You are on page 1of 28

Q.1 Explain Brick and Mortal Models (i.

e Retail Model, Media Model, Advisory Model, Manufacturing model, Information service model)

The term brick and mortar business (bricks and mortar business or B&M business) is often used to refer to a company that possesses a building or store for operations More specifically, in the jargon of ecommerce businesses, brick and mortar businesses are companies that have a physical presence and offer face-to-face customer experiences. This term is usually used to contrast with a transitory business or an internetonly presence, such as an online shop, which have no physical presence for shoppers to visit and buy from directly, though such online businesses normally have non-public physical facilities from which they either run business operations, and/or warehousing for mass physical product storage and distribution. The term brick and mortar businesses is also a retronym in that most stores had a physical presence before the advent of the Internet. However, the term is also applicable when contrasting businesses with physical presence and those that operated strictly in an order-by-mail capacity pre-Internet. Some stores, such as Best Buy, Walmart and Target, are primarily known as brick and mortar businesses but also have online shopping sites. RETAIL MODEL

Entrepreneurs have many forms of retail business ownership available to them. Each business model has its own list of pros and cons. Choosing a type of retail business to start will depend on why you want to own a business, as well as your lifestyle, family, personality, basic skills and much more. Here are a few of the main types of retail ownership and the advantages, disadvantages, and support system of each. 1. Independent Retailer In independent retailer is one who builds his/her business from the ground up. From the business planning stage to opening day, the independent retail owner does it all. He/she may hire consultants, staff and others to assist in the business endeavor. The opportunities are endless. . Existing Retail Business Someone who inherits or buys an existing business is taking ownership and responsibility of someone else's hard work. The foundation has already been laid. . Franchise Purchasing a franchise is buying the right to use a name, product, concept and business plan. The franchisee will receive a proven business model from an established business. Dealership Retailers may find the business model of a licensed dealership as a mix of franchise and independent retailer. The licensee has the right (sometimes this is exclusive) to sell a brand of products. Network Marketing Multi-level marketing (MLM) or network marketing is a business model where the selling of products depends on the people in the network.

MEDIA MODEL

Brand Strategy. Media Relations. Event Production. Consulting. Talent Management. Entertainment, Lifestyle, Consumer, Health & Wellness. THE MEDIA MODEL is what we do! The days of working with a hierarchy of suits are over. THE MEDIA MODEL provides all clients with hands-on communication expertise on the smallest detail, all the way through to the largest production. Our meteoric rise to the communication stratosphere has been quite the feat. From the intense corporate arenas of advertising and marketing to the demanding worlds of model development and entertainment public relations, weve seen it all. The fluid journey from one communication discipline to the next has become our way of life.

ADVISORY MODEL

Organizing Priorities guides the financial advisor to define the vision and arrange the priorities within the Business Client Engagement Model involves all interactions between the advisor, the advisors firm and the client. Client Acquisition Strategy is the strategy, approach, tactics and execution of acquiring and on-boarding new clients. Marketing Approach is the disciplined planning and strategy that precedes the tactical aspects of client acquisition Team Development is all of the activities and behaviors necessary for the growth and maintenance of a high-performing team. Professional Advocate Network is the collection of trusted advisors who work together in a mutually-defined relationship Business & Operations Management is an all-inclusive and practical aspects of running a profitable and sustainable business, Leadership has applications towards all other categories and can pertain to: leadership of clients, team leadership, or leadership within the community.

Innovation, like Leadership and Focus on Growth, transcends all groupings and accentuates the continual need for creativity and re-invention. Growth is an overarching theme that can apply to all segments of the model. MANUFACTURING MODEL

Although manufacturing simulation tools can be considered mainstream technology, most U.S. manufacturers do not take full advantage of this technology for a variety of reasons, including the large manual effort needed to deploy these tools, and the unreliability of the simulated models Objective: To develop and deploy advances in measurement science that will help optimize factory throughput, quality, and efficiency through the automation of data acquisition, manufacturing model development, and manufacturing analysis, delivering results through open-source implementations and standards bodies by 2014.

