Ecomm Bit
Ecomm Bit
ers all over the world. Efficient use of only meant for the use of educational and research customers all over the world.
activity of electronically buying or selling of products over resources: Availability of penty of information, no communities.● It was only in 2002, when the IRCTC -B2C business models:
Internet. ● E-commerce simply means the way of doing transportation cost and free entry into markets led to the introduced an online reservation system, that the public Portal: A web portal is a specially designed website that
business over the internet or we can simply state that having efficient use of resources that will in turn reduce both cost widely accepted the internet as something fruitful. ● E- brings information from diverse sources, like emails, online
the facility to sell and purchase things without having to visit and prices. Low investment: Running an ecommerce business commerce has transformed the way business is done in India. forums and search engines, together in a uniform way.
any physical store.● E-commerce is concerned with the buying requires far less capital investments compared to owning ● The Indian E-commerce market is expected to grow to US$ Portals do not sell anything directly. Portals make income
and selling of information, products and services over physical shops. The responsibility of e-commerce seller in an 200 billion by 2026 from US$ 38.5 billion as of 2017. ● Much mainly through advertisement, collecting referral fees for
communication network.● E-commerce helps to conduct online shop is to promote the website and deliver quality of the growth for the industry has been triggered by an directing customers to other sites, and charging for
traditional commerce throughnew ways of transferring and products on-time to the customers.Employment increase in internet and smartphone penetration. ● As of premium services. E-tailer: Those firms who engaged in
processing information. ● Electronic Data Interchange (or EDI) opportunities: The indirect employment generated in August 2020, the number of internet connections in India online retailing are called e-tailers. E-tailers are very similar
is an early form of e-commerce. industries like logistics, warehousing, IT and small and significantly increased to ~760 million, driven by the ‘Digital to an ordinary retail store, except that customers only have
History of E-commerce1970s:● E-commerce meant the medium enterprises, and other support industries like India’ programme.● Factors such as increased use of to connect to the internet to check their inventory and place
facilitation of commercial transactions electronically, using payment solutions, marketers and advertisers. Quick and smartphones convenient and economic internet access lead to an order. Amazon.com is an example. Content provider: An
technology such as Electronic Data Interchange (EDI) and speedy Disposal of Customers: Internet related technology the growth of ecommerce. This is also lead to the increase in Internet content provider is a website or organization that
Electronic Funds Transfer (EFT), allowing businesses to send can process transactions at a great speed and it takes less the sales through mobile commerce. ● Companies have handles the distribution of online content such as blogs,
commercial documents electronically.● EDI replaced time to complete formalities with minimum introduced return policies ranging from 7 - 30 days, free home videos, digital news,photos,music or files. Content providers
traditional mailing and faxing of documents with a digital investment.Managing competition: In this competitive delivery and “cash on delivery” model. ● It is estimated that make money by charging a subscription fee. Transaction
transfer of data from one computer to another.● EDI is a market, those who satisfy and exceed customer’s most of all online transactions in India are based on the cash broker: A transaction brokerage provides third-party real
process which allows one company to send information to expectations are going to experience tremendous sales. on delivery (COD) payment methodology. estate services to buyers and sellers. Instead of acting as an
another company electronically rather than with paper. ● Emergence of the Internet:The origin of internet was rooted E-transition challenges for Indian corporates:The internet is agent for the buyer or seller, the transaction broker can be
Many business documents canbe exchanged using EDI, but the in 1950’s when the cold war was at its peak between America changing the way of business in all industries and corporate described as a professional assistant. Middleman roles of
two most common are purchase orders and invoices.● and the Soviet Union.● A need was realized to connect the top companies in India. ● Indian corporate executives are facing facilitating search, contract, regulation and maintenance.
Business entities conducting business electronically are called universities of US. ● The first workable prototype of the several challenges since they want to move with IT based The brokers earned commissions each times a sales
trading partners.● Electronic funds transfer (EFT) are Internet came in the late 1960s with the creation of ARPANET, technologies for effective performance. transaction is made. Market creator: Market creators
electronic transfer of money from one bank account to or the Advanced Research Projects Agency Network.● Used These challenges are mainly classified as : provide a digital environment in which buyers and sellers
another, either within a single financial institution or across packet switching to allow multiple computers to communicate 1)Internal resisting issues can meet, display products,search for products and fix
multiple institutions, via computer-based systems, without the on a single network.● In 1969, ARPAnet delivered its first Bureaucratic resistance: Ecommerce may compel staff to prices. Example : eBay.com
direct intervention of bank staff. 1980s: ● The growth and message, a node-to- node communication from one computer follow newmethod of operation instead of traditional way Business to Business (B2B)Business-to-business (B2B) is a
acceptance of credit cards ● Automated teller machines (ATM) to another. ● The message—“LOGIN”—was short and simple, doing things. The fear among staff is a major barrier for a situation where one business makes a commercial transaction
● Telephone banking,.Airline reservation system. 1990s: The but it crashed the ARPA network anyway: The receiver transition to ecommerce. Cultural changes: Implementation with another business. ● Business- to-business (B2B) is a form
internet commercialized andusers flocked to participate in the computer only received the note’s first two letters. ● Cheaper of e commerce is done by young tech talents. They come in of transaction between businesses, suchas one involving a
form of dot-coms or internet startups.2000s:Many European technology and the appearance of desktop computers in the the organization with modern culture that are entirely manufacturer and wholesaler, or a wholesaler and a retailer.
and American business companies offered their services early 1980 have allowed the rapid development of local area different from traditional culture maintained by the existing Business-to-business refers to business that is conducted
through the World Wide Web.Since then people began to network (LAN) and as a result, the internet flourished. staff. Lack of preparation: Going for ecommerce require a between companies, rather than between a company and
associate the term ‘e-commerce’ ● Amazon.com was one of Emergence of World Wide Web:In 1989, Tim Berners Lee, good amount of home work. Lack of adequate preparation individual consumer
the first ecommerce sites in the US to start selling products published a proposal to build a “Hypertext project” called, is one of the challenges for effective transition to B2B business models: ● E-distributor: Companies that supply
online andthousands of businesses have followed since. ● “World Wide Web.” ● The World Wide Web (WWW), ecommerce. Lack of resources: Lack of funds, non products and services directly to individual businesses are e-
Amazon was one of the first online retailers to add user commonly known as the Web. ● It is an information system availability of expert staff, absence of trainingfacilities to distributors.● E-procurement: E-procurement is the B2B
reviews with a rating scale for products. Customer reviews are where documents and other web resources are identified by the existing employees are major barriers facing by purchase and sale of supplies work and services through
now considered the most effective social media tactic for Uniform Resource Locators (URL) which may be interlinked by organisation. internet. Elements for e-procurement include request for
driving sales. hypertext, and are accessible over theInternet.● The 2)External driving forces information, request for proposal, request for quotation
● Traditional vs E-commerce resources of the WWW may be accessed by users by a Strong competition: Now competitions are the part of any etc.● Exchanges (B2B hubs): A B2B hub is a digital
software application called a web browser. ● The first web business and companies are implementing new techniques marketplace where many suppliers meet a smaller number of
Traditional Commerce E-Commerce
browser was called WorldWideWeb when it was written in every day to face the attack from their competitors. very large commercial purchasers. Exchanges are owned by
1990 it was the only way to see the web. Much later it was Increase expectation of consumers: The expectation of independent firms whose business is creating a market and
Heavy dependency on Information sharing is made renamedto Nexus. ● Mosaic was the first browser to display consumers about quality and servicesare very high, so it they makeprofits by charging a commission or fee based on
information exchange from easy via electronic
person to person. communication channels images next to text, rather than in separate window. ● Today, works like driving force for ecommerce. the size of the transactions conducted among trading parties.
