavy rainfall may cause picture quality degradation or interruption.
Wireless Based Access Roads
• Wireless operators provide network infrastructure by using radio frequencies which are Omni directional
waves and have high penetration power.
• The wireless-based systems have revolutionized the ways of thinking about information delivery.
Technology is the most important factor.
• The rapid growth in technology has impacted the wireless industry in a number of ways:
o Apart from the voice calls, the cellular technology today has also facilitated short messaging
services (SMS) using alphanumeric display and the multimedia services.
o Internet connectivity using the cellular networks has been made possible.
o The cellular networks using the analog technology are now upgrading to digital networks to
provide greater capacity at lower costs as well as increase the quality and functionality of the
cellular network.
o Applications have been developed to facilitate mobile workers to exchange messages and data
from their offices while on the road.
• Thus, wireless based access enables customers to access ecommerce application from anywhere at any
time and ecommerce service providers can provide content and services to customers on the basis of
location.

Computer Based Online Systems


• The Internet is the global system of interconnected mainframe, personal and wireless computer networks
that use the protocol suite TCP/IP to link billions of devices worldwide.
• It is a network of networks that consists of millions of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking
technologies.
• Internet, intranets and extranets are providing online services which provides 24-hour computer based
supermarkets to customers.
• It targets a wide range of ecommerce applications such as video on demand, home shopping, email,
information publishing, information retrieval, video conferencing and many more.
• The demand of these online services is increased dramatically due to widespread use of PCs in homes and
businesses.
• Due to low hardware costs and enhanced graphics and multimedia support, customers are fast attracted
towards online services entertainment, education, shopping, and information services.
• ISP provides Internet access, employing a range of technologies to connect users to their network and thus
provides access roads for ecommerce applications,
1.8. GIDN (Global Information Distribution Network)
• The global information distribution networks consist of the infrastructure crossing the countries and
continents.
• They include the long-distance telephone lines, satellite networks, and the internet. Long distance
telephone connectivity is provided through cable by the inter-exchange carriers.
• Long distance cellular networks are using the wireless technologies to connect the consumers worldwide.
• Satellite networks play a vital role in the communication industry. They have advantages over the
terrestrial networks in that:
o They are accessible from any point of the globe.
o They can provide broad band digital services to many points without the cost of acquiring
wire/cable installation.
o They can add receiving and sending sites without significant additional costs.
Requirement of I-Way
• The success of e-commerce-based business depends on the information flow and to make information
flow smooth and capable I-way is required.
• The success or failure of any creativity, product or services is a key driver of market forces.
• The underlying of market drives of I-way is important because e-commerce applications are dependent
on the underlying I-way.
Functions of I-Way
• It develops business relationship among all sorts of business and with people all around the world by the
help of global information distribution network.
• It is used for communicate between the business partners at any locations through the network
communications.
• It acts as an information system for any organizations.
• I-Way controls unwanted information distributed over the complex network.
• It allows multiple forms of messages, sent and received over the same network.
1.9. Issues of Public Policy E - Commerce
Introduction
In information traffic, public policy issues deal with the cost of accessing information, regulation to protect
consumers from fraud and to protect their right to privacy and the policing of global information traffic to
detect information, pirating standards are crucial in the world of global e-commerce to ensure not only
seamless and harmonious integration across the transportation network but access of information on any
type of device the consumer chooses and on all types of operating systems.

Major Issues of Public Policy


1. Legal issues
2. Ethical and privacy Issues
3. Regulations
4. Technical Standards
5. Compliances
6. Taxes

Public Policy Legal Issues INTELLECTUAL PROPERTY IN E-COMMERCE


Intellectual property(IP) Creations of the mind, such as inventions, literary and artistic works,
and symbols, names, images, and designs, used in commerce. IP is divided into two:

1. Industrial Property: Which includes inventions(patents), trademarks, industrial and geographic


indications of source.
2. Copyright: Includes literary and artistic works such as book, poems, songs, films, photographs

Public Policy 3 Digital rights management (DRM)


Several arrangements that allow a vendor of content in electronic form to control the material
and restrict its usage. Fair Use: The legal use of copyrighted material for non-commercial
purposes without paying royalties or getting permission.

Public Policy - Ethical Issues


Ethics the branch of philosophy that deals with what is considered to be right and wrong
Privacy: The right to be left alone and free of unreasonable personal intrusions. Public Policy –
Ethical Issues Ethical Issues and Social Networks Social Networks changing the landscape of
privacy and it Protection Example: the location-based application vs. privacy Free speech online
vs. Internet censorship Internet Censorship: the control or suppression of the publishing or
accessing of information on the Internet

Public Policy - INFORMATION SUPERHIGHWAY (I-Way)


Any successful E-commerce application will require the I-Way infrastructure in the same way
that regular commerce needs the interstate highway network to carry goods from point to point.
A myriad of computers, communications networks, and communication software forms the
nascent Information Superhighway (I-Way). The I-Way is not a U.S phenomenon but a global
one, as reflected by its various labels worldwide. For instance, it is also called the National
Information Infrastructure (NII) in the United States, Data-Dori in Japan and Jaring, which is
Malay for "net" in Malaysia. The
I-Way and yet-to-be developed technologies will be key elements in the business transformation.
And while earlier resulted in small gains in productivity and efficiency, integrating them into the
I-Way will fundamentally change the way business is done. These new ideas demand radical
changes in the design of the entire business process. I-Way is not one monolithic data highway
designed according to long-standing, well-defined rules and regulations based on well-known
needs. The I-Way will be a mesh of interconnected data highways of many forms: telephone
wires, cable TV wires, radio-based wireless-cellular and satellite. The I-Way is quickly acquiring
new onramps and even small highway systems.