INFORMATION SERVICE MODEL

An information model in software engineering is a representation of concepts and the relationships, constraints, rules, and operations to specify data semantics for a chosen domain of discourse. The term information model in general is used for models of individual things, such as facilities, buildings, process plants, etc. In those cases the concept is specialised to facility information model, building information model, plant information model, etc. Such an information model is an integration of a model of the facility with the data and documents about the facility.

Q.2 Explain Click to Click Model (with example) Historical user click patterns on search result pages are considered a great resource for algorithms that attempt to learn to rank search results. This ranking method is a well-studied problem in the field of Information Retrieval If learn-to-rank algorithms could explicitly observe which results were deemed relevant by most users and which were not, we would have open access to users minds. Click models are mathematical models that attempt to do just that: Describe a typical users decision process as he or she interacts with the search results page, so that we may infer said users judgments on the relevance and irrelevance of specific search results. Consider the following two explanations: 1. The user looked at the SRP, read the snippet returned for result #1, then ignored it as irrelevant. The user then moved to result #2, read the snippet, found it attractive, clicked through to the page, found the meaning of life in there, then stopped the search, satisfied with what he found. 2. The user glanced at the SRP, chose result #2 randomly, read the snippet, found it somewhat relevant, clicked-through to the page, and found it completely irrelevant. Then his phone rang and he abandoned the search. According to the first explanation, result #2 was relevant to the users search. According to the second explanation, it wasnt. Both explanations (and many others) are possible. But are they equally likely? A click model helps us assign mathematical probabilities to every such explanation, enabling us to use millions of scenarios to infer the likelihood of relevance for every search result against every search. DBN CLICK MODEL: In this model, SRPs list items on sale rather than webpage URLs. Every listing L is assumed to have two independent intrinsic properties: aL and gL. The aL property denotes how attractive the listing looks in the SRP, which influences clicks; and gL denotes how much of a good shopping deal the listing really is, which depends on the price,

item details, seller details, shipping details, etc. Both variables are latent that is, cannot be observed directly; however, they are assumed to influence the behavior of users on the site, and therefore can be inferred (hopefully) by analyzing mountains of click data. Notice how the model still contains Ei (examine) events, and how, just like the DBN model, the user is assumed to examine results sequentially top to bottom. The proposed model also contains Ai (attracted enough to click) events; but Si (satisfied) events are replaced with Gi(good deal) events, which denote that the user found the listing to be a good deal over all. We introduce a new event S (success event) to denote a successful shopping experience. At eBay, an S event translates into a bid or buy-it-now action. Because S events are directly observable, this model enables learning from clicks, bids, and purchases simultaneously. Upon finding a good deal, the user performs an S event with probability f(G), which depends not only on the goodness of the current listing, but on the goodness of all previously examined listings. This is how the model accounts for users browsing multiple good and bad deals before arriving at an S decision. In the simplest case, f(G) can be the sum of good deals encountered, but can be generalized to the form: f(G) = (good deals) + (bad deals) Where and are model parameters. This modeling framework, if properly applied to eCommerce click logs, would greatly enhance the learnability of ranking algorithms from click data.

Q3.

Explain Brick to Click Model (with example)

Bricks and clicks (aka clicks and bricks, click and mortar, or bricks, clicks and flips) is a business model by which a company integrates both offline (bricks) and online (clicks) presences, sometimes with the third extra flips (physical catalogs). Additionally, many will also offer telephone ordering as well, or at least provide telephone sales support. A popular example of the bricks and clicks model is when a chain of stores allows the customer to order products either online or physically in one of their stores, also allowing them to either pick-up their order directly at a local branch of the store or get it delivered to their home. There are many alternative combinations of this model. Conversely, a business selling more luxurious, often expensive, or only occasionally purchased products like cars may find sales are more common with a physical presence, due to the more considered nature of the purchasing decision, though they may still offer online product information. For example, an electronics store may allow the user to order online, but pick up their order immediately at a local store, which the user finds using locator software. Conversely, a furniture store may have displays at a local store from which a customer can order an item electronically for delivery. Advantages of the Bricks and Clicks model Click and mortar firms have the advantage in areas of existing products and services. In these cases there are major advantages in retaining ties to a physical company. This is because they are able to use their competencies and assets, which include: - Core competency. Successful firms tend to have one or two core competencies that they can do better than their competitors. It may be anything from new product development to customer service. When a bricks and mortar firm goes online it is able to use this core competency more intensively and extensively.