making little dependency on the major web browsers are Chrome, Safari, Internet Explorer, Government regulations: In order to regulate ecommerce Benefits of B2B: ● Helps to remove barriers raised by
person to person information Firefox, Opera, and Edge. business and other internet related activities the IT Act geographic fragmentation of the market. ● Suppliers
exchange. Advantages of E-commerce:International market: The market gives various provisionswhich provide a right environment discover new buyers. ● Enhances transparency. ● Both the
for web based business is not restricted by any geographical for the ecommerce.Technologicalchanges: Technology is a buyers and sellers enjoy reducedorder processing costs and
Communication/ transaction Communication or transaction boundaries. E-commerce enables business firms to have access factor which provides e commerce an opportunity to lower cost of interacting with each other.
are done in synchronous can be done in asynchronous to people all around the world. become and perfect solution for business. Consumer to Consumer (C2C):It consists of individuals using
way. Manual intervention is way. Electronics system
required for each automatically handles when to Operational cost savings: The cost of creating, processing, Business models for e-commerce:- the internet to sell products and services directly to other
communication or pass communication to distributing, storing and retrieving paper \ based information Business model is a set of planned activities designed to individuals.● A common example is the online auction, in
transaction. required person or do the has decreased.Mass customisation: E-commerce has result in aprofit in a marketplace. ● In order to develop a which a consumer posts an item for sale and other consumers
transactions. revolutionised the way consumers buy goods and services. In successful business model, it is essential that the model bid to purchase it. The third party generally charges a
the e-commerce environment firms are able to customise effectively addresses the eight elements : commission.● The sites are only intermediaries, just there to
their products and services tothe customer’s requirements. Value proposition: It defines how a company’s product or match consumers.● It is essential that both the seller and the
It is difficult to establish and A uniform strategy can be Lower telecommunications cost: It is less costly to service fulfils the needs of customers. Revenue model: It buyer must register with the auction site.● While the seller
maintain standard practices easily established and communicate over internet.Digitisation of products and describes how the firm will earn revenue, make profits, and needs to pay a fixed fee to the online auction house to sell
in traditional commerce. maintain in e-commerce. processes: Digitisation of products and processes particularly producea better return on invested capital. The major their products, the buyer can bidwithout paying any fee. ● The
in the case of software and music/video products, which can revenue models are : advertising model, subscription highest bidder at the end of the bidding period purchases the
Communications of business In e-Commerce or Electronic be downloaded or emailed directly to customers via the model, transaction fee model, sales model, affiliate model. item. The site then provides connection between the seller and
depends upon individual Market, there is no human internet in digital or electronic format within 24 hour time. Market opportunity: It refers to the company’s proposed buyer to complete the transaction.Eg: eBay
skills. intervention. Benefits of E-commerce to consumers :Easy market space and the overall potential financial Business to Government (B2G):Business-to-government (B2G)
Accessibility: Ecommerce enables customers to shop or opportunities available to the firm in that market space. is a business model that refers to businesses selling products,
Unavailability of a uniform E-Commerce website conduct transactions 24 hours a day, all year round from Competitive environment: It refers to the state where services or information to governments orgovernment
platform as traditional provides user a platform almost any location.More choices: Customers can now other companies selling similar products and operating in agencies. ● B2G networks or models provide a way for
commerce depends heavily where all information is
on personal communication. available at one place.
choose a wide range of products and customise. Customer the same market space.Competitive advantage: Firms businesses to bid on government projects or products
can buy goods and services even from international achieve a competitive advantage when they can produce a thatgovernments might purchase or need for their
suppliers.Price comparisons: Customers can make price superior product and/or bring the product to market at a organizations.● Public-sector organizations generally post
comparisons either directly by visiting different sites, or by lower price than their competitors. Organizational tenders in the form of requests forproposals, requests for
Features of E-commerce:Non-Cash Payment: ○ E-Commerce visiting a single site where prices of different sellers are development: All firms need an organization to effectively information, requests for quotations to which private
enables the use of credit cards, debit cards, electronic fund exhibited.Improved delivery processes: This can range implement their business plans and strategies.Market suppliers respond. ● One of the main B2G activities is paying
transfer via bank's website, and other modes of electronics from the immediate delivery of digitised or electronic strategy: It is the plan that details exactly how we can enter government taxes and fees online such as vehicle tax,
payment.24x7 Service availability (Ubiquity):○ E-commerce goods such as software oraudio visual files by downloading a new market and attract new customer. Management property tax and income tax.
automates the business of enterprises and the way they via the internet, to the online tracking of the progress of team: The most important element of a business model is Consumer to Business(C2B):It is a business model in which
provide services to their customers. It is available anytime, packages being delivered by mail or courier. the management team responsible for making the model consumers (individuals) create value and businesses consume
anywhere. Consumer can enjoy convenience and want to take limitations of Ecommerce work. that value. For example, when a consumer writes reviews or
only least effort to make purchases.Advertising / Marketing:○ E-Infrastructural issues: Internet is the backbone of E-business models based on the relationship of when a consumer gives a useful idea for new product
E-commerce increases the reach of advertising of products ecommerce. In India, internet penetration is low. Logistics & transaction parties development then that consumer is creating value for the
and services of businesses. It helps in better marketing supply chain: Logistics failure in any area leads to very Business to Consumer (B2C) business if the business adopts the input. ● Another form of
management of products/services.ImprovedSales: ○ Using e- harmful damage to company’s future and can hurt the brand It consists of the sale of products or services from C2B is the electronic commerce business model in which
commerce, orders for the products can be generatedanytime, overall.Branding & marketing: To get peopleto come on an business to the general public. ● Here, businesses directly consumers can offer products and services to companies, and
anywhere without any human intervention. It gives a big boost e-commerce site and make a purchase involves heavy cost sell to the end customer. the companies pay theconsumers.● It is a business model
to existing sales volumes.Support: ○ E-commerce provides due to branding and marketing.Security: There are numerous However these websites require huge investment in terms of where an end user or consumer makes a product or service
various ways to provide pre-sales and post-sales assistance to reports of websites and databases being hacked to, and advertisement effort, hardware and software required to that an organization uses to complete a business process or
provide better services to customers. Inventory security loopholes in software. Security and privacy: Privacy support themany millions of hits that they experience. ● To gain competitive advantage.● The C2B methodology
Management:○ Product inventory management becomes very of an individual customer is greatly affected because of maintain consumersalways with company's website, the completely transposes the traditional business -to- consumer
efficient and easy to maintain. Global reach: ○ Buying selling sharing some critical information about a customer. Pressure company must update the information on the web regularly. (B2C) model, where a business produces services and products
has now become more convenient and cost effective than in for innovation: Pressure to innovate and develop business -B2C process: ● Consumer visits site ● Customer register ● for consumer consumption.