1.10. Network Access Equipment


Hub: A hub, at the most basic level, is a “dumb” device that operates at the Physical layer of the
OSI model. A hub forwards all signals it receives to all connected network devices. Think of a hub
as a “drunk” – when he speaks, he speaks to all around him, even if he really only means to speak
with one person.

Switch: Because the hub is something of a “drunk,” it can be an inefficient (think about the excess
traffic created) and unsecure device. Imagine if you wish to send sensitive credit card information
over the network – do you really want every node to receive your electronic signal? To alleviate
this, the switch was developed. A switch operates at the Data Link layer of the OSI model. It uses
the MAC sub-layer to forward the relevant frames of information only to the intended recipient.
Messages can still be broadcast, but this is only an option and not the normal condition.

Bridge: A bridge also operates at the Data Link layer (aka Layer 2) and is used to connect two
(similar or dissimilar) physical network segments together, forming a larger inter-network. It can
forward packets or reject them based on their destination (MAC) address. Note: The connected
network segments must have same network ID.

Router: The router operates at the Network layer of the OSI Model and is used to forward packets
across network segments to reach a certain destination address. Do not be confused between a
router and a bridge – a bridge simply forwards packets or frames based on their destination address
from one connected network segment to another. A router can determine where a packet should
be sent to given its final destination (IP address). Usually, routers forward packets to other routers,
but sometimes routers also forward to other pieces of network equipment. A router is usually used
to connect a home computer to an “always-on” Internet connection through the home network.

Gateway: A gateway is any device that serves to interface with other networks using dissimilar
protocols . For example, a gateway might interface between a home network and the Internet or
between a NetBIOS network and an IPX/SPX network. A gateway operates in any of the seven
OSI layers.

WAP: A Wireless Access Point is a device that allows wireless devices to access and to
communicate with the network. It acts as a bridge between the wired, traditional network and other
wireless devices. Alternatively, it can act as a bridge between wireless devices and another, linked
WAP. It typically operates in the Network layer of the OSI model as a sort of router/bridge/switch
combination.
UNIT II

2.1. INTERNET AS A NETWORK INFRASTRUCTURE

Internet as a Network Infrastructure Computer Network Concept


lOMoARcPSD|28 488294

▪Computer Network : Networks are built with a mix of computer hardware and computer
software.
▪A network connects computers, but can also connect other devices such as shared printers,
removable media drives, scanners, and other equipment.
▪Networks enable people to share resources,
▪ Resources include printers, hard disks, and applications. Can greatly reduce the costs of
providing these resources to each person in a company.
Internet as a Network Infrastructure Computer Network Concept
▪ Several terms are used to describe network devices such as hosts, nodes, workstations, peers,
servers, and clients.

Network host
▪ A host (also known as "network host") is a computer or other device that communicates with
others on a network.
▪ Hosts on a network include clients and servers -- that send or receive data, services or
applications.
▪ Hosts typically do not include intermediary network devices like switches and routers, which
are instead often categorized as nodes.

Node
▪ A node is also a broader term that includes anything connected to a network, while a host
requires an IP address. In other words, all hosts are nodes, but network nodes are not hosts unless
they require an IP address to function. Internet as a Network Infrastructure Computer Network
Concept
▪ A typical network like the one in figure alongside has three basic hardware components:
▪ one or more servers or host computers (including microcomputers and mainframes), clients
(PCs), and a circuit or network system, which is the path over which they communicate.
Internet as a Network Infrastructure Computer Network Concept:

Network software
● In addition, servers and clients also need special-purpose network software that enables them
to communicate.
▪ The server stores data and software that the clients can access.
▪ Organization can have several servers working together over the network with client computers
to support the business application.
▪ The client is the input3output hardware device at the user9s end of a communication circuit.
▪ It provides users with access to the network, the data and software on the server, and other
shared resources.
▪ In fact, now a network does not need a computer designated specifically as a server.
▪ Most modern client computers are designed to support the dual roles of both client and server,
sharing resources to the network and, at the same time, accessing resources from the network.

Circuit
▪ The circuit (cable plant or transmission media) is the pathway through which the data or
information travels.
▪ Traditional wired networks typically use copper wire, although fiber-optic cable and wireless
transmission hybrid systems are common.
▪ There are also devices in the circuit that perform special functions such as hubs, switches,
routers, bridges, and gateways.. Internet as a Network Infrastructure Network Device Roles
▪ Figure alongside shows a small network that has four client PCs and three specialized server
PCs connected by a hub or switch and cables that make up the circuit.
▪ In this network, messages move through the hub to and from the computers. All computers
share the same circuit and take turns sending messages I 3 Way is defined as universal affordable
access to high performance network capable of carrying billions of bits per second in the context
of e-commerce.

