0% found this document useful (0 votes)
95 views36 pages

Questions and Answers

Uploaded by

preetamdvg21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views36 pages

Questions and Answers

Uploaded by

preetamdvg21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

2 Marks Questions :

1) What is Cyber Space ?


Cyberspace refers to the interconnected digital environment created by computer
systems and networks. While it doesn't have a physical presence, it's a conceptual space
where digital interactions, communications, and transactions occur.

2) What is Hardware ?
Hardware encompasses the physical components of a computer system, including the
central processing unit (CPU), memory, storage devices (hard drives, solid-state
drives), input/output devices (keyboard, mouse, monitor), and more.

3) Define Networking
Computer networks enable communication between computers and devices. Local Area
Networks (LANs) connect devices within a limited area, while Wide Area Networks
(WANs) connect devices across larger distances. Networking protocols like TCP/IP
govern data transmission.

4) What is Internet ?
The internet is a global network of interconnected computer networks that facilitates
the sharing of information, communication, and collaboration among users across the
world. It has become an integral part of modern society, transforming the way we live,
work, and interact.

5) Name the Communication Technologies


1. Email
2. Instant Messaging
3. Voice over IP(VoIP)
4. Social Media
5. Video Sharing and Streaming
6. Virtual Reality (VR) and Augmented Reality (AR)
6) What is WWW ?
The World Wide Web, often referred to simply as the web, is a subset of the internet
that consists of interconnected web pages and multimedia content. It's accessed through
web browsers (e.g., Chrome, Firefox, Safari) using URLs (Uniform Resource Locators)
to navigate between websites.

7) What is Email ?
Email (Electronic mail) is one of the earliest forms of online communication, allowing
users to send text, files and multimedia content to recipients.

8) What is Internet Society ?


The Internet Society is a global non-profit organization funded in 1992 with the mission
of promoting the open development, evolution, and use of the internet for the benefit
of all people.

9) Define Cyber crime


Any illegal behaviour done on or through a computer, the internet or any other
technology regulated by the “Information Technology Act 2000”.
“Criminal Activities carried out through computers or the internet”.

10)What is Hacking ?

Hacking is the technique of illegally accessing a device information, making changes


to allow for continued access, and changing the configuration, use or maintenance of
the target equipment without the knowledge or consent of the owners.

11) What is Cyber Law ?

Cyber Law is a legal framework that governs all legal issues relating to the internet,
computer systems, cyberspace and information technology.

12) What is Zero day attack ?


A zero day exploit is a kind of cyber security assault that happens the same day the
manufacturer discovers a software, hardware, or firmware fault. The assault is known
as zero-day exploit or zero-day attack.

13) What is Social Engineering Attack ?

Social Engineering is used to describe a wide range of malevolent behaviours carried


out through interactions with other people. Users are duped into divulging critical
information or committing security blunders through psychological manipulation.

14) What is Social Media ?

Social Media is a channel of communication that uses the internet. Users can engage in
conversations, share information, and produce content for the wen through social media
platforms.

15) Name any 4 popular types of social media

1) Forums for discussion

2) Networks for sharing information

3) Networks for bookmarking

4) Networks for blogging and publishing

5) Networks for user Reviews

6) Networks based on interests

7) Shared economy networks

8) Social commerce platforms

9) Websites that host vedios

16) What is Malware ?

Malware is any software that is used to access IT systems without authorization in


order to steal data, interfere with system functions, or harm IT networks in any other
manner.
17) What is Hash Tag ?

A word or a phrase preceded by a hash mark(#), used within a message to identify a


keyword or topic of interest and facilitate a search for it.

18) List any four social media platforms.

1) Facebook

2) YouTube

3) WhatsApp

4) Instagram

5) WeChat

6) TikTok

7) Telegram

8) SnapChat

19) What is HTTP and HTML ?

HTML is the standard markup language used to create the structure and content of web
pages. It consists of a series of elements and tags that define the layout, headings,
paragraphs, images, links, and other content on a page.

HTTP ( Hyper-Text Transfer Protocol ) is used for transferring web pages and
resources.

20) What is Social Network ?

Social networking sites are places where users may communicate and share with others
who share their interests and history. Consider Facebook.

21) What is Antivirus ?

Antivirus is a Software designed to detect, prevent, and remove malicious software (


malware ) from a computer or device.
22) What is Cyber Security ?

Cyber security refers to the practice of protecting computer systems, networks, devices,
and data from various forms of cyber threats and attacks. As our world becomes more
digitally connected, the importance of cyber security has grown exponentially to ensure
the confidentiality, integrity, and availability of information and systems.

23) What is WiFi Security ?

Using strong encryption ( like WPA3 ) for Wi-Fi networks, change default passwords
on routers, and hide your network’s SSID to prevent unauthorizes access is called Wi-
Fi Security.

24) What is Ecommerce ?

E-Commerce or Electronic-Commerce means buying and selling of goods, products, or


services over the internet.

25) What is Firewall ?

Network Security devices that filter and control incoming and outgoing traffic based on
predefined security rules.

26) Define UPI.

UPI ( Unified Payment Interface ) is a payment system that culminates numerous bank
accounts into a single application, allowing the transfer of money easily between any
two parties.
5 Marks Questions :

1) Explain the Overview of Computer.


Computer technology encompasses a wide range of hardware, software, and systems
that enable the processing, storage, and communication of digital information. Here are
some key aspects:
1. Hardware: This encompasses the physical components of a computer system,
including the central processing unit (CPU), memory, storage devices (hard drives,
solid-state drives), input/output devices (keyboard, mouse, monitor), and more.
2. Software: Software refers to the programs and instructions that run on a computer.
This includes operating systems (e.g., Windows, macOS, Linux) that manage hardware
and provide a user interface, as well as application software like word processors, web
browsers, and games.
3. Networking: Computer networks enable communication between computers and
devices. Local Area Networks (LANs) connect devices within a limited area, while
Wide Area Networks (WANs) connect devices across larger distances. Networking
protocols like TCP/IP govern data transmission.
4. Security: With the increasing reliance on computers, cyber security has become
vital. It involves measures to protect computer systems and data from threats like
malware, viruses, hacking, and unauthorized access.

2) Explain the Issues and Challenges of Cyber Security.