- Existing supplier networks. Existing firms have established relationships of trust with suppliers. This usually ensures problem free delivery and an assured supply. It can also entail price discounts and other preferential treatment. - Existing distribution channels. As with supplier networks, existing distribution channels can ensure problem free delivery, price discounts, and preferential treatments. United Parcel Service, the subject of our story, is such a creature. The nearly 100-year-old, $28 billion company delivers six percent of the nation's Gross Domestic Product and already controls half of all e-commerce deliveries. Since 1998, UPS' business is up 78 percent and 80 percent of its Logistics Group's business is B2B. Under these circumstances, it's easy to lose perspective when you learn just what goes on after a customer calls UPS for pick-up. It has 2.5 million customers, 345,000 employees, 160,000 trucks and a staggering 74terabyte database of customer and package information that helps track 90 percent of all the packages it touches. Now it's building the e-commerce side of the house and becoming the "brick-and-click" it always knew it could be because, finally, the technology came along that allowed it to turn that big database into useful services for its customers and added value for its shareholders. If you've ever been at the right place at the right time you understand why it may never have occurred to UPS to not throw its arms around the Internet.

Q4. Explain online banking; describe the use of Online banking system with the practical example (like SBI online, BOB online, HDFC, ICICI etc.)? A system allowing individuals to perform banking activities at home, via the internet. Some online banks are traditional banks which also offer online banking, while others are online only and have no physical presence. Online banking through traditional banks enable customers to perform all routine transactions, such as account transfers, balance inquiries, bill payments, and stop-payment requests, and some even offer online loan and credit card applications. Account information can be accessed anytime, day or night, and can be done from anywhere. A few online banks update information in real-time, while others do it daily. Once information has been entered, it doesn't need to be re-entered for similar subsequent checks, and future payments can be scheduled to occur automatically. Many banks allow for file transfer between their program and popular accounting software packages, to simplify record keeping. Despite the advantages, there are a few drawbacks. It does takesome time to set up and get used to an online account. Also, some banks only offer online banking in a limited area. In addition, when an account holder pays online, he/she may have to put in a check request as much as two weeks before the payment is due, but the bank may withdraw the money from the account the day that request is received, meaning the person has lost up to two weeks of interest on that payment. Online-only banks have a few additional drawbacks: an account holder has to mail in deposits (other than direct deposits), and some services that traditional banks offer are difficult or impossible for online-only banks to offer, such as traveler's checks and cashier's checks. To access a financial institution's online banking facility, a customer having personal Internet access must register with the institution for the service, and set up some password (under various names) for customer verification. The password for online banking is normally not the same as for telephone banking. Financial institutions now routinely allocate customer numbers (also under various names), whether or not customers intend to access their online banking facility.

Customer numbers are normally not the same as account numbers, because a number of accounts can be linked to the one customer number. The customer will link to the customer number any of those accounts which the customer controls, which may be cheque, savings, loan, credit card and other accounts. Customer numbers will also not be the same as any debit or credit card issued by the financial institution to the customer. To access online banking, the customer would go to the financial institution's website, and enter the online banking facility using the customer number and password. Some financial institutions have set up additional security steps for access, but there is no consistency to the approach adopted. FEATURES: A bank customer can perform some non-transactional tasks through online banking, including

viewing account balances viewing recent transactions downloading bank statements, for example in PDF format viewing images of paid cheques ordering cheque books download periodic account statements Downloading applications for M-banking, E-banking etc.

