0% found this document useful (0 votes)
32 views14 pages

Ecommerce Readymade Presentation

The document discusses cybersecurity threats to e-commerce businesses including hacktivism, WiFi eavesdropping, spoofing, and phishing. It also provides tips on preventive measures like using HTTPS, avoiding suspicious emails and websites, and being aware of cyber laws in India.

Uploaded by

b d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views14 pages

Ecommerce Readymade Presentation

The document discusses cybersecurity threats to e-commerce businesses including hacktivism, WiFi eavesdropping, spoofing, and phishing. It also provides tips on preventive measures like using HTTPS, avoiding suspicious emails and websites, and being aware of cyber laws in India.

Uploaded by

b d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

E-COMMERCE

“With special emphasis on cyber laws”


PLANNING TO START A

BUSINESS?
BEWARE!
Cybercrime now accounts for more than 50%
of all crimes in the world.
Malicious hackers are now attacking computers
and networks at a rate of one attack every 39
seconds 
78% of surveyed organizations were affected by
a successful cyber attack in 2018

48% of businesses are unable to detect if any


of their IoT devices are impacted by
a security breach 
“STARTLING
As per a report by United States Institute of Piece,
Tomorrow’s terrorist may be able to do more damage
STATISTICS”
with a keyboard than with a bomb.”
Your Logo or Name Here 2
E-COMMERCE
Any transaction conducted over
the Internet or through Internet
access, comprising the sale, lease,
“ license, offer or delivery of
property, goods, services or
information, whether or not
for consideration, and includes
the provision of Internet access.

Your Logo or Name Here 3


Insert or Drag and Drop Image Here

E-COMMERCE?

UBIQUITY Global Reach Universal Standards

E-commerce technology The e-commerce website Standards that are shared


is available everywhere. A have supplied many by all nations around the
unique feature of e- language to let different world.
commerce technology. language users understand
it.

Your Logo or Name Here 4


HEXTILE
E- COMMERCE?

Interactivity Information Density Personalization/Custo


mization

Technology that allows The total amount and It allows personalized


for two way quality of information messages to be delivered
communication between available to all market to individuals.
merchant and consumer. participants.

Your Logo or Name Here 5


THREATS POSED
“Whether the tool is good or evil depends on the
person who veils it.”

Your Logo or Name Here 6


 The full form of Hacktivism is hacking activism. At
first, it may seem like you should hardly be aware of
this cyber threat. After all, it is a problem not directly
related to you. Why should you be bothered at all?

 However, that’s not the case. Firstly hacktivists do not


target directly to those associated only with politics. It
can also be a socially motivated purpose. HACKTIVISM
 It is typically using social media platforms to bring to
light social issues. It can also include flooding an
email address with so much traffic that it temporarily
shuts down.

Your Logo or Name Here 7


HEXTILE
 Wi-Fi Eavesdropping-It is also one of the easiest ways
in e-commerce to steal personal data. It is like a
“virtual listening” of information which is shared over
a Wi-Fi network which is not encrypted. It can happen
on the public as well as on personal computers.

 As a business operating a network, regular scans of


available wifi networks can reveal whether a spoofed WiFi Eavesdropping
network is operating in your area. Users of public wifi
can spot an unsecured network if there is no login
required to have access.

Your Logo or Name Here 8


 Spoofing emails deceive company employees to think
the fraudulent communication is coming from a
reliable source by sending emails from seemingly
legitimate email addresses or domain names. A spoof
email may trick the recipient by disguising the email 

 If you don’t believe an email is truthful or that the Spoofing


sender is legitimate, don’t click the link or enter your
login information. If there's a file attachment, don’t
open it.

Your Logo or Name Here 9


 Phishing is a type of social engineering attack often
used to steal user data, including login credentials and
credit card numbers. It occurs when an attacker,
masquerading as a trusted entity, dupes a victim into
opening an email, instant message, or text message.

 The recipient is then tricked into clicking a malicious


link, which can lead to the installation of malware, the
freezing of the system as part of a ransomware attack
or the revealing of sensitive information. Phishing
 An organization succumbing to such an attack
typically sustains severe financial losses in addition to
declining market share, reputation, and consumer
trust.

Your Logo or Name Here 10


Promotion

Communication

Collaboration

Email for E-Commerce


Importance of Email Updates to customers

Your Logo or Name Here 11


• HTTPS, the secure version of hypertext
PREVENTIVE transfer protocols for websites, is essential for
every website regardless of content

MEASURES
Skip Emails and Texts You Don’t Recognize.
Sadly, 30% of phishing mails get opened,
leading to identity theft, malware, and
ransomware. 
• Following attributes should be considered
while surfing e commerce websites.
• Numerous grammatical mistakes
• Currency listed strangely, such as 100$
versus $100
• Extremely low prices – if it’s too good to be
true, it probably is
• URLs with hyphens and symbols, such as
shop-here-low-prices.com
• No privacy policy
• No HTTPS

Your Logo or Name Here


▫ The e-commerce law of India is primarily

CYBER LAWS incorporated in the information technology act,


2000 (IT Act 2000).
▫ The objective of the IT Act-2000 is “to provide
legal recognition for transactions carried out by
means of electronic data interchange
▫ Under this Act if someone without permission of
owner of a computer, accesses or downloads,
copies or extracts any data or introduces any
computer contaminant like virus or damages or
disrupts any computer shall be liable to pay
damages to the person so affected. Earlier in the
ITA -2000 the maximum damages under this head
was Rs.1 crore, which (the ceiling) was since
removed in the ITAA 2008.
▫ Under this Act violators can be held liable
for online infringement of copyright  of the
copyright owners.

Your Logo or Name Here


Thank You

You might also like