Cyber security faces a multitude of issues and challenges that continue to evolve
alongside technological advancements and changing threat landscapes. Some of the
prominent issues and challenges in cyber security include:
1. Sophisticated Cyber Threats: Cybercriminals are becoming increasingly
sophisticated in their attack methods, using advanced techniques such as zero-day
exploits, Al-driven attacks, and polymorphic malware to evade detection and infiltrate
systems.
2. Threat Landscape: The cyber security landscape is constantly Rapidly Evolving
evolving, with new types of threats emerging regularly. This requires cyber security
professionals to stay updated and adapt their strategies to counter new attack vectors.
3. Shortage of Skilled Professionals: There is a global shortage of skilled cyber
security professionals, making it challenging for organizations to find and retain
qualified individuals to defend against cyber threats.
4. Insider Threats: Malicious or negligent actions by employees, contractors, or
business partners can pose significant risks to an organization's cyber security. Insider
threats can lead to data breaches, intellectual property theft, and other serious
consequences.
5. IoT and Connected Devices: The proliferation of Internet of Things (IoT) devices
has expanded the attack surface, as many of these devices lack robust security measures,
making them vulnerable to exploitation.
6. Cloud Security: As more organizations migrate to cloud-based services, ensuring
the security of data and applications in the cloud becomes crucial. Misconfigurations
insecure APIs, and shared responsibility models can lead to vulnerabilities.
7. Data Privacy and Compliance: Stricter data protection regulations, such as the
General Data Protection Regulation (GDPR) and the California Consumer Privacy Act
(CCPA), place greater emphasis on protecting user data and holding organizations
accountable for breaches.
8. Nation-State Attacks: Governments and state-sponsored groups engage in cyber
espionage, cyber warfare, and other malicious activities targeting critical infrastructure,
industries, and political entities.
9. Supply Chain Vulnerabilities: Cybercriminals often target third-party vendors and
suppliers as a means to compromise larger organizations. Weaknesses in the supply
chain can lead to breaches and data loss.
10. User Awareness and Training: Despite advances in cyber security technology,
human error remains a significant factor in successful cyber-attacks. Lack of user
awareness and training can lead to mistakes like falling for phishing scams or sharing
sensitive information.
11. Mobile Security: The widespread use of mobile devices presents unique challenges
for security, as these devices are often used for both personal and work-related tasks
and are susceptible to various mobile-specific threats.
12. Attribution and Accountability: Identifying the true source of a cyber-attack and
holding perpetrators accountable can be challenging, especially in cases involving
nation-states or sophisticated hacking groups.
13. Emerging Technologies: New technologies such as artificial intelligence (AI),
machine learning, and quantum computing introduce both opportunities and challenges
in terms of cyber security. While they can enhance defense mechanisms, they can also
be exploited by attackers.
14. Balancing Security and Usability: Striking a balance between robust security
measures and user-friendly experiences is a challenge. Overly complex security
measures can lead to user frustration and circumvention of security protocols.

3) Explain the Types of Cyber Crimes.


Types of Cybercrime
1. One of the most serious violations is the use of child pornography: Predators all
throughout the world interact with youngsters online and sexually attack them. The
growing usage of the internet has made children an appealing target for hackers. In
order to lure children into their traps, predators approach them in chat rooms, make
friends with them, and steal personal information from their helpless victims. Kids are
lured to the internet by these predators, who then attack them sexually or use them as
sex objects.
2.Cyberbullying: A cyberbully is someone who uses electronic tools like computers,
mobile phones, laptops, etc. to harass or bully others. Bullying committed via digital
technology is referred to as cyberbullying. It could involve the usage of social media,
messaging services, gaming platforms, and mobile devices. This frequently entails
repeating actions meant to frighten, infuriate, or degrade the targets.
3. Hacking: lacking is the technique of illegally accessing a device information, making
changes to allow for continued access, and changing the configuration, use, or
maintenance of the target equipment without the knowledge or consent of the owners.
4. Cyber-grooming: This phenomenon involves someone becoming close to an
adolescent and then using coercion, taunting, or other methods to get them to engage in
sexual activity.
5. Dissemination of virus: This type of illegal activity necessitates direct or
unauthorized access to the operating system through the installation of additional
software that fall under the headings of ss bugs, worms, or logic bombs. It is obvious
that computer sabotage, which generally refers to the improper deletion or destruction
of computer data or the Internet feature that interferes with ordinary device
functionality, is illegal.
6. Phishing: Since it is simple for modern organizations to trade cash for money stored
in computers, this practice results in computer theft. Organized crime usually targets
personal and financial credit card information as well as credit card identity
information. Digital assets may potentially belong to a higher economic class, in
addition to having a far higher value than conventional economic assets.
7. Spoofing: Having one machine on a network have a separate computer, typically a
computer with privileged access, enables worldwide access to the other machines.
8. Internet stalking: Cyberstalking, as used in modern culture, is the practise of
following or keeping an eye on someone online. A cyber-stalker does not physically
pursue their target; instead, they find them after an online interaction and verbally stalk,
harass, and threaten them. It violates your right to privacy on the internet.

4) Explain the malware attacks.


Cyber attacks can take many different shapes, Attacks using malware, phishing, and
ransomware are on the rise and can target both small businesses and huge corporations.
Malware is any software that is used to access IT systems without authorization in
order to steal data, interfere with system functions, or harm IT networks in any other
manner.
Ransomware is a subset of malware that is characterised by attackers encrypting data
or holding systems hostage until they receive payment or a ransom. Phishing is an
internet scam that uses dishonest or misleading methods to get people to divulge their
personal information. CISA provides a range of services and tools that people and
businesses can use to defend themselves against different kinds of cyberattacks.
Types of Ransomware
Ransomware assaults are becoming more intricate as it becomes more commonplace.
1. Scareware- It is a sort of ransomware that frequently fools users by pretending to
detect malware on the victim's computer and showing a bogus alert message. These
assaults frequently pose as antivirus software that demands payment to remove fake
infections.
2. Screen lockers- These applications are made to keep the victim from accessing any
files or data on their computer by locking them out. Usually, a notification requesting
payment to unlock it is presented.
3. Encrypting Ransomware-Ransomware that encrypts files also goes by the name
"crypto-ransomware," which locks the victim's files and demands money in exchange
for a decryption key.
4. DDoS extortion: DDoS extortion is the threat of a DDoS assault being launched on
the network or website of the victim unless a ransom is paid.
5. Mobile ransomware: As its name implies, this type of malware targets mobile
devices like smartphones and tablets and demands money in exchange for the
decryption of data or the ability to unlock the device.
6. Doxware: Though less frequent, this sophisticated ransomware variety threatens to
disclose private, explicit, or sensitive data from the victim's computer unless a ransom
is paid.
7.Ransomware-as-a-Service (RaaS): Cybercriminals provide ransomware
programmes as a service (RaaS) to other hackers or cyberattacks who then use those
programmes to target victims.
Examples of ransomware
• CryptoLocker
• NotPetya
• Bad Rabbit
• REvil
• Ryuk
• attacks
• WannaCry
5) Explain the types of Malware Attacks
Malware Attacks
Malware is computer programme created to infiltrate or harm a computer system
without the owner's knowledge. It contains:
VIRUS:- "Vital Information and Resources Under Siege" is what it stands for. It
operates on a host file and either copies itself or renders the system inoperable.
RAT:- "Remotely Access Tool" is what it stands for. Without even the victim's
knowledge, this programme can be used to remotely operate the system.
Worms: Worms are programmes that continue to replicate themselves until all of the
system memory has been used. However, it does not require a host file like VIRUS
does.
Spyware: Spyware is the term for the programme used to remotely monitor the victim's
computer and his actions.
Backdoors: Backdoors are specialised software or programming codes that allow
access to get beyond a computer's security measures.
Key loggers: Key loggers are programmes that record the keystrokes the victim makes
on the keyboard.

