Cyberethics- (Contd)
Hello Students!
Welcome once again to the world of Computer Science using e-Learning methods.
I wish may God bless you with a calm mind during these days. Cooperate with your family members and follow the rules laid down by govt. Doing this we all can help the society.
In my last class I gave you the following questions to answer, as your homework:
Q8. (a) Enumerate minimum five measures which a user can take to protect her /his privacy and data.
(b) What do you know about Consumer Protection Bill 2018?
Q9. What is Online Fraud? List some of its forms.
Q10. Define the following terms:
a) Counterfeit Products
b) Phishing
So let’s begin with the topic for today.
But before we move ahead, kindly mark you attendance in Comments Section of this blog with your Name, Class and Sectoin.
งงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงง
By the end of this blog, you will be able to:
- Elaborate on methods of protecting online business and customers.
- Elucidate various methods of Data Security like:
- HTTPS
- SSL
- Encryption
- FTPs
- Firewall
- HTTPS
- SSL
- Encryption
- FTPs
- Firewall
งงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงง
Measures to protect business/customers from threats:
Dear Boys, before we discuss the measures to protect from the threat, I think it would be better if we recall the names of the Frauds/threats covered in last blogs:
Please type your answer in the following form:
Please type your answer in the following form:
Let us gather some more knowledge and discuss a little more, before we pen down the measures...
- Have you heard anything about the Product list of a company.
A product list includes details about a company's entire portfolio of products. A product list is intended to organize all of a business's goods, stock, price, sales history, etc. Often, it is necessary to make a product list before you can prepare bills.
- If you are an online vendor. Then would you don't like to check what is sold, under your brand name, in the market.
I am sure you would. So I think this point comes from a common sense, that we should not let anyone spoil our name in the market.
- You must have seen the Logos of Brands and bar-codes on every product.
What is the reason of using these logos and bar-codes on every item?
Yes... You are right... It's simply because the manufacturer wants to make it sure that the product is genuine.
- Suppliers of a online merchant are equally responsible for the creating trust.
A one should try level best to make sure that the suppliers are the trusted ones.
- And when it comes to international level then one should be extra careful.
Although International suppliers are harder to check but one should be safe during the dealing.
Let's see a video of around 2 mins 45 sec. to see what can happen to your reputation it you don't keep above points in your mind while doing online business.
Please click on this link, if the video doesn't play:
Now, let us discuss few things one can do to protect his/her business and cutomers from the first three threats, listed above in the response to your answer in Google Form....
Now, let us discuss few things one can do to protect his/her business and cutomers from the first three threats, listed above in the response to your answer in Google Form....
- Accurate Product Listing: It's important that you make the effort to list your products accurately, completely and honestly.
- Check what you're selling: Make sure to buy a few of your own products and check them out before you start fulfilling orders. Also keep an eye on the counterfeit products.
- Verify with the manufacturer: The manufacturer should be able to identify a product using an item or serial number. They could also help with aesthetic identifiers.
- Only work with trusted suppliers: One should prefer to work with trusted suppliers. Validation from organisation like the Better Business Bureau can be useful. One should verify supplier's credibility too.
- Be extra careful with international suppliers: International suppliers are harder to check but one should be safe during the dealing.
Did you notice in the video the news reader was talking about refunds....
Therefore if a merchant gets to know about a case of counterfeit products, she/he should make it right with the customer, by apologising and refunding for the product.
งงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงง
We have discussed the solutions of first three threats...
But the last two.. i.e 4) Stealing of Information and 5) Fraudulent payments, are the most intimidating.
If credit card details are stolen, hacker gets the liberty to do some fraud payment and if there's a case of identity theft then fraudulent or malicious posts can be made on social media.
Take 1-2 minutes and read first half of the page: 168 (old book) or page: 188 (new book) and don't miss to read the REMEMBER section too.
You must have found the following points as measures to stop the last two types of frauds:
- Strong security mechanisms by the e-commerce sites and payment gateways to prevent stealing of crucial information.
- Official guidelines ans safeguards on the selling of user;s data to third parties.
- Ensure safety of sites while entering crucial information. The legitimacy of a site can be ensure by verifying the following methods:
- By typing the URL of the website in place of opening the link by clicking on it.Do not copy-paste the link because there may be a very slight difference in between the original URL and fraud website.
งงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงง
Secure Data Transmission:
Dear students please tell me the meaning of the following:

Now please read this...
A - 1, B - 22, C - 13, D - 42, E - 15, F - 36, G - 72, H - 85, I - 39, J - 67 K - 40
L - 32, M - 5, N - 67, O - 12, P - 98, Q - 6, R - 92, S - 100
Now try to decode....
Yes the answer is : S A F E (because S - 100, A - 1, F - 36 and E - 15)
In this way if I try to write a letter to anyone, it will be difficult for a person to understand who don't know about the code I used.
It was a very basic example of Data Encryption.
Data Encryption means data is converted to a form which is not readable while it is being sent over Internet.
Please read DO YOU KNOW? section on Page: 168 (old book) or Page: 188 (new book), to know more about Data Encryption.
But why I would do it?
Yes.. for Data Security.
Let us discuss something about secure data transmission:
Secure data transmission applies enough technical safeguards so that data travels safely to its target, without being compromised.
Many of you must have seen in some movie, that there is a person who is trying to listen to the online conversation of two people. This kind of unlawful activity is called Eavesdropping.
Secure data transmission also avoids Eavesdropping.
Basically, Eavesdropping is unauthorised monitoring of other people's communication. Eavesdropping can be carried out through all communication devices without the knowledge of the sender or the recipient.
To ensure secure data transmission, the following techniques are usually applied:
Let us see this video for more clarity:
Please click on this link if the video doesn't play: https://youtu.be/hExRDVZHhig
Now you should be able to answer the following questions.
Please note the question in your notebook.
งงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงง
Let's Summarize:
Secure Data Transmission:
Dear students please tell me the meaning of the following:

100 1 36 15
unable to understand...
Now please read this...
A - 1, B - 22, C - 13, D - 42, E - 15, F - 36, G - 72, H - 85, I - 39, J - 67 K - 40
L - 32, M - 5, N - 67, O - 12, P - 98, Q - 6, R - 92, S - 100
Now try to decode....
Yes the answer is : S A F E (because S - 100, A - 1, F - 36 and E - 15)
In this way if I try to write a letter to anyone, it will be difficult for a person to understand who don't know about the code I used.
It was a very basic example of Data Encryption.
Data Encryption means data is converted to a form which is not readable while it is being sent over Internet.
Please read DO YOU KNOW? section on Page: 168 (old book) or Page: 188 (new book), to know more about Data Encryption.
But why I would do it?
Yes.. for Data Security.
Let us discuss something about secure data transmission:
Secure data transmission applies enough technical safeguards so that data travels safely to its target, without being compromised.
Many of you must have seen in some movie, that there is a person who is trying to listen to the online conversation of two people. This kind of unlawful activity is called Eavesdropping.
Secure data transmission also avoids Eavesdropping.
Basically, Eavesdropping is unauthorised monitoring of other people's communication. Eavesdropping can be carried out through all communication devices without the knowledge of the sender or the recipient.
To ensure secure data transmission, the following techniques are usually applied:
- SSL Secure Data Transmission: Secure Socket Layer is a standard security protocol which creates an encrypted link between a web server and a browser to ensure private and integral data transmission.
- Data Encryption: It is the translation of data into a secret code. It is an effective way to achieve data security. Encryption makes data difficult to read and thereby protect from eavesdropping.
- User of FTPs: FTPs implement strong alogrithms to encrypt every data transferred. Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
- Installing a Firewall: A Firewall is a network security system either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules.
Let us see this video for more clarity:
Please click on this link if the video doesn't play: https://youtu.be/hExRDVZHhig
Now you should be able to answer the following questions.
Please note the question in your notebook.
งงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงงง
Let's Summarize:
- A few things one can do to protect his/her business and cutomers are:
- Accurate Product Listing
- Check what you're selling
- Only work with trusted suppliers
- Be extra careful with international suppliers
- Secure data transmission applies enough technical safeguards so that data travels safely to its target, without being compromised.
- Data Encryption means data is converted to a form which is not readable while it is being sent over Internet.
- Eavesdropping is unauthorised monitoring of other people's communication.
- Secure Socket Layer is a standard security protocol which creates an encrypted link between a web server and a browser
- FTPs implement strong alogrithms to encrypt every data transferred.
- A Firewall is a network security system either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules.
That's all for today
Before you join me in my next class, make sure that you have
done all the above homework questions in your notebook. Read about the topic of 'Other Ethical Issues'.
Before you join me in my next class, make sure that you have
done all the above homework questions in your notebook. Read about the topic of 'Other Ethical Issues'.
God Bless You
Thank you students
Computer Science Department
Middle School




jacob present
ReplyDeletePresent ma'am
ReplyDeleteDinesh Goyal- 10C
Present Ma'am
ReplyDeleteArchbill Xalxo X-C
Present ma'am
ReplyDeleteGeorge Gomes X-C
Present ma'am
ReplyDeleteMatthew Jayakumar
TANISHQ present
ReplyDeleteGood morning ma'am.
ReplyDeleteIS THIS SANIDHYA OR GAUTAM GUPTA??
DeletePls mention your name and roll no
ReplyDeleteKrish kumar present ma'am
ReplyDeleteChhavikrishan
ReplyDeletePresent ma'am
Good morning ma'am
ReplyDeleteFarhan is present
Good morning ma'am Arjun
ReplyDeleteis present
Present mam
ReplyDeleteKrish Vadhera is present
ReplyDeleteGladwin is present
ReplyDeletePresent ma'am
ReplyDeleteparth patil present mam
ReplyDeleteALL TO NOTE THAT-
ReplyDeleteSIMPLY WRITING PRESENT WILL NOT ENTITLE YOU TO GET ATTENDANCE.
Since last session, I have been asking "GAUTAM" is Sanidhya or Gautam.....
Attendance not given to both
or Gautam Gupta???
DeleteThis is Gautam Gupta, sanidhya is by the name of AMOGH GAUTAM.
DeleteThis comment has been removed by the author.
ReplyDeletePresent ma'am
ReplyDeleteGood morning ma'am
ReplyDeleteAshwanth is present
10-C
Present ma'am
ReplyDelete10-C
DeleteThis comment has been removed by the author.
ReplyDeleteJay Sati, Class 10-C is Present
ReplyDeletePresent maam
ReplyDeleteGood morning ma’am saurojyoti is present
ReplyDeleteAdam saviour Kerketta, class
ReplyDelete10-C is present
Anirudh Rawat
ReplyDeletePresent
Ma'am Jossam is Present
ReplyDeleteGood morning ma’am
ReplyDeleteNishchay is present
Pragyan chauhan present
ReplyDeleteRoll no. 11
Neevkumar present
ReplyDeleteDev was present
ReplyDeleteSorry ma'am for the delay