traditional commerce. ○ The everincreasing number of models to exploit the new opportunities may sometimes Ordering● Payment● Shipment and delivery ● Service and *E -business models based on the relationship of transaction
customers in an ecommerce business is a good indicator for leads to strategies harmful to the organization.Price wars: support. -Examples: 1. Amazon 2. Google 3. Facebook 4. types
their expansion and popularity. Facing increased competition from both national and Flipkart *Brokerage model:Brokers are market makers. ●They bring
Importance of E-commerce: international competitors often leads to price wars and -Benefits of B2C: ●Lower marketing cost:*Expenses relating buyers and sellers togetherand facilitates transactions.
Consumer sovereignty: Consumer is the king in the market. subsequent occurrence of losses for the marketing is comparatively cheap in electronic medias than ●Usually a broker charges a fee or commision for each
Can shop anytime,anywhere and in any device. Orders can be organization.Computer literacy: A basic technical knowledge traditional medias. It can also catch the attention of large transaction it enables.
placed overthe internet and goods are delivered at the is required of both computing equipment and navigation of number of consumers with minimum expenses.● Lower Advantages of brokerage model: ● Allow buyers and sellers
doorsteps of consumers. Customisation: High quality the internet and the world wide web.No personal contact: order processing cost: *Business firms can check orders to tradedirectly bypassing intermediaries. ● Reduces cost for
relationship between buyer and seller is essential for Customers are more comfortable in buying products from customers and ensure its accuracy before proceeding both the parties
retaining customers in e-commerce environment. It becomes physically face to face. Customers are unable to touch and delivery goods.● Better customer service: Customers can *Global reach ● Provide continuous up to date information.
necessary for the company to enhance customer loyalty; feel goods being sold online. A lack of trust exists because visit the website at any time on other convenience and get Aggregator model:In the model a firm not produce or
otherwise the customer is full of choice to jump from one they are interacting with computers. all information regarding various matters online.● Lower warehouse any item or products. ●They collect or aggregates
website to another.New markets: It is easier to penetrate E-commerce in india:The concept of e-commerce first customer support cost: Customers can refer to the website information on goods and services from several competing
and reaching of the customers across the world within formally came forth in 1991, a time when internet practically for basic questions and doubts, so that number of customer sources at its website. They are known as information
minutes over internet. The net enables marketers to did not even exist in India. ● Commercial internet services in service staff can be reduced.● Wider markets: The website aggregators. ● Information aggregators are entities that
introduce and promote new products to meet the needs of india were launched only in 1995. Before that, internet was is open and accessible at any time on any day that reaches collect information from a wide range of sources. Types of
aggregators: ●Content aggregators ●Mainstream parts : FTP client and FTP server. ○ FTP client is the software OSI reference model: Information/Internet agents: The intelligent part of software
aggregators,Event aggregators ●Shopping aggregators that execute on local computer to send and receive files. ○ The international organization for standardisation (ISO) which can automatically search for information on the
Infomediary model:An organiser of virtual community is FTP server is software which executes on a server machine on designed the open systems interconnection (OSI) reference website is termed as information agents. Information system
called an information intermediary or infomediary, which helpswhich the files are to be saved or retrieved. model that uses structured layers. ● The OSI model can be considered as knowledge base system. Reactive
sellers to collect,manage, and maximize the value of Chat: Online chat may refer to any kind of communication describes a structure with seven layers for network agents: Reactive agents act/respond in a stimulus-response
information about consumers.● It is characterized by the over the Internet that offers a real-time transmission of text activities. ● One or more protocols are associated with each manner to the present state of theenvironment in which
capture and/or sharing of information.● The simplest form of messages from sender to receiver. ○ Main protocol used in layer. ● A system that implements protocol behavior they are embedded. Hybrid agents: Hybrid agents refer to
infomediary model is the registration model. Here, companies chat is Internet Relay Chat (IRC). consisting of a series of these layers is known as a protocol those agents whose constitution is a combination of two or
require users to register before gaining access to information Interactive text oriented communications stack. Seven layers are : Physical layer: It is responsible for more previous mentioned agents. They may be mobile,
on their website.● Registration is a condition for viewing or (TELNET) the actual physical connection between the devices. The interface, information,collaborative or reactive.
downloading the articles so the company can capture contact Telnet is an application protocol used on the Internet or physical layer contains information in the form of bits. It is Heterogeneous agents: It refer to an integrated set up of at
information and other data and use it to make sales calls. local areanetwork to provide a bidirectional interactive responsible for transmitting individual bits from one node least two or more agents which belong to two or more
Types of infomediaries: ● Specialized agents ● Generic agents text-oriented communication facility using a virtual to the next. Data Link layer: The data link layer is different agent classes. A heterogeneous agent system may
● Supplier agents ● Buyer agents terminal connection. responsible for the node to node delivery of the message. also contain one or more hybrid agents.Smart agents: Smart
Community model:The e communities are formed when Usenet NewsGroups:It is a discussion group where people can The main function of this layer is to make sure data transfer agents are the new form of software agents that interface
groups of people meet online tofulfil certain needs or serve share views on topic oftheir interest. ○ Newsreader software is error- free from one node to another, over the physical with other agents forming an artificial intelligence. SMART
their common interest, exchange information, share interests, is used to read the content of newsgroups. ○ NNTP (Network layer.Network layer:Network layer works for the stands for System for Managing Agents for Real Time. These
trade goods and services, entertain and seek help.● News Transfer protocol) is used fortransporting usenet news. transmission of data from one host to the other located in agents can learn, co-operative and autonomous. When all
Communities utilize electronic tool such as forums, chat Advantages of Client server technology Improves network different networks. It also takes care of packet routing i.e. these three qualities are combined in an agent, the agent will
rooms, message board and other interactive internet performance: Most of the data is processed on the server selection of the shortest path to transmit the packet, from become smart.