6) Explain the types of Ransomware Attacks


Types of Ransomware
Ransomware assaults are becoming more intricate as it becomes more commonplace.
1. Scareware- It is a sort of ransomware that frequently fools users by pretending to
detect malware on the victim's computer and showing a bogus alert message. These
assaults frequently pose as antivirus software that demands payment to remove fake
infections.
2. Screen lockers- These applications are made to keep the victim from accessing any
files or data on their computer by locking them out. Usually, a notification requesting
payment to unlock it is presented.
3. Encrypting Ransomware-Ransomware that encrypts files also goes by the name
"crypto-ransomware," which locks the victim's files and demands money in exchange
for a decryption key.
4. DDoS extortion: DDoS extortion is the threat of a DDoS assault being launched on
the network or website of the victim unless a ransom is paid.
5. Mobile ransomware: As its name implies, this type of malware targets mobile
devices like smartphones and tablets and demands money in exchange for the
decryption of data or the ability to unlock the device.
6. Doxware: Though less frequent, this sophisticated ransomware variety threatens to
disclose private, explicit, or sensitive data from the victim's computer unless a ransom
is paid.
7.Ransomware-as-a-Service (RaaS): Cybercriminals provide ransomware
programmes as a service (RaaS) to other hackers or cyberattacks who then use those
programmes to target victims.
Examples of ransomware
• CryptoLocker
• NotPetya
• Bad Rabbit
• REvil
• Ryuk
• attacks
• WannaCry

7) Explain the Offences and Penalties covered by the IT Act 2000


The following are the offences and penalties covered by the IT Act of 2000:
• Altering the source documents on the computer.
• Instructions from a controller to a subscriber to increase capacity for
information decryption.
• The electronic publication of pornographic content.
• Penalties for violating privacy and secrecy as well as malicious hacking.
• Punishment for publishing a digital signature certificate that is false in some
respects. Misrepresentation-related fines and confiscation.
• Investigative authority and a safe system.
• Fines for confiscation do not conflict with other sanctions.
• Apply for a crime or violation that was committed outside of India.
• Publication intended to commit fraud.
• The controller's ability to issue commands.

8) Explain any Four typical cyber crime types and preventive steps to
take.
Typical Cyber-crime Types and the Preventive Steps to Take
1. False links
Fraudsters use a third-party phishing website that imitates an authentic, established
website as their mode of operation.
• A website, such the one for a bank, an e-commerce site, a search engine, etc.
Short Message Service is used by scammers to provide links to these websites.
social media, email, instant messaging, and other channels.
• Many users click the link without first reading the comprehensive Uniform
Resource.
• Locate the location (URL) and input your security credentials, such as your PIN.
• (PIN), One Time Password (OTP), Password, and other information that is
recorded and utilized by the fraudsters.
precautions
To avoid accessing them by accident in the future, take precautions such as not clicking
on unknown/unverified links and immediately deleting such SMS/email provided by
unknown senders.
• Unsubscribe from emails that include links to websites for banks, online shops,
and search engines, and before deleting such emails, block the sender's email
address.
• Always visit your bank's or service provider's official website, meticulously
confirm the details on the page, particularly where entering financial
information is required. Look out for the credentials before entering secure
mode, look for the security icon on the website (https with a padlock).
• Verify the spelling of URLs and domain names that you receive in emails. If
there is out of suspicion do not open the mail.
2. Harassment calls
Modus operandi:
Fraudsters impersonate real people and contact or interact with customers on the phone
or through social media, bankers, business executives, insurance brokers, and public
servants, a benefit imposter reveal a few customer specifics with confidence, including
the customer's name or the birthdate.

In some instances, imposters coerce or deceive victims into disclosing private


information by offering an example, such as passwords, OTP, PIN, card verification
value (CVV), etc. haste or immediacy, such as the necessity to stop a fraudulent
transaction or make payment, required to avoid a fine, a tempting discount, etc. Then,
these credentials are utilised to scam consumers.
Precautions:
Never give private information, such as your username, password, card details, CVV,
or OTP, to bank representatives, financial institutions, the RBI
Entity, or any other legitimate Never discuss this private information with anyone, not
even your own relatives, and companions.
3. ATM card skimming
Modus operandi:
Skimming devices are installed in ATMs by fraudsters in order to obtain cardholder
data. In order to obtain the ATM PIN, fraudsters may also install a fake keypad or a
small, covert camera.
Occasionally, when a consumer enters their PIN into an ATM machine, scammers
posing as nearby customers can access the PIN,
Following the creation of a duplicate card using this information, the customer's
account is debited.
Precautions:
Always make sure there are no additional devices attached near the ATM's card reader
keyboard before performing a transaction.
While typing the PIN, cover the keypad with your other hand.
Do not enter the PIN when someone else or someone unfamiliar is around and watching
you. At the ATMs, DON'T FOLLOW ANY UNKNOWN PERSON'S
INSTRUCTIONS OR TAKE ADVICE FROM STRANGERS OR UNKNOWN
PEOPLE.
NEVER write your ATM card's PIN down.
To avoid leaving the ATM without receiving cash, press the "Cancel" button and wait
for the home screen to appear.

4..SIM swapping and SIM copying


Modus Operandi: Fraudsters may obtain a duplicate Subscriber Identity Module
(SIM) card (including an
electronic-SIM) for the registered mobile number linked to the customer's bank
account,or they may gain access to the customer's Subscriber Identity Module (SIM)
card. Fraudsters carry out illegal transactions using the OTP they obtain on such a
duplicate SIM.
Fraudsters typically obtain personal information from customers by impersonating
phone or mobile network employees and asking for information in the name of
incentives like "free upgrade of SIM card from 3G to 4G" or "additional benefits on the
SIM card."
Precautions:
Watch how your phone accesses the mobile network. In the event that your phone is
unable to connect to the mobile network for an extended period of time in a typical
setting, you should immediately get in touch with the mobile operator to make sure that
no duplicate SIMs are being or have been issued for your phone number.