2.2. Network Security and Firewalls

INTRODUCTION
Network Security protects your network and data from breaches, intrusions and other threats.
This is a vast and overarching term that describes hardware and software solutions as well as
processes or rules and configurations relating to network use, accessibility, and overall threat
protection. Network Security involves access control, virus and antivirus software, application
security, network analytics, types of network-related security (endpoint, web, wireless),
firewalls, VPN encryption and more.

Benefits of Network Security:


Network Security is vital in protecting client data and information, keeping shared data secure
and ensuring reliable access and network performance as well as protection from cyber threats. A
well designed network security solution reduces overhead expenses and safeguards organizations
from costly losses that occur from a data breach or other security incident. Ensuring legitimate
access to systems, applications and data enables business operations and delivery of services and
products to customers.

Types of Network Security Protections


● Firewall. Firewalls control incoming and outgoing traffic on networks, with predetermined
security rules. ...
● Network Segmentation. ...
● Remote Access VPN. ...
● Email Security. ...
● Data Loss Prevention (DLP) ...
● Intrusion Prevention Systems (IPS) ...
● Sandboxing. ...
● Hyperscale Network Security.

Firewall:
Firewalls control incoming and outgoing traffic on networks, with predetermined security rules.
Firewalls keep out unfriendly traffic and are a necessary part of daily computing. Network
Security relies heavily on Firewalls, and especially Next Generation Firewalls, which focus on
blocking malware and application-layer attacks.

Network Segmentation:
Network segmentation defines boundaries between network segments where assets within the
group have a common function, risk or role within an organization. For instance, the perimeter
gatewaysegments a company network from the Internet. Potential threats outside the network are
prevented,ensuring that an organization9s sensitive data remains inside. Organizations can go
further by definingadditional internal boundaries within their network, which can provide
improved security and accesscontrol.

Remote Access VPN:


Remote access VPN provides remote and secure access to a company network to individual hosts
or clients, such as telecommuters, mobile users, and extranet consumers. Each host typically has
VPN client software loaded or uses a web-based client. Privacy and integrity of sensitive
information is ensured through multi-factor authentication, endpoint compliance scanning, and
encryption of all transmitted data.

Zero Trust Network Access (ZTNA):


The zero trust security model states that a user should only have the access and permissions that
they require to fulfill their role. This is a very different approach from that provided by
traditional security solutions, like VPNs, that grant a user full access to the target network. Zero
trust network access (ZTNA) also known as software-defined perimeter (SDP) solutions permits
granular access to an organization9s applications from users who require that access to perform
their duties.

Email Security:
Email security refers to any processes, products, and services designed to protect your email
accounts and email content safe from external threats. Most email service providers have built-in
email security features designed to keep you secure, but these may not be enough to stop
cybercriminals from accessing your information.

Data Loss Prevention (DLP):


Data loss prevention (DLP) is a cybersecurity methodology that combines technology and best
practices to prevent the exposure of sensitive information outside of an organization, especially
regulated data such as personally identifiable information (PII) and compliance related data

Intrusion Prevention Systems (IPS):


IPS technologies can detect or prevent network security attacks such as brute force attacks,
Denial of Service (DoS) attacks and exploits of known vulnerabilities. A vulnerability is a
weakness for instance in a software system and an exploit is an attack that leverages that
vulnerability to gain control of that system. When an exploit is announced, there is often a
window of opportunity for attackers to exploit that vulnerability before the security patch is
applied. An Intrusion Prevention System can be used in these cases to quickly block these
attacks.

Worms:
Can slow down computer networks by eating up bandwidth as well as slow the efficiency of your
computer to process data. A worm is a standalone malware that can propagate and work
independently of other files, where a virus needs a host program to spread.

Trojan:
A trojan is a backdoor program that creates an entryway for malicious users to access the
computer system by using what looks like a real program, but quickly turns out to be harmful. A
Trojan virus can delete files, activate other malware hidden on your computer network, such as a
virus and steal valuable data.

Spyware:
Much like its name, spyware is a computer virus that gathers information about a person or
organization without their express knowledge and may send the information gathered to a third
party without the consumer9s consent.
lOMoARcPSD|28 488294

Adware:
Can redirect your search requests to advertising websites and collect marketing data about you in
the process so that customized advertisements will be displayed based on your search and buying
history.

Importance of Network Security

Secure Your Network With Check Point:


Network Security is vital in protecting client data and information, it keeps shared data secure,
protects from viruses and helps with network performance by reducing overhead expenses and
costly losses from data breaches, and since there will be less downtime from malicious users or
viruses, it can save businesses money in the long-term.Check Point9s Network Security solutions
simplify your network security without impacting the performance, provide a unified approach
for streamlinedoperations, and enable you to scale for business growth.

You might also like