mechanisms, which are usually designed to the particular and only the result is returned to the client. This reduces the number of routes available. Transport layer: The data in Internet standards and specificationIn data communication, a
community. the amount of network traffic between the server and the the transport layer is referred to as Segments. It is standard specifies a set of procedures.● Standard helps to
Value chain model:A value chain for a product is the chain of client machine,which improves the network performance. responsible for the Endto End Delivery of the complete promote aconsistent and universal use of internet worldwide.
actions that are performed by the business to add value in Scalability: Thousands of users can access the same message. The transport layer also provides the ● The following organizations are principal players
creating and delivering the product. ● For example, when you database at the same time,and the database can store acknowledgement of the successful data transmission and The Internet Engineering Task Force(IETF) : It is a loosely self
buy a product from a website the value chainincludes the billions of records. Easy maintenance: Easier to maintain re-transmits the data if an error is found. Session layer: This organized group of people who make technical and other
business selecting products to be sold, purchasing the and repair or even relocate a serverwithout affecting the layer is responsible for establishment of connection, contributions to the engineering and evolution of the internet
components or tools necessary to build them from a clients. Greater security: Data is stored on servers which maintenance of sessions, authentication and also ensures and its technologies. The Institute of Electrical and
wholesaler or manufacturer, arranging the display, marketing generally have greater security than clients.Easy security. Presentation layer: The data from the application Electronics Engineers Standards Association(IEEE-SA: It is an
and advertising the product, and delivering the product to the development: A programmer can develop presentation layer is extracted here and manipulated as per the required organization within IEEE that develops global standards in a
client. components without knowing the business application format to transmit over the network. The functions of the broad range of industries including computers and
Subscription model:Users are charged a periodic, say daily, logic. presentation layer are Translation,Encryption/ networking. The Internet Society (ISOC): They are
monthly or annual fee to subscribe to service. ● The site may Communication switching:In large networks, there may be Decryption,Compression. Application layer: This layer also multinational,non profit organization. Their major goal is to
include both free content and“premium”(ie,subscriber or more than one paths for transmitting data from sender to serves asa window for the application services to access the ensure the open development, evolution and use of the
member only) content. receiver. ● Selecting a path that data must take out of the network and for displaying the received information to the internet for the benefit of people throughout the world. The
Affiliate model:It is a popular ecommerce relationship in available options is called switching. ● There are two popular user. internet Engineering Steering Group (IESG): This is a part of
which n online merchant agrees to pay an affiliate in exchange switching techniques: – circuit switching – packet switching TCP/IP protocol model ISOC and manages the internet standards process and
for providing an advertisement and link to the merchant’s site. Circuit Switching:Circuit switching is a switching technique It is also referred to as the internet protocol suite. ●It is the technical activities for the IETF. The internet architecture
● Each sale generated as a result of a customer “clicking that establishes a dedicated path between sender and set of communications protocol that implements the board (IAB): It is a technical advisory group of ISOC and
through” from an affiliate to the merchant results in a small receiver. ● A complete end-to-end path must exist before the protocol stack on whichthe internet and most commercial oversees internet architecture and protocols. The world wide
commision for the affiliate. communication takes place. ● When any network node wants network run. It contains four layers : Process/Application web consortium (W3C): W3C’s mission is to lead the world
Influencing factors of successful ecommerce:Website to send data, a call request signal is sent to the receiver and Layer: This layer performs the functions of top three layers wide web to its ful potential by developing protocols and
presentation● Accessible and easy to use website● Use new acknowledged back to ensure availability of dedicated path. of the OSI model: Application, Presentation and Session guidelines that ensure long term growth for the web.
technology● User friendliness● Offers● Adequate stock● This dedicated path is then used to send data.● ARPANET used Layer. It is responsible for node-to-node communication The American National Standards Institute(ANSI): ANSI
Select suitable mode of delivery● quickness circuit switching for communication over the network.● and controls user-interface specifications.Host-to- coordinates the standards system and approves American
Reasons for the failure of ecommerce:Poor management● Circuit switching is used in public telephone network. It is used Host/Transport Layer: This layer is analogous to the nationaldata processing and communications standards.
Poorly designed website● Lack of marketing● Selling the for voicetransmission. ● Fixed data can be transferred at a transport layer of the OSI model. It is responsible for end- ANSI does not develop standards.The international
wrong product● Poor order fulfilment● Poor customer service time in circuit switching technology. to-endcommunication and error-free delivery of data. Organization for Standardisation (ISO): It accepts and
World Wide Web:The World Wide Web (WWW), commonly Packet Switching:The packet switching is a switching Internet Layer: This layer parallels the functions of OSI’s certifies international standards for telecommunications.
known as the Web, is an information system where technique in which the message is divided into smaller pieces, Network layer. It defines the protocols which are ANSI is a member of ISO.
documents and other web resources are identified by Uniform and they are sent individually. ● The message splits into responsible for logical transmission of data over the entire Internet Service Provider (ISP):It is a company that provides
Resource Locators (URLs) which may be interlinked by smaller pieces known as packets and packets are given a network. Network Access/Link Layer: This layer customers with internet access. ● An Internet service provider
hypertext, and are accessible over the Internet. ● The unique number to identify their order at the receiving end. ● corresponds to the combination of Data Link Layer and (ISP) is an organization that provides a set ofservices for
resources of the Web are transferred via the Hypertext Every packet contains some information in its headers such as Physical Layerof the OSI model. It looks out for hardware accessing, using, or participating in the Internet. ● Internet
Transfer Protocol (HTTP), may be accessed by users by a sourceaddress, destination address and sequence number.● addressing and the protocols present in this layer allows for service providers can be organized in various forms, such as
software applicationcalled a web browser, and are published Packets will travel across the network, taking the shortest the physical transmission of data commercial, community-owned, non-profit, or otherwise
by a software application called a web server. path as possible. ● All the packets are reassembled at the IP Address:.IAn Internet Protocol address (IP address) is a privately owned. ● An ISP typically serves as the access point
HyperText Markup Language (HTML):The hypertext pages on receiving end in correct order. ● If any packet is missing or numerical label assigned to each device connected to a or the gateway that provides a user, access to everything
the web are all written using the hypertext markup language corrupted, then the message will be sent to resend the computer network that uses the Internet Protocol for available on the Internet.