Bank customers can transact banking tasks through online banking, including

Funds transfers between the customer's linked accounts Paying third parties, including bill payments (see, e.g., BPAY) and telegraphic/wire transfers

Investment purchase or sale Loan applications and transactions, such as repayments of enrollments Register utility billers and make bill payments Financial institution administration Management of multiple users having varying levels of authority Transaction approval process the process of banking has become much faster

USES OF ONLINE BANKING:

View balances: Checking your balance doesn't require much work. You simply select Account balances and take a look at your balance and past transactions. If you have more than one account, you can also do transfers between accounts. Pay bills: To pay your bills online, you just need to add to your account the names of the companies you wish to pay bills to. In the Pay Bills section, select Add payees, search for the name of the company and fill in the account number for each company. You can also sign up for the Ebills service that sends you a bill by e-mail instead of a printed one by regular mail. Transfer funds: When you select Transfer Funds, you'll be asked where to transfer the money to and from, when, and the amount. Set up recurring bill payments or transfers: If you make a regular payment every month, it might be convenient to set up an automatic withdrawal from your account. Monitor CIBC investments: If you have any CIBC investments, you can keep an eye on those stocks or mutual funds here. Send and receive an INTERAC e-TransferTM2: This could be the end of the birthday cheque! You can receive transfers from other people's

accounts, or set up transfers from your account to someone else's. The recipient will get an e-mail notifying them of the transaction.

View CIBC VISA* accounts: Always a good place to monitor your spending. You can make your credit card payments online, right from your account. Order cheques: We don't need them much anymore due to online banking and debit purchases, but if you still use cheques, you can order them directly from the CIBC website.

Q5. Explain the Digital signature with its various use (Describe the Class 2 & 3), As well as explain what Digital certificate is? A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. A digital signature scheme typically consists of three algorithms:

A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key. A signing algorithm that, given a message and a private key, produces a signature. A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity.

Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify the authenticity of that message by using the corresponding public key. Secondly, it should be computationally infeasible to generate a valid signature for a party without knowing that party's private key. Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. In some countries, including the United States, India, and members of the European Union, electronic signatures have legal significance. Digital signatures employ a type of asymmetric cryptography. For messages sent through a nonsecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures are equivalent to traditional handwritten

signatures in many respects, but properly implemented digital signatures are more difficult to forge than the handwritten type. Digital signature schemes in the sense used here are cryptographically based, and must be implemented properly to be effective. Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some nonrepudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid. Digitally signed messages may be anything representable as a bitstring: examples include electronic mail, contracts, or a message sent via some other cryptographic protocol. USES: As organizations move away from paper documents with ink signatures or authenticity stamps, digital signatures can provide added assurances of the evidence to provenance, identity, and status of an electronic document as well as acknowledging informed consent and approval by a signatory. The United States Government Printing Office (GPO) publishes electronic versions of the budget, public and private laws, and congressional bills with digital signatures. Universities including Penn State, University of Chicago, and Stanford are publishing electronic student transcripts with digital signatures. Below are some common reasons for applying a digital signature to communications: Authentication: Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake.

Integrity: In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. (Some encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if a message is digitally signed, any change in the message after signature will invalidate the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions (see collision resistance). Non-repudiation: Non-repudiation, or more specifically nonrepudiation of origin, is an important aspect of digital signatures. By this property, an entity that has signed some information cannot at a later time deny having signed it. Similarly, access to the public key only does not enable a fraudulent party to fake a valid signature. DIGITAL CERTIFICATES: Digital Certificates are the electronic counterparts to driver licenses, passports and membership cards. You can present a Digital Certificate electronically to prove your identity or your right to access information or services online. Digital Certificates, also known as digital certificates, bind an identity to a pair of electronic keys that can be used to encrypt and sign digital information. A Digital Certificate makes it possible to verify someone's claim that they have the right to use a given key, helping to prevent people from using phony keys to impersonate other users. Used in conjunction with encryption, Digital Certificates provide a more complete security solution, assuring the identity of all parties involved in a transaction. A Digital Certificate is issued by a Certification Authority (CA) and signed with the CA's private key.