9) Explain the Social Engineering attacks.


The term "social engineering" is used to describe a wide range of malevolent behaviours
carried out through interactions with other people. Users are duped into divulging
critical information or committing security blunders via psychological manipulation.
Social engineering is the practise of persuading others to divulge sensitive information.
Thekinds of information that these criminals are looking for can vary, but when a person
is targeted, the criminals typically try to trick you into giving them your bank or
password information, or they try to gain access to your computer to covertly install
malicious software that will give them access to your bank and password information
as well as give them control over your computer.
Social engineering tactics for attack
Attacks using social engineering can be carried out anywhere there is a chance of
human interaction. The five most typical types of digital social engineering attacks are
listed below.

1. Baiting
As the term suggests, baiting attacks use a fictitious promise to spark a victim's curiosity
or sense of avarice. In order to steal their personal information or infect their systems
with malware, they trick users into falling for a trap.
2. Scareware
Scareware bombards victims with bogus threats and misleading alarms. Users are
tricked into believing their computer is infected with malware, which leads them to
install software that either serves only to profit the perpetrator or is malware in and of
itself. Other names for scareware include fraud ware, deception software, and rogue
scanner software.
A typical scareware example is the legitimate-appearing popup advertisements that
show up in your browser while you're browsing the web and say things like, "Your
computer may be infected with harmful spyware programmes." Either it offers to install
the malicious tool for you or it sends you to a malicious website where your machine
is infected.
3. Pretexting
Pretexting Here, an attacker gains knowledge by telling a string of cleverly constructed
lies. The con is frequently started by a perpetrator who poses as someone who needs
the victim's private information to complete a crucial task.
The assailant typically begins by gaining the victim's trust by posing as a coworker,
police officer, bank or tax official, or any person with the authority to know something.
Through queries that are allegedly necessary to verify the victim's identification, the
pretexter collects crucial personal information.
4.Phishing
Phishing scams, one of the most common forms of social engineering attack, are email
and text message campaigns designed to make victims feel rushed, curious, or afraid.
Then it prompts people to divulge private information, click on links to nefarious
websites, or open attachments that are infected with malware.

10) Explain Some Popular Social Media Networks.

Social media is a channel of communication that uses the internet. Users can engage in
coversations, share information, and produce content for the web via social media
platforms. Social media can take many different forms, including blogs, working sites,
photo and video sharing websites, instant.

Here are some of the most popular types of social media:

1. Social media

Social networking platforms facilitate interpersonal connections and provide a plethora of


opportunities for various brands to draw customers. Users can curate information, submit
photographs and videos, form groups based on their interests, express their ideas, and take
part in group conversations.

You may use the information you get about what people are saying about your company
on social media to build a strong presence and raise brand recognition. Social networking
sites include, for instance:

• Instagram

• Twitter

• TikTok

• LinkedIn

2. Forums for discussion

Discussion boards empower users to discuss news, opinions, and answers to each other's
questions. In order to get the best response, many of these social media platforms
concentrate on asking questions. Your trust on the forum can rise if you respond to them
truthfully and Acurately.

Discussion forums examples:


• Digg
• Reddit
• Quora
• Clubhouse

3. Networks for sharing images

People can exchange pictures and relevant content on these social media platforms. They
provide a forum for generating ideas, encouraging innovation, enhancing the appeal of your
products, and getting people to talk about your company.

For instance, a clothing firm might offer a chance to win a gift card to anyone who uploads
a photo of their stuff to the image-sharing website. A few instances of image-sharing
websites:

• Flickr
• Instagram and
• Photobucket

4. Networks for bookmarking

Users can save various thoughts, articles, blogs, and other stuff on bookmarking networks
for later use. Links to online resource lists are also frequently shared. These websites'
objectives are to discuss trends and find fresh content based on common interests.

By sharing your own material on these networks, you may attract visitors to your website,
engage with them, and shape their opinions. Networks for bookmarking include:

• Feedly
• Pocket
• Flipboard
• StumbleUpon
• Pinterest

5. Networks for blogging and publishing


You can share your opinions on a variety of topics on these social media platforms,
including your profession, current events, hobbies, and more. Many advantages of running
your own blog are available to you even if your website doesn't host it.

You may also draw in new readers from the group of users that come to the network in
search of compelling material. To increase traffic to your account, think about publishing
blog posts on inventive methods to use your product or posting news about your sector.
Examples of publishing networks and blogs:

• Medium
• Facebook
• WordPress and
• Tumblr

6. Networks for user reviews

These websites showcase client feedback, providing readers with a thorough understanding
of the kinds of services and goods provided as well as the general satisfaction level.
Reviews from customers can help you spot any issues that many people encounter
frequently and provide you the opportunity to enhance their experiences over time.

Making your company more well-known and increasing brand awareness can be done by
promoting favourable reviews and managing negative ones with care. Consumer review
networks, for instance:

• TripAdvisor
• OpenTable
• Yelp
• My Business on Google

11) What are the best practices for the use of Social Media? Explain

Best practices for the use of social media

• Social networking sites like Facebook and Twitter may be a terrific way to stay
in touch with friends. Herorarecial media that you should always forking.
However, there are several safety precautions follow.
• Set your privacy preferences: Utilise the privacy and security options on your
social networking sites by becoming familiar with them. They assist you in
managing your online experience well and in controlling who sees what you
submit.
• Recall that a post is permanent: Ensure that your online reputation is protected.
What you publish online remains there. Before uploading any images, you
wouldn't want your parents or potential employers to view, give it some thought.
According to a recent study, 70% of hiring managers disqualified candidates
based only on information they discovered online.
• Create a good online reputation: Recruiters are more receptive to candidates
with a strong, favourable internet reputation, according to recent research. So
show off your skills and your command of the situation.
• Keep private information private: Be cautious when sharing too much personal
information on social networking sites. More information you share online may
make it simpler for someone to steal your identity, access your data, or engage
in other crimes like stalking.
• Safeguard your computer: The first step in security is to secure your computer.
Software antivirus installation. Keep your web browser, operating system, and
other software up to date. For details on how to set Windows and Office 365 to
automatically install the most recent security updates, go to Microsoft support.
• Know what to do: Block the person, delete them from your list of friends, and
report them to the site administrator if they are harassing or threatening you.
• Make sure to use strong passwords: Your password should be at least eight
characters long and contain a mix of letters, numbers, and special characters
(such as +, @, #, or $).
• Be careful when using social networking sites: since occasionally even links
that appear to be from friends include malicious software or are a part of a
phishing campaign. Do not click it if you have any reason to be suspicious.
Make contact with your friend to first confirm the legitimacy of the link.

