Cyberethics- (Contd)

Hello Students!

Welcome once again to the world of Computer Science using e-Learning methods. 

I wish may God bless you with a calm mind during these days. Cooperate with your family members and follow the rules laid down by govt. Doing this we all can help the society. 



In my last class I gave you the following questions to answer, as your homework:


Q8. (a) Enumerate minimum five measures which a user can take to protect her /his privacy and data. 
  (b) What do you know about Consumer Protection Bill 2018?
Q9. What is Online Fraud? List some of its forms. 
Q10. Define the following terms: 
a) Counterfeit Products
b) Phishing









I hope you all are punctually doing the question-answers in your notebook.

So let’s begin with the topic for today.




But before we move ahead, kindly mark you attendance in Comments Section of this blog with your Name, Class and Sectoin.





Learning Outcomes: 

By the end of this blog, you will be able to: 

  • Elaborate on methods of protecting online business and customers. 
  • Elucidate various methods of Data Security like:
    • HTTPS
    • SSL
    • Encryption
    • FTPs
    • Firewall





Measures to protect business/customers from threats:

Dear Boys, before we discuss the measures to protect from the threat, I think it would be better if we recall the names of the Frauds/threats covered in last blogs:

Please type your answer in the following form:





Let us gather some more knowledge and discuss a little more, before we pen down the measures...



  • Have you heard anything about the Product list of a company. 
A product list includes details about a company's entire portfolio of products. A product list is intended to organize all of a business's goods, stock, price, sales history, etc. Often, it is necessary to make a product list before you can prepare bills. 

  • If you are an online vendor. Then would you don't like to check what is sold, under your brand name, in the market.


I am sure you would. So I think this point comes from a common sense, that we should not let anyone spoil our name in the market. 


  • You must have seen the Logos of Brands and bar-codes on every product. 
What is the reason of using these logos and bar-codes on every item?
   
Yes... You are right... It's simply because the manufacturer wants to make it sure that the product is genuine. 

  • Suppliers of a online merchant are equally responsible for the creating trust. 
A one should try level best to make sure that the suppliers are the trusted ones. 

  • And when it comes to international level then one should be extra careful. 
Although International suppliers are harder to check but one should be safe during the dealing. 


Let's see a video of around 2 mins 45 sec. to see what can happen to your reputation it you don't keep above points in your mind while doing online business. 



Please click on this link, if the video doesn't play: https://youtu.be/R_hUtSGWZXI

Now, let us discuss few things one can do to protect his/her business and cutomers from the first three threats, listed above in the response to your answer in Google Form....



  • Accurate Product Listing: It's important that you make the effort to list your products accurately, completely and honestly. 
  • Check what you're selling: Make sure to buy a few of your own products and check them out before you start fulfilling orders. Also keep an eye on the counterfeit products. 
  • Verify with the manufacturer: The manufacturer should be able to identify a product using an item or serial number. They could also help with aesthetic identifiers. 
  • Only work with trusted suppliers: One should prefer to work with trusted suppliers. Validation from organisation like the Better Business Bureau can be useful. One should verify supplier's credibility too. 
  • Be extra careful with international suppliers: International suppliers are harder to check but one should be safe during the dealing.


Did you notice in the video the news reader was talking about refunds....

Therefore if a merchant gets to know about a case of counterfeit products, she/he should make it right with the customer, by apologising and refunding for the product. 



We have discussed the solutions of first three threats...

But the last two.. i.e  4) Stealing of Information and 5) Fraudulent payments, are the most intimidating.

If credit card details are stolen, hacker gets the liberty to do some fraud payment and if there's a case of identity theft then fraudulent or malicious posts can be made on social media.

Take 1-2 minutes and read first half of the page: 168 (old book) or page: 188 (new book) and don't miss to read the REMEMBER section too.


You must have found the following points as measures to stop the last two types of frauds:


  • Strong security mechanisms by the e-commerce sites and payment gateways to prevent stealing of crucial information.
  • Official guidelines ans safeguards on the selling of user;s data to third parties.
  • Ensure safety of sites while entering crucial information. The legitimacy of a site can be ensure by verifying the following methods:
  • By typing the URL of the website in place of opening the link by clicking on it.Do not copy-paste the link because there may be a very slight difference in between the original URL and fraud website.