(HTML), a simple language consisting of a small number of message. ● If the correct order of the packets is reached, then communication. ● There are two IP versions: IPv4 and IPv6. Traditional Marking:Essentially, marketing is the process of
tags to describe logical constructs within the text. ● HTML the acknowledgment message will be sent. ○ IPv4 defines an IP address as a 32-bit number ○ IPv6 creating or directing an organization to be successful in selling
elements are the building blocks of HTML pages. With HTML Network Routers:The router is a physical or virtual defines an IP address as a 128-bit number ● It helps to a product or service that people not only desire,but also are
constructs, images and other objects such as interactive forms internetworking device that is designed to receive, analyze, connect one computer to other devices on the network willing to buy. Methods of traditional marketing can include
may beembedded into the rendered page. and forward data packets between computer networks. ● A and all over the world.●IP address example : 192.6.132.0 ● direct sales, print advertising like magazine,newspapers etc
HyperText Transfer Protocol (HTTP):HTTP is the foundation of router examines a destination IP address of a given data An IP address is in the format of 4sts of decimal numbers Limitations: Expensive: Printing hard copy
data communication for the World Wide Web ● In the first packet, and it uses the headers and forwarding tables to separated by dots. ● The decimal set is in the range 0 to brochures,business cards, advertising for magazine is
phase of a HTTP transfer, the browser sends a request for a decide the best way to transfer the packets.● Router is also 255. Each and every set is called octet. expensive.Time consuming: Traditional marketing uses static
document to the server. ● In response to a query, the server known as an intelligent device as it can calculate the best route Domain Name System (DNS):The Domain Name System (DNS) text or advertising commercials to promote a product. If an
returns the document to the browser using one of the formats to pass the network packets from source to the destination is a hierarchical naming system forcomputers, services, or ad is placed in the newspaper, it can’t changeuntil another ad
acceptable to the browser. automatically. ● Routers have a routing table in it that is other resources connected to the Internet. ● Itis the Internet's is placed. Customization: With traditional ads, it is difficult to
Uniform Resource Locators (URL):URL, colloquially termed a refreshed periodically according to the changes in the system for mapping alphabetic names to numeric Internet target a specific customer. Specific market segments can be
web address is a reference to a web resource that specifies its network. In order to transmit data packets, it consults the Protocol (IP) addresses like a phone book maps a person's targeted, but not an individual.
location on a computer network and a mechanism for table and uses a routing protocol. name to a phone number. ● No two organizations can have E-Marketing vs Traditional Marketing Interactivity:
retrieving it. ● A URL consist of 3 major components: Network Switches :It is a hardware device that filters and the samedomain name. ● Eg : microsoft.com Companies can collect the responses of their consumers
First component specifies the protocol to be used to access forwards network packets. ● Most business networks today Software agents:Software agents are autonomous pieces of online, making them more dynamic and adaptive.
the document. for example, HTTP,FTP etc ■ Second use switches to connect computers, printers, phones and software that conduct several tasks delegated to them. ● An Immediacy: Traditional marketing takes more time to go
component specifies the node on the network from which the servers in a building or campus. ● When a switch receives a agent represents a person or organization and interact with from a concept to finished products. Cost: Every business
document is to be obtained. ■Third component specifies the data packet, it examines the data address, the sender and the others to accomplish a predefined task. strategy involves cost. Traditional marketing promotes the
location of the document on the remote machine. receiver and stores the memory, after which it then sends the *A software agent is the computer analogue of an products of a brand throughads on paper, magazine TV
Internet Client Server Architecture:Client server is a network datato the device that the data is meant for. autonomous robot. Characteristics: Autonomy: A software radio and more. Online marketing can carry a cost, but
architecture that divides functions into client and server connection oriented protocol: In connection oriented agent can initiate communication, monitor events, and there are numerous online marketing strategies that are
subsystems. ● A client is defined as a requester of services protocol, a connection is to be established before starting the perform tasks without the direct intervention of humans or virtually free.Coverage: In traditional marketing , coverage
and the server is defined as the provider of services. ● A user communication. ● When connection is established, others. Reactivity: A software agent responds in a timely of ourproducts will be printed on paper media or aired on
who wants to access information runs a www client on his information is sent and then releases the connection. ● fashion to changes in its environment.Proactivity: The ability television and radio. unfortunately , the exposure to
local computer. The client fetches documents from remote Connection oriented service is more reliable.● Example TCP to take the initiative and not only react to external signals. In products will be for short duration.Audience: Traditional
network nodes by connecting to the server. (Transmission Control Protocol) some cases, an agent can modify the goals or establish goals marketing is more effective for target customers which out
Client Server Applications connectionless protocol:In connectionless protocol, the data is of their own. Temporal continuity: Unlike regular computer of reach of internet. Tracking: It is difficult to keep track of
World Wide Web: ○ It is a collection of documents transferred in one direction from source to destination programs that terminate when processing is complete, an traditional marketing strategy. We need to put a lot of
distributed across the internet and linked together by without checking that destination is still there or not or if it agent continues to run monitoring system events that trigger effort and time consuming research to get information how
hyperlink links.○ Users access the web facilities via a client prepared to accept the message and hence connectionless its action. Cooperation or interactivity: An agent should be our customer behaviour against our products. On the other
called browser. E-mail: ○ The application that allows users to service protocol does not guarantees a message delivery. ● able to interact with other agents. hand, online marketing is easy to track.
send, receive and read email. ○ Attachments that can be Each message is routed independently from source to Types of software agents:Collaborative agents:it emphasis Identifying Web presence goals:An effective website is one
added along with email make it as a general file delivery destination. ● The order of message sent can be different autonomy and cooperation with other agents in order to that creates an attractive presence that meets the objectives
mechanism. from the order received. ● Example UDP (User Datagram perform tasks for their owners. Interface agents: it emphasis of the business or other organizations. These objectives
Protocols used in email are: Protocol) autonomy and learning in order to perform tasks for their include : ■ Attracting visitors to the website. ■ Making the site
1)POP ( Post Office Protocol ): ○ Used to send email from a Internet protocol suite:A protocol stack or suite is a complete owners.the agent observes and monitors the actions taken by interesting enough ■ Convincing visitors to follow the sites
mail server to email clients inbox.POP mail is downloaded to set of protocol layers that work together to provide the user in the interface,learns new short cuts, and suggests links ■Building a trusting relationship with visitors. ■
email client directly and does not stay on the server by networking capabilities. ● Most network protocol suites are better ways of doing task. Interface agents learn to better Reinforcing positive images of the organization ■ Encouraging
default. 2) IMAP ( Internet Message Access protocol ): ○ Used structured as a series of layers, sometimes referred to assist its users in four ways :1. By observing and imitating the visitors to return to the site.