12) Describe Security Issues related to Social Media.

• scams and phishing attacks


• false accounts
• attacks using malware and hacks
• risky third-party applications
• Identity theft
• Data security and privacy options
• mobile devices without security
Scams and phishing attacks: Phishing scams are among the most prevalent concerns
involving social media. The objective of a or your staff into providing passwords,
prevalent cyber phishing scam is to trick you financial information, or other sensitive
False accounts: It's not difficult for a fraudster to set up a social media information
impersonates your business. This is one of the key benefits of verification account that
obtaining social network accounts, they There is considerably more risk if Attacks using
malware and hacks: If hackers access your social media could seriously harm the
reputation of your company. they are successful in installing malware.
Risky third-party applications: It's a good idea to secure your personal social media
accounts. Although there may still be security flaws in connected allow hackers to
access your encrypted social media.
Identity theft: Those online polls that ask about your first car may appear harmlessly
entertaining. However, online social media challenges and quizzes are a popular way
to learn passwords or obtain personal information that is frequently used password hint.
third-party apps that
Data security and privacy options: It appears that most people are aware of the
potential privacy dangers associated with utilising social media. Overall confidence in
social networks' capacity to safeguard data security and privacy has been eroding in
recent years. Tik Tok has recently made headlines in particular because governments
all over the world have restricted access to the platform on official devices due to data
security concerns. as a forgotten
Mobile devices without security: More than half of our internet time is spent on
mobile devices. With just one swipe, social media apps make it simple to access your
social network accounts.

13) Explain the Modes of Digital Payments


There are various modes of digital payments that have become increasingly popular
due to their convenience and accessibility.
Banking cards:
Cards are among the most widely used payment methods and come with various
features and benefits such as security of payments, convenience, etc. The main
advantage of debit/credit on prepaid banking cards is that they can be used to make
other types of digital payments. For example, customers can store card information in
digital payment apps or mobile wallets to make a cashless payment. Some of the most
reputed and well-known card payment systems arе Visa,Rupay and MasterCard, among
others. Banking cards can be used for online purchases, in digital payment apps, PoS
machines, online transactions, etc
Unified Payment Interface (UPD
UPI is a payment system but culminates numerous bank accounts into a single
application. allowing the transfer of money easily between any two parties. As
compared to NEFT. RTGS and IMPS, UPI is far more well-defined and standardized
accross banks. You can use UPI to initiate a bank transfer from anywhere in just a few
clicks.
The benefit of using UPI is that it allows you to pay directly from your bank account,
without the need to type in the card or bank details. This method has become one of the
most popular digital payment modes in 2020, with October witnessing over 2 billion
transaction.
e-Wallets
Electronic wallets or e-wallets more financial information and allow users to make
online transaction quickly. E-wallet in a type of pre-paid account in which a user can
store his/her money for any future online transaction. An E-wallet is protected with a
password. With the help of in E-wallet, one can make payments for groceries, online
purchases, and flight tickets among others. E-wallet has mainly two components,
software and information. The softwawe component stores personal information and
provides security and encryption of the data. The Information components is a database
of details provided by the user which includes their name shipping address, payment
method, account to be paid, credit or debit card details, etc Services like PayPal. Google
Pay, Apple Pay, and Payers fall under this category.
Unstructured Supplementary Service Data (USSD)
USSD technology enables mobile banking services through basic phones, allowing
users to access bancking services by dialing a shortcode. This method doesn't require
internet connectivity and is particularly beneficial in regions with limited internet
access USSD was launched for those sections of India's population which don't have
access to proper banking and internet facilities. Under USSD, mobile banking
transaction are possible without an internet connection by simply dialing 1999 on any
essential feature phone.
This number is operational across all Telecom Service Providers (TSP) and allows
customers to avail of services including interbank account in account fund transfer,
balance inquiry, and availing mini statements. Around 51 leading banks offer USSD
service in 12 different languages. including Hindi & English.
Aadhar enabled payments system (AEPS)
AEPS is a bank led model for digital payments initiated to leverage the presence and
reach of Aadhar. Under this system, customers can use their Aadhar-linked accounts to
transfer money between two Aadhar linked Bank Accounts. As of February 2020,
AEPS had crossed more than 205 million as per NPCI data.
AEPS doesn't require any physical activity like visiting a branch, using debit or credit
cards or making a signature in a doccument. This bank-led model allows digital
payments at PS (Point of Sale/Micro ATM) via a Business Correspondent (also known
as Bank Mitra) using Aadhar authentication.
Each mode of digital payment offers its own set of advantages in terms of accessibility,
use, security, and suitability in different scenarios. The chance of which to use often
depends on factors like convenience, accessibility to technology, internet connectivity,
and personal preferences.

14) Explain Social Media monitoring tools.

Some of the social media monitoring tools are,


1. Sprout Social
With Sprout Social, you have all the tools you need to both track and respond to crucial
interactions. To begin with, this software monitors mention, comments, and keywords
across mumerous social media platforms, including Instagram, Facebook, Twitter, and
TikTok.
2. Hootsuite
Every significant social media network Paid or unpaid: Free tool with premium features
Hootsuite's configurable search streams will monitor whatever social site you want so
that you can see what's happening at a glance. It is debatably the simplest social
monitoring tool to use on this list. Focus on important subjects, trends, and social media
mentions using specified keywords, hashtags, regions, and individuals.

3. Nexalogy
What is it looking at? most popular platforms with a larger web.
Paid or unpaid?
Free resource
Top-notch data visualisations, such as interactive timelines, heat maps based on gogh
lexical cluster maps that display topical patterns, set Nexalogy span Additionally, there
is the "basic" information that would take a person weeks to understand, such as the
pep terms and active accounts.
4. Mentionlytics
What is it looking at? Every social platform plus the larger web
Paid or unpaid?
Free resource
An advanced social media monitoring tool called Mentionlytics keeps track of mention
keywords, and sentiment in numerous languages.
5. Reputology
What is it looking at? Reviews on Yelp, Google, Facebook, and other review websites
Paid or unpaid?
Free resource
If a negative review isn't handled properly and promptly, it may be a serious blow to
customer facing companies. With Reputology, you can keep an eye on popular review
websites like Yelp Google, and Facebook from a single dashboard.Quick links let you
respond to activity across various stores and locations.

