Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

CYBER SECURITY ASSIGNMENT 2

MEHAK SHARMA
2120993066
BBA BUSINESS ANALYTICS X

QUESTION 1. Define different e-payment methods.


ANSWER 1. Electronic payment methods, also known as e-payment methods, refer to various
digital transactions that allow individuals and businesses to make financial transactions over
the internet. These methods offer convenience, speed, and security in comparison to traditional
paper-based payment methods. Here are some common types of e-payment methods:
Credit and Debit Cards:
Credit Cards: Allow users to borrow money up to a predefined credit limit and pay it back later.
Debit Cards: Linked directly to a user's bank account, and transactions deduct funds
immediately.
Digital Wallets:
PayPal: A widely used online payment platform that allows users to link their bank accounts,
credit cards, or debit cards for making secure online transactions.
Apple Pay, Google Pay, Samsung Pay: Mobile payment systems that use near-field
communication (NFC) technology to enable contactless payments through smartphones or
smartwatches.
Bank Transfers:
ACH (Automated Clearing House): A system for electronic funds transfer between banks in
the United States.
Wire Transfers: Direct electronic transfers between banks, often used for large transactions.
Cryptocurrencies: Bitcoin, Ethereum, etc.: Digital or virtual currencies that use cryptography
for security and operate on a decentralized blockchain technology.
Prepaid Cards: Gift Cards, Prepaid Debit Cards: Cards with a predefined value that users can
load with funds and use for transactions until the balance is depleted.
Mobile Banking: Mobile Apps: Many banks offer mobile applications that allow users to
perform various financial transactions, including payments, through their smartphones.
E-checks (Electronic Checks): Digital version of paper checks: Processed electronically,
eliminating the need for physical handling.
QUESTION 2. Explain
a) ONLINE MARKETING: Online marketing, also known as digital marketing, is the
practice of leveraging web-based channels to spread a message about a company’s
brand, products, or services to its potential customers. The methods and techniques used
for online marketing include email campaigns, social media, advertising, search engine
optimization (SEO) and more. The objective of marketing is to reach potential
customers through the channels where they already spend their time reading, searching,
shopping and socializing online. In short, go where the customers is.
Benefits of online marketing:
A key benefit of using digital channels for marketing a business or product is the ability
to measure the impact of any given campaign, as well as how visitors acquired through
different digital marketing channels interact with a digital experience. The visitors that
convert into paying customers, can be analyzed further to determine where and how
their online journey concluded in a purchase.

Analytics tools for websites or mobile apps can help determine the following:

• Which digital marketing channels and campaigns are the most cost-effective at
acquiring customers, based on the conversion rate of visitors to customers, and
the cost of those visitors

• Which channels are effective at acquiring and driving higher lifetime value for
customers — such as email marketing or social media, which are good channels
for driving repeat purchases and keeping customers engaged.

• Which cohorts of customers exhibit strong engagement behavior and high


potential for upsells — such as with software or mobile apps, where typically
it’s easier to sell more (expensive) products to customers with higher
engagement as they would be more familiar with your brand already.

b) ONLINE SHOPPING: Online shopping is the activity or action of buying products or