for retrieving email messages from email server. Email from collectively as a protocol stack. ● Each layer is designed for a user. 2. Through receiving positive and negative feedback Information system security:Security refers to the policies,
IMAP servers are stored on the server and not downloaded specificpurpose and exists on both thesending and receiving from the user. 3. By receiving explicit instructions from the procedures and technical measures andto prevent
to the mail client. 3) SMTP ( Simple Mail Transfer Protocol ): ○ hosts. ● Each is designed so that a specific layer on one user 4. By asking other agents for advice. unauthorised access,alteration,theft or physical damage to
Used for sending email messages between mailservers. Also machine sends or receives exactly the same object sent or Mobile agents: Mobile agents are software processes information systems. ● The main objective of information
used to send messages from a mail client to a mail server. received by its peer process on another machine. ● Each layer capable of roaming wide area networks such as the WWW, security are :Availability objective: Information should be
File Transfer Protocol:It is a standard network protocol used on ahost acts independently of other layers on the same interacting with foreign hosts, gathering information on available and usable whenever it is required. Confidentiality
for the transfer of computer files between a client and server machine, and in concert with the same layer on other hosts. ● behalf of its owner and coming back home having performed objective: This objective states that information should be
on a computer network. ○ FTP allows upload and download The two Reference Models are : ■ OSI reference model ■ the duties set by its user. available to only those who have the right to access it.Integrity
files from computer via internet. ○ FTP is composed of two TCP/IP reference model objective: As per this objective, informationshould be
protected from unauthorised alteration and modification. Depending on the nature of the action, the attacker might username and password whenever they want to access the are posted against thecustomer’s account and the customer
Security on the internet:Web security is also known as be able to gain full control over the user's account. .● Cross- system. Resource protection: Important task of a firewall is to is billed for this amount later or subsequently pays the
“Cybersecurity”. It basically means protecting a website or siterequest forgery, also known as one-click attack or protect the network resource from outside threats. balance of the account to the payment service.
web application by detecting, preventing andresponding to session riding and abbreviated as CSRF is a type of malicious Recording and reporting of events: Records all information Credit card as e-payment system:
cyber threats. ● It is a system of protection measures and exploit of a website where unauthorized commands are about policy violated activities and reports it to Credit cards are most widely used and convenient method.
protocols that can protect our website or web application submitted from a user that the web application trusts. administrator. Preventing access to information: It also used ● Creditcard is a small plastic card with a unique number
from being hacked or entered by unauthorized personnel. Clickjacking attack: Clickjacking is an attack that tricks a to limit the activities of their users on the internet. Enforcing attached with an
Network and web security risks:Hacking: Hacking is user into clicking a webpage element which is invisible or policy: Firewall enforce the rules about which network traffic account. ● When a customer purchases a product via credit
unauthorized intrusion into a computer or a network. ● The disguised as another element. ● This can cause users to is allowed to enter or leave a network. Auditing: If a security card, credit card issuer bank pays on behalf of the customer
person engaged hacking activities is generally referred to as a unwittingly download malware, visit malicious web pages, breach occurs, audit trails can be used to help determine and the customer has a certain time period after which
hacker.● A hacker is a person who gains unauthorised access provide credentials or sensitive information, transfer what had happened. he/she can pay the credit card bill. .● Cards are issued to
to a computer network for profit, criminal mischief or money, or purchase products online. Legal and ethical issues customers on the basis of their income level, credit history,
personal pleasure. ● Types of hackers : ■ White hat hackers ■ Social engineering attack:● It happens when the user Ethical issues deal with what is considered to be right and and total financial soundness. ● By using these cards,
Black hat hackers ■ Grey hat hackers reveal private information in good faith, such as a credit wrong. ● If anybody does something that is not legal, they are customers can purchase goods and services either offline or
Denial of service attack (DOS): A Denial-of-Service (DoS) card number, through common online interactions such as breaking the law, but if they do something unethical, they online without making immediate payment. Payment to the
attack is an attack meant to shut down a machine or email, chat, social media sites etc. Website defacement: may not be breaking the law. Ethical Issues: Web spoofing: It merchants will be made by the customer’s bank. ● The
network, making it inaccessible to its intended users. ● DoS Website defacement is an attack on a website that changes occurs when the attacker sets up a fake website which is customer is supposed to repay his debts during the payment
attacks accomplish this by flooding the target with traffic, or the visual appearance of a website or a web page. These almost same as the original website in order to attract period. Otherwise interest will accumulate
sending it information that triggers a crash. are typically the work of defacers, who break into a web consumers to give their credit card number or other personal Advantages: Convenience: Credit cards are easier to use. Fast
Viruses: A computer virus is a type of computer program server and replace the hosted website with one of their information. Normally, the spoof website will adopt the payment: It takes a few seconds to swipe a credit card. Easy
that, when executed, replicates itself by modifying other own. ● Visitors may be redirected to a website with an design of the target website, and it sometimes has a similar access:At any time user can access his/her credit card More
computer programs andinserting its own code. ● If this address quite similar to the company. Cyber industrial URL. Cyber squatting: It means an activity in which a person shopping options: Credit card can be used for online
replication succeeds, the affected areas are then said to be espionage: Cyber espionage is a form ofcyber attack that or firm register, purchase and uses the existing domain name, shopping. Consumer protections: If someone steals our
"infected" with a computer virus. steals classified, sensitive data or intellectual property to belonging to a well known organization, for the purpose of credit card we can block the card. Credit score: It is a
Trojan horses: In computing, a Trojan horse is any malware gain an advantage over a competitive company or infringing its trademark. The cybersquatter then offers to sell measure to know the creditworthiness of a user. Ie, how
which misleads users of its true intent. ● The term is derived government entity. Espionage is “the practice of spying or the domain to the person or company who owns a trademark likely he is to pay money back on time when he borrow it.
from the Ancient Greek story of the deceptive Trojan Horse using spies to obtain information about the plans and contained within the name at an inflated price. Web tracking: Record keeping: User gets an automatic record of his
that led to the fall ofthe city of Troy. ● Trojans can be activities especially of a foreign government or a competing Web tracking is the practice by which operators of websites spending Disadvantages: Overspending: They encourage
employed by cyber-thieves and hackers trying to gain access company.” Credit card fraud and theft of customer data: collect, store and share information about visitors’ activities people to spend money that they don’t have. High interest
to users' systems. ● Users are typically tricked by some form Credit card fraud is an inclusive term for fraud committed on the World Wide Web. Identity theft: Identity theft occurs rate and increased debt: If dues are not cleared before the
of social engineering into loading and executing Trojans on using a payment card, such as a credit card or debit card. ● when someone uses another person's personal identifying billing due date, the amount is carried forward and interest is
their systems. The purpose may be to obtain goods or services, or to make information, like their name, identifying number, or credit charged on it. Credit card fraud: It is possible to clone a card
Internet hoax: Internet hoaxes are stories that spread payment to another account which is controlled by a card number, without their permission, to commit fraud or and gain access to confidential information. Hidden costs:
throughout theinternet, often through email, forums, and criminal. ● The most common types of fraud causing other crimes. Credit cards have a number of taxes and fees, such aslate
blogs or showing images that are untrue or alteration of the concern among merchants are identity theft. Legal Issue: Cyberstalking: It is a criminal practice where an payment fees, joining fees and processing fees. Debit card as
truth. ● It is usually an email urging to pass this information Network and web security individual uses the internet to systematically harass or e-payment system
to as many people to make aware of this information. ● The The goal of security management is to minimize risk and threaten someone. This crime can be committed through Debit card is a prepaid card and also known as ATM card. ●
only purpose of hoax is to waste time. ensure protection by limiting the impact of s security email,social media, chat rooms, instant messaging clients and This is apayment card that deducts money directly from a
Worms: A computer worm is a standalone malware breach. Monitor network performance: Network any other online medium. A stalker may be an online stranger customer's bank account. ● Debit card serve a dual purpose :
computer program that replicates itself in order to spread to performance monitoring is a routine process to evaluate, or a person whom the target knows. Application fraud on the first, they allow user to withdraw money from his bank.