6. Tweepsmap

What is it looking at? Twitter


Paid or unpaid?
Free resource
This analytics/social monitoring tool's goal is to help Twitter power users understand
how hashtags and topics spread so that you can hear what your audience is saying.
7. Reddit Keyword Monitor Pro

What is it looking at? Reddit

Paid or unpaid?
Paying tool
Reddit is a frequently disregarded social platform with 430 million average monthly
active users where dialogue is frequently in-depth and honest. With the help of this tool,
you can keep an eye on the 138,000 communities that are active on the website.
8. Talkwalker
What is it looking at? most popular social networks and a larger web
Paid or unpaid?
Paying tool

To track discussions across 150 million data sources, including blogs, forums, videos, news
sites, review sites, and social networks, Talkwalker provides more than 50 filters. Engagement,
reach, comments, and brand sentiment can all be easily analysed.

15) Describe the Drawbacks of Social Media

Consumption of bandwidth and storage: A lot of users upload enormous data to social
networks, including photos, videos, music, and movies in high quality. Your infrastructure
could be severely harmed by downloading and keeping these files, which would make capacity
planning nearly impossible.

Potential for legal trouble: To harass a librarian they didn't like, students at Canterbury's
University of Kent started a Facebook page called "For Those Who Hate the Little Fat Library
Man." Employees could be held liable in any ensuing legal action if they utilise business, IT
resources for comparable reasons in the U.S.

Malware exposure: Social networks are intended to be open platforms with little limitations
on links or content. Security was typically not a top design priority. As a result, these networks
might be used to spread spyware, worms, and viruses.

Decreased output of the workforce: Personal social networking can have an impact on
workplace efficiency. A trader for Goldman Sachs in the UK was using Facebook for four
hours every day of work. When instructed to stop, he posted the warning email and added the
following statement: "It's a measure of how warped I've become that, not only am I surprisingly
proud of this, but losing my job worries me far less than losing Facebook."

Personal data disclosure: Businesses frequently search MySpace, Classmates.com, LinkedIn,


and other social networking sites to learn more about possible employees and rivals, but
postings should never be taken at face value.

16) Explain main components of Ecommerce

The components of E-Commerce are as follows:

User: This may be individual/organization or anybody using the e-commerce


platforms.

E-commerce vendors: This is the organization/entity providing the user,


goods/services. Eg: www.flipkart.com.E-commerce Vendors further needs to ensure
following for better, effective and efficient transaction. Suppliers and Supply Chain
Management Warehouse operations Shipping and returns E-Commerce catalogue and
product display Marketing and loyalty programs

Technology Infrastructure: This includes Server computers, apps etc. These are the
backbone. for the success of the venture. They store the data/program used to run the
whole operation of the organization.

Internet Network: This is the key to success of e-commerce transactions. Internet


connectivity is important for any e-commerce transaction to go through. The faster net
connectivity leads to better e-commerce,

Web Portal: This shall provide the interface through which an individual/organization
shall perform e-commerce transactions. These web portals can be accessed through
desktops/ laptops/PDA/hand-held computing devices/ mobiles and now through smart
TVs.

Payment Gateway: The payment mode through which customers shall make
payments. Payment gateway represents the way e-commerce vendors collect their
payments. Examples are Credit/Debit Card Payments, Online bank payments, Vendors
own payment wallet, Third Party Payment wallets, like PAYTM and Unified Payments
Interface (UPI).

17) Explain the advantages of Ecommerce

Advantage of e-commerce.

Reduced overhead costs: Running an e-commerce store is a lot more cost-effective


than running a physical store. You don't have to rent commercial real estate instead,
you can pay an affordable fee for web hosting.

No need for a physical storefront: There are so many difficult aspects to running a
physical storefront and using e-commerce means you don't have to face most of those
obstacles. Renting a commercial property can be expensive. You also have to pay for
electricity, water, and internet to ensure your space is up to code and can handle your
business. There's also security to consider, if you want your physical storefront to be
secure, you'll need to invest in cameras and other surveillance equipment. With an e-
commerce store, you can simply build your website and start selling your products
online without worrying about setting up a physical storefront and spending as much
money.

Ability to reach a broader audience: Perhaps the biggest advantage of e-commerce


is the fact that it allows you to reach a massive audience. Your physical storefront can
only get so many visitors in a day, especially if you live in a smaller town or a rural
area. With an e-commerce store, you can reach potential customers all throughout the
world and show them your products.

Scalability: If you have a physical storefront, your business can only grow so much
before you have to move to a larger storefront. You also have to move inventory and
equipment from one location to another, which makes it even harder to scale your store
with the growth of your business, With e-commerce, your website and store can grow
as your business does, and you don't have to spend a fortune moving to a new physical
space.

Track logistics: Keeping track of logistics is an essential part of e-commerce and retail
marketing, and it's significantly easier with e-commerce than it is with a physical
storefront. You can outsource fulfillment logistics so your customers can enjoy benefits
like 2-day shipping and easy returns processing.

18) Explain zero-day and zero click attacks?


A zero-day exploit is a kind of cyber security assault that happens the same day the
manufacturer discovers a software, hardware, or firmware fault. The assault is known
as a zero- day exploit or zero-day attack since it has been zero days since the security
hole was most recently exploited. Because the developer has not yet had a opportunity
to remedy the defect, this type of cyberattack is regarded as risky. Large organisations,
government agencies, firmware, hardware, the Internet of Things, users with access to
important corporate data, etc. are typical targets of zero-day exploits.
In contrast to typical assaults, zero-click attacks don't demand any action from the users
they target, such clicking a link, enabling macros, or running an executable. They are
dangerous because they are highly developed, frequently employed in cyberespionage
operations, and frequently leave very few tracks.
Once a device has been hijacked, an amucker has two options: either they will install
surveillance software or, in a much more devastating manoeuvre, they will encrypt the
tiles and demand a ransom. Users have limited options for self-defence because, in most
zero-click attacks, victims are unable to determine when and how they were infected.
These are the most important preventive steps you can take to protect yourself
online.
• You should remove any programmes that you don't even use from all of your
devices. especially your messaging devices.
• You must also refrain from "jailbreaking" or "actively searching" your phone.
It disables a number of security mechanisms built into iOS and Android
• Frequently keep all of your devices in storage. You'll be happy to know that if
your devices have ever been corrupted, it is possible to restore them to their
original state.
• On all of your devices, make sure the operating system, firmware, and apps are
updated. Apply security updates as soon as they are made available.
• Make secure passwords for each login you use.
• Pop-ups must be turned off in online browsers. Even if you still manage to
appear, avoid clicking on them. Malicious entities frequently utilise pop-up
windows to spread adware.
• If you're not confident you can manage them, only purchase apps from
authorised retailers. Regular users may unquestionably feel safe utilising the
method they have been using to review programmes.
• Viewing your accounts requires multiple factor authentication.

