SESSION 7: ONLINE TRANSACTIONS
SESSION 7: ONLINE TRANSACTIONS
What do you mean by Online transactions ?
The transactions over the internet are called Online Transactions Like purchasing of goods, selling of goods, booking a ticket, payment of fees etc. all come under the category of Online transactions.
Q. Explain the purpose of Online transactions.
Ans : Online shopping is a form of electronic commerce where customers can buy or sell goods over the Internet. Customers need to have an active internet connection for viewing goods or services offered by a seller. Online shopping could be useful in situations when:
• A customer does not have sufficient time to visit stores.
• Visiting a store is more expensive than purchasing a product online.
• A product or service that is not available in the local market is available online.
Q Give some Examples of Online Transaction websites?
1) For Buying Goods :- amazon, jabong, myntra, flipkart ,meesho, ebay etc.
2) For Booking of Tickets :- IRCTC , Redbus etc.
Q. List any five websites that allow online transactions.
• IRCTC, an online portal for booking flight and train tickets.
• Flipkart, an online shopping portal for buying consumer products. • EBay, an online portal for buying and selling goods.
• Redbus, an online portal for booking bus tickets.
• Amazon
Q. List any three payment tools to use online transactions.
Ans : customers can pay online using a credit, debit card , cash on delivery(COD ) or by internet banking.
Explain the folowing terms :
1.Chat spoofing 2. Email spoofing 3. Phishing
What do you mean by Chat spoofing ?
- Spoofing means hoax, trick, or deceive which contains false information. Hiding / Faking the identity of another person over the internet is called chat spoofing.
Chat Spoofing is a one in which when a computer system or a user of a computer masquerades (masquerades means 'false') to be another identity while engaging in chat
Spoofing means to trick or deceive someone. These kind of attacks are possible in cases where security is vulnerable in electronic communication.
What do you mean by Email spoofing ?
It is the creation of email messages with a forged sender address. For eg. Sending an email with a forged email address which appears to be original. These mails are infected mails which contain worms.
What do you mean by Phishing ?
Phishing :- The act of acquiring personal / private and sensitive data from personal computers for use in fraudulent activities. For eg. Mails from unknown persons that ask for your credit / debit card details.
Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website.
Q. Explain different kinds of online threats.
Ans: Online threats such as Phishing, email spoofing, chat spoofing, etc
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons.
Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website.
Email spoofing is the creation of email messages with a forged sender address
SESSION 8: INTERNET SECURITY
Explain the various ways to protect yourself from viruses & other malware.
•
Keep the operating system and software applications up to date
•Use antivirus and antispyware software:
•Do not share personal information:
•Keeping your username and password private
•Using strong passwords
•Do not immediately respond to mails from unknown users: It may be a fake mail trying to gather personal information
•Install firewalls:
•Use encryption software to protect your data from unauthorized users.
•Clear browser cookies frequently
•Never install software from unknown sources
•Remove unwanted or unknown software applications
What are cookies ?
Cookies are programs that are created on your local computer when you visit websites. Though cookies are meant for storing data based on your activity performed during your earlier visit such as logon details, details of a shopping cart, visited pages in a website, etc. they could also be tracked by unauthorised users and possibly gain access to your personal information.
What is a firewall ?
Firewalls could be software or hardware and can assist in keeping a computer and a network secure.
Firewalls analyse the network traffic and determine if the traffic should be allowed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall software as a part of the operating system thus keeping the computer secure. In rare cases, you may need to configure your firewall for additional security.
Following is a general guideline for managing strong passwords.
•Never use personal information
•Include a combination of letters, numbers, and symbols:
•Never repeat passwords:
•Avoid using real words:
•Keep the length of the password at least 12-14 characters if permitted.
• Use capital and lower-case letters.
•Use random password generators if possible. Example of a strong password: u1vX:,4Hd{]$