other computers. ●It often uses a computer network to analyzes, report and track on the performance of a internet: The small investors are attracted by the promises of second, they allow user to make purchases.Advantage:● Easy
spread itself, relying on security failures on the target computer network. Username and password: Password false profits by the stock promoters. The availability of emails to obtain● Quick purchase● Comfortable● Safety●Control on
computer to access it. ● It will use this machine as a host to protectionallows only those with a authorized password to and popup ads have paved the way for financial criminals to spending● Readily acceptedDisadvantage:● No grace
scan and infect other computers. ● Computer worms use gain access to certaininformation. Use of firewall: It is a have access to many people. Skimming: Skimming is the period● Limited money access● Lesssafety● Extra fees:
recursive methods to copy themselves without host network security system designed to prevent unauthorized unauthorized capture and transfer of payment data to Accessing from another bank’s ATM will cost additional fee
programs and distribute themselves based on the law of access to or from a private network. It is a network security another source. For example, information that is and itincreases for each transaction.
exponential growth, thus controlling and infecting more and device that monitors incoming and outgoing network traffic electronically stored on the magnetic stripe of a credit card or Smart card payment systemA smart card is similar to a credit
more computers in a short time. and decides whether to allow or block specific traffic based debit card is illegally copied during an attempt to use an card or debit card in size and shape.It is a small plastic card
Spyware: Spyware is unwanted software that gain our on adefined set of security rules. Firewalls can be automatic teller machine (ATM). Copyright: Copyright is a that has a built in microprocessor to store and process data
computing device, stealing internet usage data and sensitive implemented as both hardware and software, or a type of intellectual property that gives its owner the exclusive and records. ● Smart card has the facility to store the details
information. ● Spyware is classified as a type of malware — combination of both.Intrusion detection:It is a system that right to make copies of a creative work, usually for a limited about customer. It encrypts digital cash on a chip and can be
malicious software designed to gain access to or damage monitors network traffic for suspicious activity and issues time. refilled by connecting to a bank. The ability of the chip to store
your computer, often without your knowledge. Spyware alerts when such an activity is discovered. While anomaly Electronic payment is defined as a financial exchange that more information in its memory makes the card smart.
aims to gather information about a personor organization detection and reporting is the primary function, some takes placeonline between buyers and sellers (or two Advantage:● Security● Convenience● Flexibility●
and send such information to another entity in a way that intrusion detection systems are capable of taking actions entities). The customer: Customer in the ecommerce may be Control onspending● International use● Interest free
harms the user; for example by violating their privacy or when malicious activity or anomalous traffic is detected. an individual or organization whobuy products or services loan
endangering their device's security Virus scanning software:It helps to scan and identify any online. The issuer: The financial institution, such as a bank, Disadvantage:● Security● Chance of loss● Slow adoption●
Adware: often called advertising-supported software by its malicious content and removes it from the system. that provides the customer with a payment card. The Possiblerisk of identity theft.
developers, is software that generates revenue for its merchant: The person or organization that sells goods or Electronic cash or e-cash:E-cash is an electronic medium for
developer by automatically generating online advertisements services to the cardholder via a website is the merchant. The making payments. ● This refers toa system in which a person
in the user interface ofthe software or on a screen presented Transaction security and data protection Encryption: It is acquirer: It is a financial institution that establishes an can securely pay for goods or services electronically without
to the user during the installation process. ●The software may the process of transforming plain text or data into cipher account with the merchant and processes payment card necessarily involving a bank to mediate the transaction. ● E-
generate two types of revenue: one is for the display of the text that can not be read by anyone other than the sender authorisations and payments. The payment gateway: cash are also known as digital cash and cyber cash.
advertisement and another on a "pay-per-click" basis, if the and the receiver. Secure socket layer (SSL): The SSL Processes merchant payments by providing an interface .● E-cash involves at least 3 parties: ○ Issuer not necessarily
user clicks on the advertisement. protocol provides data encryption, server authentication, between the merchant and the acquirer’s financial processing financialinstitution, ○ Consumer as the end user who uses
Phishing: Phishing is the fraudulent attempt to obtain optional client authentication, and message integrity for system. The processor: It is a large data centre that processes the e-cash and ○ Merchant who accept e-cash in exchange
sensitive information or data, such as usernames, passwords TCP/IP connections. Secure hypertext transfer protocol (S- credit card transactions and settles funds to merchants, with products or services provided.
and credit card details or other sensitive details, by HTTP): It is a secure message oriented communications connected to the merchant on behalf of an acquirer via a Advantages:● Convenience to consumers.● Consumer
impersonating oneself as a trustworthy entity in a digital protocol designed for use in conjunction with HTTP. payment gateway. privacy● Purchase small items● Global market● Security●
communication. ● Phishing is a cybercrime in which a target Generally, S-HTTP attempts to make HTTP more secure. Digital payment requirements Acceptability: This Increased efficiency of banksDisadvantages:● Existence of
or targets are contacted by email, telephone or text message Trusted seals programs: A number of trustmark seals have refers to whether the payment method issupported counterfeiters ● Lack of infrastructure
by someone posing as a legitimate institution to lure been developed to provide assurance about web business globally. It should be available and accessible to all Computer literacy ● Less popularity ● Difficulty in monitoring
individuals into providing sensitive data such as personally practices and policies through the web interface. Digital type of buyers and sellers. Affordability: The cost of Electronic cheque or e-cheque
identifiable information, banking and credit card details, and signature: A digital signature is a technique used to validate implementing and using the system must be An e-cheque is an electronic document which substitutes the
passwords. the authenticity and integrity of a message, software or affordable for consumers and merchants. Efficiency: paper cheque for online transactions. ● E-cheque work the
Vulnerability:A weakness in security procedures, network digital document. It's the digital equivalent of a Systems should be able to receive small payments same way as paper cheque. ● The payer/account holder
design, or implementation that can be exploited to violate a handwritten signature or stamped seal, but it offers far without performance degradation. Flexibility: The writes an e-cheque using acomputer or other type of
corporate security policy is called vulnerability. ● Internet more inherent security. Secure electronic transaction (SET): system must allow consumers to order products or electronic device and transmits the e- cheque to the payee
attacks can be launched from anywhere in the world and the It will enable payment security for all involved, authenticate services from any location, and not just from one PC. electronically. ● Digital signatures are used for signing and
location of the attacker can easily be hidden. ● New web card holders and merchants, provide confidentiality for Interoperability: The system must be interoperable endorsing electronic cheques.