Use a barrier. Every major OS release includes inbound firewalls, whereas every commercial
router off the shelf includes NAT firewalls. Check to see if these are on. Every time you click
on a broken link, they might be the most powerful force in the universe.

10 Marks Questions :

1) Explain the Issues and Challenges of Cyber Security.


Cyber security faces a multitude of issues and challenges that continue to evolve
alongside technological advancements and changing threat landscapes. Some of the
prominent issues and challenges in cyber security include:
1. Sophisticated Cyber Threats: Cybercriminals are becoming increasingly
sophisticated in their attack methods, using advanced techniques such as zero-day
exploits, Al-driven attacks, and polymorphic malware to evade detection and infiltrate
systems.
2. Threat Landscape: The cyber security landscape is constantly Rapidly Evolving
evolving, with new types of threats emerging regularly. This requires cyber security
professionals to stay updated and adapt their strategies to counter new attack vectors.
3. Shortage of Skilled Professionals: There is a global shortage of skilled cyber
security professionals, making it challenging for organizations to find and retain
qualified individuals to defend against cyber threats.
4. Insider Threats: Malicious or negligent actions by employees, contractors, or
business partners can pose significant risks to an organization's cyber security. Insider
threats can lead to data breaches, intellectual property theft, and other serious
consequences.
5. IoT and Connected Devices: The proliferation of Internet of Things (IoT) devices
has expanded the attack surface, as many of these devices lack robust security measures,
making them vulnerable to exploitation.
6. Cloud Security: As more organizations migrate to cloud-based services, ensuring
the security of data and applications in the cloud becomes crucial. Misconfigurations
insecure APIs, and shared responsibility models can lead to vulnerabilities.
7. Data Privacy and Compliance: Stricter data protection regulations, such as the
General Data Protection Regulation (GDPR) and the California Consumer Privacy Act
(CCPA), place greater emphasis on protecting user data and holding organizations
accountable for breaches.
8. Nation-State Attacks: Governments and state-sponsored groups engage in cyber
espionage, cyber warfare, and other malicious activities targeting critical infrastructure,
industries, and political entities.
9. Supply Chain Vulnerabilities: Cybercriminals often target third-party vendors and
suppliers as a means to compromise larger organizations. Weaknesses in the supply
chain can lead to breaches and data loss.
10. User Awareness and Training: Despite advances in cyber security technology,
human error remains a significant factor in successful cyber-attacks. Lack of user
awareness and training can lead to mistakes like falling for phishing scams or sharing
sensitive information.
11. Mobile Security: The widespread use of mobile devices presents unique challenges
for security, as these devices are often used for both personal and work-related tasks
and are susceptible to various mobile-specific threats.
12. Attribution and Accountability: Identifying the true source of a cyber-attack and
holding perpetrators accountable can be challenging, especially in cases involving
nation-states or sophisticated hacking groups.
13. Emerging Technologies: New technologies such as artificial intelligence (AI),
machine learning, and quantum computing introduce both opportunities and challenges
in terms of cyber security. While they can enhance defense mechanisms, they can also
be exploited by attackers.
14. Balancing Security and Usability: Striking a balance between robust security
measures and user-friendly experiences is a challenge. Overly complex security
measures can lead to user frustration and circumvention of security protocols.

2) Explain the Types of Cyber Crimes.


Types of Cybercrime
1. One of the most serious violations is the use of child pornography: Predators all
throughout the world interact with youngsters online and sexually attack them. The
growing usage of the internet has made children an appealing target for hackers. In
order to lure children into their traps, paedophiles approach them in chat rooms, make
friends with them, and steal personal information from their helpless victims. Kids are
lured to the internet by these paedophiles, who then attack them sexually or use them
as sex objects.
2.Cyberbullying: A cyberbully is someone who uses electronic tools like computers,
mobile phones, laptops, etc. to harass or bully others. Bullying committed via digital
technology is referred to as cyberbullying. It could involve the usage of social media,
messaging services, gaming platforms, and mobile devices. This frequently entails
repeating actions meant to frighten, infuriate, or degrade the targets.
3. Hacking: lacking is the technique of illegally accessing a device information, making
changes to allow for continued access, and changing the configuration, use, or
maintenance of the target equipment without the knowledge or consent of the owners.
4. Cyber-grooming: This phenomenon involves someone becoming close to an
adolescent and then using coercion, taunting, or other methods to get them to engage in
sexual activity.
5. Dissemination of virus: This type of illegal activity necessitates direct or
unauthorized access to the operating system through the installation of additional
software that fall under the headings of ss bugs, worms, or logic bombs. It is obvious
that computer sabotage, which generally refers to the improper deletion or destruction
of computer data or the Internet feature that interferes with ordinary device
functionality, is illegal.
6. Phishing: Since it is simple for modern organizations to trade cash for money stored
in computers, this practice results in computer theft. Organized crime usually targets
personal and financial credit card information as well as credit card identity
information. Digital assets may potentially belong to a higher economic class, in
addition to having a far higher value than conventional economic assets.
7. Spoofing: Having one machine on a network have a separate computer, typically a
computer with privileged access, enables worldwide access to the other machines.

8. Internet stalking: Cyberstalking, as used in modern culture, is the practise of


following or keeping an eye on someone online. A cyber-stalker does not physically
pursue their target; instead, they find them after an online interaction and verbally stalk,
harass, and threaten them. It violates your right to privacy on the internet.