services over the Internet. It means going online, landing on a seller’s website, selecting
something, and arranging for its delivery. The buyer either pays for the good or service
online with a credit or debit card or upon delivery. In this article, the term ‘online’
means ‘on the Internet.’ The term does not only include buying things online but also
searching for them online. In other words, I may have been engaged in online shopping
but did not buy anything. Online shopping has been around for about twenty-five years.
It has grown in popularity significantly. Today, we can purchase nearly anything online.
In fact, retail experts say that online shopping will soon overtake traditional shopping
in monetary terms. Online shopping is part of E-Commerce, which stands for Electronic
Commerce. Online Shopping occurs when a customer buys through a digital platform.
An example of such a platform is Bikerringshop.com, online biker ring store from
Thailand. You don’t have to live in this country to get one of the products this store
sells. Global coverage is one of the major benefits of online shopping.
QUESTION 3. Write a short note on digital signature.
ANSWER 3. A digital signature is a mathematical technique used to validate the
authenticity and integrity of a digital document, message or software. It's the digital
equivalent of a handwritten signature or stamped seal, but it offers far more inherent
security. A digital signature is intended to solve the problem of tampering and
impersonation in digital communications. Digital signatures can provide evidence of origin,
identity and status of electronic documents, transactions or digital messages. Signers can
also use them to acknowledge informed consent. In many countries, including the U.S.,
digital signatures are considered legally binding in the same way as traditional handwritten
document signatures.
Digital signatures offer the following benefits:
• Security: Security capabilities are embedded in digital signatures to ensure a legal
document isn't altered and signatures are legitimate. Security features include
asymmetric cryptography, personal identification numbers (PINs), checksums and
cyclic redundancy checks (CRCs), as well as CA and trust service provider (TSP)
validation.
• Timestamping: This provides the date and time of a digital signature and is useful
when timing is critical, such as for stock trades, lottery ticket issuance and legal
proceedings.
• Globally accepted and legally compliant: The public key infrastructure (PKI)
standard ensures vendor-generated keys are made and stored securely. With digital
signatures becoming an international standard, more countries are accepting them
as legally binding.
• Time savings: Digital signatures simplify the time-consuming processes of
physical document signing, storage and exchange, enabling businesses to quickly
access and sign documents.
• Cost savings: Organizations can go paperless and save money previously spent on
the physical resources, time, personnel and office space used to manage and
transport documents.

QUESTION 4. Explain IT Act 2000.


ANSWER 4. The Information Technology Act, 2000, is a comprehensive legislation enacted
by the Government of India to address issues related to electronic governance, electronic
commerce, and the security of electronic data and communications. Commonly known as the
IT Act 2000, the law was introduced to provide legal recognition to electronic records and
digital signatures, facilitating electronic transactions and promoting e-governance. It defines
offenses and penalties for various cybercrimes, including unauthorized access to computer
systems, data breaches, and the distribution of malicious software. The Act also establishes the
Controller of Certifying Authorities (CCA) to regulate digital signatures and Certifying
Authorities (CAs) responsible for issuing digital certificates. Additionally, the IT Act
empowers law enforcement agencies to investigate and prosecute cybercrimes effectively.
Over the years, the IT Act has been amended to keep pace with technological advancements
and address emerging cyber threats, reflecting the government's commitment to fostering a
secure and conducive environment for electronic transactions and communication in India.
QUESTION 5. Write description on cyber-crime. What steps should be taken to stop
cyber-crime?
ANSWER 5. Cybercrime is the term for illegal activity carried out via computer networks, the
internet, and digital technology. These crimes cover a broad spectrum of illegal actions
intended to damage people, companies, or governments by taking advantage of holes in digital
systems, compromising data integrity, or both. Hacking, identity theft, phishing, online fraud,
ransomware assaults, virus distribution, and several forms of cyberespionage are examples of
common cybercrimes. Cybercriminals use advanced methods to break into systems, steal
confidential data, interfere with services, or carry out other nefarious acts for financial gain or
other bad intentions.
Anyone using the internet should exercise some basic precautions. Here are 11 tips you can use
to help protect yourself against the range of cybercrimes out there.
• Use a full-service internet security suite: It’s a good idea to consider trusted security
software like Norton 360 with LifeLock Select, which provides all-in-one protection
for your devices, online privacy, and identity, and helps protect your private and
financial information when you go online.
• Use strong passwords: Don’t repeat your passwords on different sites, and change
your passwords regularly. Make them complex. That means using a combination of at
least 10 letters, numbers, and symbols. A password management application can help
you to keep your passwords locked down.
• Keep your software updated: This is especially important with your operating
systems and internet security software. Cybercriminals frequently use known exploits,
or flaws, in your software to gain access to your system. Patching those exploits and
flaws can make it less likely that you’ll become a cybercrime target.
• Manage your social media settings:
• Keep your personal and private information locked down. Social engineering
cybercriminals can often get your personal information with just a few data points, so
the less you share publicly, the better. For instance, if you post your pet’s name or reveal
your mother’s maiden name, you might expose the answers to two common security
questions.
• Keep an eye on the kids: Just like you’ll want to talk to your kids about the internet,
you’ll also want to help protect them against identity theft. Identity thieves often target
children because their Social Security number and credit histories frequently represent
a clean slate. You can help guard against identity theft by being careful when sharing
your child’s personal information. It’s also smart to know what to look for that might
suggest your child’s identity has been compromised.

You might also like