Secure Data Transmission:

Dear students please tell me the meaning of the following:


100  1  36  15


unable to understand...  







Now please read this...

A - 1, B - 22, C - 13, D - 42, E - 15, F - 36, G - 72, H - 85, I - 39, J - 67 K - 40

L - 32, M - 5, N - 67, O - 12, P - 98, Q - 6, R - 92, S - 100

Now try to decode....






Yes the answer is : S A F E  (because S - 100, A - 1, F - 36 and E - 15)




In this way if I try to write a letter to anyone, it will be difficult for a person to understand who don't know about the code I used.


It was a very basic example of Data Encryption.

Data Encryption means data is converted to a form which is not readable while it is being sent over Internet.

Please read DO YOU KNOW? section on Page: 168 (old book) or Page: 188 (new book), to know more about Data Encryption.


But why I would do it?

Yes.. for Data Security.

Let us discuss something about secure data transmission:

Secure data transmission applies enough technical safeguards so that data travels safely to its target, without being compromised.


Many of you must have seen in some movie, that there is a person who is trying to listen to the online conversation of two people. This kind of unlawful activity is called Eavesdropping.

Secure data transmission also avoids Eavesdropping.

Basically, Eavesdropping is unauthorised monitoring of other people's communication. Eavesdropping can be carried out through all communication devices without the knowledge of the sender or the recipient.



To ensure secure data transmission, the following techniques are usually applied:
  • SSL Secure Data Transmission: Secure Socket Layer is a standard security protocol which creates an encrypted link between a web server and a browser to ensure private and integral data transmission.
  • Data Encryption: It is the translation of data into a secret code. It is an effective way to achieve data security. Encryption makes data difficult to read and thereby protect from eavesdropping.
  • User of FTPs: FTPs implement strong alogrithms to encrypt every data transferred. Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
  • Installing a Firewall: A Firewall is a network security system either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules.


Let us see this video for more clarity:



Please click on this link if the video doesn't play: https://youtu.be/hExRDVZHhig


Now you should be able to answer the following questions.

Please note the question in your notebook.






Let's Summarize:
  • A few things one can do to protect his/her business and cutomers are: 
    • Accurate Product Listing
    • Check what you're selling
    • Only work with trusted suppliers
    • Be extra careful with international suppliers
  • Secure data transmission applies enough technical safeguards so that data travels safely to its target, without being compromised.
  • Data Encryption means data is converted to a form which is not readable while it is being sent over Internet. 
  • Eavesdropping is unauthorised monitoring of other people's communication. 
  • Secure Socket Layer is a standard security protocol which creates an encrypted link between a web server and a browser
  • FTPs implement strong alogrithms to encrypt every data transferred.
  • A Firewall is a network security system either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules. 

That's all for today

Before you join me in my next class, make sure that you have
done all the above homework questions in your notebook. Read about the topic of 'Other Ethical Issues'.


God Bless You

Thank you students

Computer Science Department
Middle School 

Comments

  1. Present ma'am
    Dinesh Goyal- 10C

    ReplyDelete
  2. Present ma'am
    George Gomes X-C

    ReplyDelete
  3. Good morning ma'am
    Farhan is present

    ReplyDelete
  4. Good morning ma'am Arjun
    is present

    ReplyDelete
  5. ALL TO NOTE THAT-
    SIMPLY WRITING PRESENT WILL NOT ENTITLE YOU TO GET ATTENDANCE.
    Since last session, I have been asking "GAUTAM" is Sanidhya or Gautam.....
    Attendance not given to both

    ReplyDelete
  6. This comment has been removed by the author.

    ReplyDelete
  7. Good morning ma'am
    Ashwanth is present
    10-C

    ReplyDelete
  8. This comment has been removed by the author.

    ReplyDelete
  9. Jay Sati, Class 10-C is Present

    ReplyDelete
  10. Good morning ma’am saurojyoti is present

    ReplyDelete
  11. Adam saviour Kerketta, class
    10-C is present

    ReplyDelete
  12. Good morning ma’am
    Nishchay is present

    ReplyDelete
  13. Dev was present
    Sorry ma'am for the delay

    ReplyDelete

Post a Comment

Popular posts from this blog

Python-IF(Prac)

Python-IF command

Python- IF(2)