3) Explain the Cyber Crime against Women and Childern attacks.


cybercrime against women and children, financial frauds, social engineering attacks,
malware and ransomware attacks, zero day and zero click attack Cyber-blackmail,
threats, cyber-pornography, publishing and disseminating obscene ex-content, stalking,
bullying, defamation, morphing, and creating false profiles are the we frequent
cybercrimes against women.
According to data from the National Crime Record Bureau as of 2019, the overall
number cybercrime occurrences increased by 18.4%, but the proportion of cases
involving to increased by 28%.
10 730 events, or 20.2% of the 52 974 incidents recorded in 2021, were crimes against
women according to the data.
Karnataka, Maharashtra, and Uttar Pradesh all had smaller shares of incidents in 2021
(2.243, 1,697, and 958) respectively,
Women are more likely to be victims of the following cybercrimes:
1. Sextortion:
was the most prevalent cybercrime committed against women throughout the
pandemic. The criminals started extorting money or sexual favours from their victims
by exploiting their private photos or altered images as a form of blackmail. The
offenders threatened women and demanded that they engage in sexual encounters or
write letters to them as a way of venting their annoyance about the outbreak. They also
felt emboldened to use their manipulated photographs to scare victims in order to
extract money from them because they had little money.
2. Phishing:
To make money during the lockdown, criminals send phoney emails that contain links
to specific websites in an effort to trick the victim into providing personal information
like contact information and passwords or in order to infect the victim's device with
harmful viruses as soon as the link is clicked. These emails and texts seem to be real.
The attackers use the victim's bank account and other personal information to conduct
shady transactions from the victim's account to their own.
3. Pornography:
The perpetrators engaged in online sexual assaults against women during the pandemic,
changing the victim's photograph and putting it in pornographic content.
4. Cyberstalking:
It involved, among other things, contacting the victim via social media sites or phone
conversations despite her obvious lack of interest, posting messages on the victim's
page (often in a threatening manner), and persistently bothering the victim with emails
and phone calls.
5.Internet hacking:
People began reading the news online during the outbreak. False news and information
are more prevalent than ever before. The women became the targets of cyber hacking
after clicking on fraudulent URLS. Their phones were infected with malware that
downloaded all of their personal data, activated the microphone and camera, and
captured their private images and videos. Then, crooks exploit these images and bits of
information to commit extortion and other crimes.
6.Cybersex Trafficking:
This type of trafficking differs from physical sex trafficking in that there is no physical
contact between the victim and the offender. When a dealer broadcasts, records, or takes
photos of the victim participating in sexual or intimate actions from a central location,
they are engaging in cybersex trafficking. The dealer then sells the footage online to
customers and sexual predators. Women have been coerced, deceived, and subjected to
blackmail into engaging in cybersex trafficking, which is sexual abuse of women.

4) Explain the various Ecommerce threats


Here are some common threats:

Data Beraches: These occur when sensitive consumer information, such as credit card
details or personal data, is accessed or stolen by unauthorized individuals or
cybercriminals. Breaches can happen through hacking, phishing, or exploiting
vulnerabilities in the system.

Phishing Attacks: Cybercriminals use deceptive mails, wages, websites that mimic
legitimate sources trick users into revealing sensitive information like login credentials
credit card numbers, or personal details

Malware and Viruses: Malicious software can infect e-commerce websites,


compromising user data, stealing information, or disrupting operations. Malware can
be intronduced through infected files, links, or vulnerable software.

DDoS Attacks: Distributed Denial of Service attacks aim in overwhelm a website's


servers with excessive traffic, causing it to become slow or unavailable, disrupting
business operations and potentially leading to financial losses.

SQL Injection: Attackers exploit vulnerabilities in the website's code to insert


malicious SQL queries, allowing them to access or manipulate the database,
compromising sensitive information.

Man-in-the-Middle (MITM) Attacks: Hackers intercept communication between a


user and an e-commerce website to eavesdrop, steal information, or manipulate data
during the transmission.

Identity Theft: Cybercriminals may steal user identities from e-commerce platforms
to make fraudulent purchases, access financial accounts, or commit other forms of
fraud.
Supply Chain Attacks: Hackers target weaknesses in the supply chain to access the e
commerce platform, compromising the security of transactions, customer data, or the
overall system.
Payment Frauds: Fraudulent activities during payment transactions, such as stolen
credit card information or unauthorized transactions, pose a significant threat to e-
commerce platform and customers.
5) Explain various modes of Digital Payments
There are various modes of digital payments that have become increasingly popular
due to their convenience and accessibility.
Banking cards:
Cards are among the most widely used payment methods and come with various
features and benefits such as security of payments, convenience, etc. The main
advantage of debit/credit on prepaid banking cards is that they can be used to make
other types of digital payments. For example, customers can store card information in
digital payment apps or mobile wallets to make a cashless payment. Some of the most
reputed and well-known card payment systems arе Visa,Rupay and MasterCard, among
others. Banking cards can be used for online purchases, in digital payment apps, PoS
machines, online transactions, etc
Unified Payment Interface (UPD
UPI is a payment system but culminates numerous bank accounts into a single
application. allowing the transfer of money easily between any two parties. As
compared to NEFT. RTGS and IMPS, UPI is far more well-defined and standardized
accross banks. You can use UPI to initiate a bank transfer from anywhere in just a few
clicks.
The benefit of using UPI is that it allows you to pay directly from your bank account,
without the need to type in the card or bank details. This method has become one of the
most popular digital payment modes in 2020, with October witnessing over 2 billion
transaction.
e-Wallets
Electronic wallets or e-wallets more financial information and allow users to make
online transaction quickly. E-wallet in a type of pre-paid account in which a user can
store his/her money for any future online transaction. An E-wallet is protected with a
password. With the help of in E-wallet, one can make payments for groceries, online
purchases, and flight tickets among others. E-wallet has mainly two components,
software and information. The softwawe component stores personal information and
provides security and encryption of the data. The Information components is a database
of details provided by the user which includes their name shipping address, payment
method, account to be paid, credit or debit card details, etc Services like PayPal. Google
Pay, Apple Pay, and Payers fall under this category.
Unstructured Supplementary Service Data (USSD)
USSD technology enables mobile banking services through basic phones, allowing
users to access bancking services by dialing a shortcode. This method doesn't require
internet connectivity and is particularly beneficial in regions with limited internet
access USSD was launched for those sections of India's population which don't have
access to proper banking and internet facilities. Under USSD, mobile banking
transaction are possible without an internet connection by simply dialing 1999 on any
essential feature phone.
This number is operational across all Telecom Service Providers (TSP) and allows
customers to avail of services including interbank account in account fund transfer,
balance inquiry, and availing mini statements. Around 51 leading banks offer USSD
service in 12 different languages. including Hindi & English.
Aadhar enabled payments system (AEPS)
AEPS is a bank led model for digital payments initiated to leverage the presence and
reach of Aadhar. Under this system, customers can use their Aadhar-linked accounts to
transfer money between two Aadhar linked Bank Accounts. As of February 2020,
AEPS had crossed more than 205 million as per NPCI data.
AEPS doesn't require any physical activity like visiting a branch, using debit or credit
cards or making a signature in a doccument. This bank-led model allows digital
payments at PS (Point of Sale/Micro ATM) via a Business Correspondent (also known
as Bank Mitra) using Aadhar authentication.
Each mode of digital payment offers its own set of advantages in terms of accessibility,
use, security, and suitability in different scenarios. The chance of which to use often
depends on factors like convenience, accessibility to technology, internet connectivity,
and personal preferences.

You might also like