based attack types are coming out every day; this is causing payment data and define protocols.Digital certificate: It is a between different computing platforms, web Advantages:● Faster processing● Lower costs● Customer
businesses, communities and individuals to take security digital document issued by a trusted third party institution browsers and server software packages. Anonymity: payment options Some users do not possess a debit or credit
seriously now. known as a certificate authority that contains the name of It is the desire to protect one’s privacy, identity, and card. Such users can use e-cheque. ● Security and reliability
Types of vulnerability: the subject or company, the subject’s public key, a digital personal information. Reliability: The system must Disadvantages:● Fraud potential● Errors● Bouncing:
SQL injection: it is a code injection technique, used to certificate serial number, an expiration date, the digital be reliable since it is used from the transmission and Echeques areoften bounced or returned.
attack data- driven applications, in which malicious SQL signature of the certification authority and other identifying manipulation of sensitive information. Security:The E-wallets:E-Wallets is a type of electronic card which is used
statements are inserted into an entry field for execution. ● information. The certificate is signed with the private key of payment method should be secure. for transactions made online through a computer or a
SQL injection is one of the most common web hacking the certification authority Digital token based payment system smartphone. ● It’s utility is same as a credit or debit card. ● An
techniques. ● SQL injection is a code injection technique The firewall:In computing, a firewall is a network security Electronic currency looks like conventional cash. ● Electronic e-wallet needs to be linked with the individual’s bank account
that might destroy our database. Cross site scripting (XSS): system that monitors andfilters incoming and outgoing currency is stored in digital form and serves as a cash to make payments. ● E-wallet is a type of prepaid account in
It is a client-side code injection attack. ● The attacker aims network traffic based on an organization's previously substitute.● Electronic tokens: There are two types of which a user can store his money for any future online
to execute malicious scripts in a web browser of the victim established security policies. A firewall typically establishes a electronic tokens namely prepaid tokens and postpaid transactions. ● An e-wallet is protected with a password.
by including malicious code in a legitimate web page or web barrier between a trusted network and an untrusted network, tokens.● The users may get prepaid token by making the Closed wallets: It doesn’t permit to redeem or withdraw
application. ● The actual attack occurs when the victim such as the Internet. ● The aim of this wall is to protect the payment in advance. Digital cash or e-cash, debit cards, cash. It can only be used for goods and services for that
visits the web page or web application that executes the premises network from internet based attacks and to provide electronic purses are examples of this kind of tokens. ● In the specific company. Eg : MakeMyTrip, Jabong etcmSemi closed
malicious code. Broken authentication and session a single block point where security and auditing can be case of postpaid tokens, fund transfer instructions are being wallets: It doesn’t permit to redeem or withdraw cash. But it
management: ● If the user authentication system of a checked. Protection from vulnerabilities: Internet connection exchanged between buyer and seller. Electronic cheques and allows users to purchase goods and services with listed
website is weak, hackers can take full advantage. ● is vulneration to hackers who want to access financial and credit cards are examples. Digital coins: The digital coin is merchants who have a contract wallet company. Eg : Paytm,
Authentication systems involve passwords, session IDs, and personal information. Managing and controlling network based on the following principle : The bankprovides PayUMoney, MobiKwik etc Open wallets: The wallets that
cookies that can allow ahacker to access user’s account traffic: This is the first and most basic function. It should be consumers with the serial number of a coin encrypted with allow users to redeem plus withdraw cash name as open
from any computer. Cross site request forgery attack: ● able to identify which data packets are coming through, which the bank’s private key. ● If the consumer wants to spend the wallets.Eg : M-pesa
Cross-site request forgery (also known as CSRF) is a web connection is established and also be able to control those coin, the bank checks the serial number on the list of spent
security vulnerability that allows an attacker to induce users traffic in the system. Authentication access: The usage of coins and, if the coin has not already been spent, the bank
to perform actions that they do not intend to perform. ● In packet filtering helps to restrict resource access from either credits the bank account or provides them with a new
a successful CSRF attack, the attacker causes the victim user unexpected sources. Acting as a intermediary: Instead of coin.Debit Credit system or Account based systems With the
to carry out an action unintentionally. For example, this allowing computers connect directly to the internet, a firewall debit approach, the customer maintains a positive balance of
might be to change theemail address on their account, to is modified into anintermediary device to the internet. The the account and money is subtracted when a debit
change their password, or to make a funds transfer. simplest mechanism for verification is asking users for a transaction is performed. ● With the credit approach, charges
BITCOIN - Cryptocurrency
Bitcoin is a cryptocurrency invented in 2008 by an unknown
person or group of people using the name Satoshi Nakamoto.
● The currency began use in 2009 when its implementation
was released as open- source software. ● Bitcoin is a
decentralized digital currency, without a central bank or single
administrator, that can be sent from user to useron the peer-
to-peer bitcoin network without the need for intermediaries.
Irreversible: A transaction cannot be reversed by anybody.
Pseudonymous:Neither transactions nor accounts are
connected to real world identities.Fast and global:
Transactions are propagated instantaneously in the network
and are confirmed within minutes. Secure: A bitcoin address
is more secure. Strong cryptography and the magic of big
numbers make it impossible to break this scheme. No
permission: No permission from anybody is needed to use
cryptocurrency. It is only a software that everybody can
download for free.
Internet banking:It refers to any banking transaction that can
be conducted over the internet, generally through a bank’s
website under a private profile. ● The user must register with
the financial institution online and create a
login ID and password. ● User can also keep a track of
his accounttransactions and balanceall the time.
Customer’s risk:Stolen credentials or password● Dishonest
merchant●Disputes over transaction● Inapproprate use of
transaction details Merchant’s risk: Forged or copied
instruments● Disputed charges● Insufficient fund in customer
account● Main issue : secure payment system
Digital signatureIt is a mathematical scheme for
demonstrating the authenticity of a digital document. ●
Authentication means that recipient knows who created the
document and it has not been altered in any way since that
person created it. ● When sender digitally signs a document,
he adds a one way hash(encryption) of the message using his
public and private key pair. Recipient can still read it, but the
process creates a signature that only the server’s public key
can decrypt.
Digital signature provide the following benefits :
Authentication: Digital signature authenticates a
document and which enables to identify the sender. Non
repudiation:Signing takes place through a series of steps
and tracks all of those steps. This eliminates the possibility
of signer suggesting he made a mistake in signing.
Integrity: Documents signed with digital signature alert the
reader in real time if anything has been changed or if there
is any reason not to trust the document.