A Digital Certificate typically contains the:


Owner's public key Owner's name Expiration date of the public key Name of the issuer (the CA that issued the Digital Certificate) Serial number of the Digital Certificate Digital signature of the issuer

CLASS 2 CERTIFICATES: Class 2 Digital signature certificates are issued to Individual or organization for various purposes. Class 2 A digital signatures for individuals is personal certificate that provides second highest level of assurance within the RCAI hierarchy setup by CCA ( Controller of Certifying Authorities) in India which is mainly used for MCA21, ROC, Income Tax e-filing, sign a word or excel file, sign e-mail sent through Outlook and many more. CLASS 3 CERTIFICATES: Class 3 a/b digital signature certificates are issued to Individual or organization for various purposes. Class 3 A/B digital signatures for individuals/Organization is certificate that provides highest level of assurance within the RCAI hierarchy setup by CCA ( Controller of Certifying Authorities) in India which is mainly used for e-tendering or e-procurement or e-bidding.

Q.6 WHAT IS A PAYMENT GATEWAY? In short, a payment gateway is an e-commerce application service provider that authorizes payments for e-businesses, online retailers, and bricks and clicks. Payment gateways allow you to list your merchandise or services online and automatically process credit cards, debit cards or other forms of payment without so much as lifting a finger. 1. Paypal What I can say about Paypal is that it is truly worldwide. Paypal is a global ecommerce business allowing payments and money transfers to be made over the internet, and is one of the most popular.. With only an email address needed to sign up, you can begin sending and receiving payments. In addition, PayPal offers a merchant services division that allows businesses of all sizes to accept credit card payments much like a normal merchant account, with low transaction fees. 2. Checkout The second candidate is 2Checkout, also called 2CO. 2Checkout is a merchant account alternative founded in 2000 that allows online merchants to accept credit card payments from their customers. 2Checkout could help your business go worldwide easily with 8 payment methods, 15 languages, and 26 currencies.Your international customers will feel confident if your website uses this gateway.2Checkout partners with dozens of the most popular online shopping carts and invoicing systems to allow simple integration, including Joomla shopping cart extensions such as redSHOP and VirtueMart. To start selling with 2Checkout, you just need to sign up with 2Checkout by submitting an application. Wait for the application to be approved, then your site is up and running. 3. Google Wallet Google Wallet, superseded Google Checkout and is a mobile payment system developed by Google. It allows its users to store debit cards, credit cards, loyalty cards, and gift cards among other things, as well as accessing sales

promotions on their mobile phone. More and more people use smartphones and other mobile device, so they will increasingly use this type of payment service to shop anytime and anywhere they want. If you get Google Wallet, I think the number of your customers will also increase. 4. Authorize.net Authorize.net is the fourth option . Since 1996, Authorize.Net has been a leading provider of payment gateway services, managing the submission of billions of transactions to processing networks on behalf of merchant customers.Authorize.net is a solution of CyberSource Corporation, a wholly owned subsidiary of Visa. There are many people usingAuthorise.net, although less than Paypal. 5. Amazon Payment Amazon payment is a service launched in 2007 by Amazon. Im sure one thing everyone knows is Amazon is one of the biggest retailers on the Web. This powerful and flexible payment engine allows users who are already familiar with and trust the Amazon brand to purchase goods from your web site using their Amazon customer ID. You and your customers may well feel more secure as a result of an association with the prestigious Amazon brand. Amazon provides 2 products for business: Checkout by Amazon (CBA) and Amazon Simple Pay (ASP). You can choose which one best suits your business size. 6. Worldpay WorldPay provides a globally connected, locally coordinated payment processing service for all sorts of businesses, big and small in over 40 countries. They offer Business Gateway which is a smart, affordable solution for small to medium sized businesses wanting to accept online payments. It accepts more payments by offering all major card methods as well as PayPal, set up subscriptions and much more. For small and medium businesses worldwide, you can use Business Gateway Plus. It includes merchant accounts which helps you to trade online, access to multi currencies and world-class fraud-screening.

7. Skrill (Moneybookers) Skrill helps online business websites accept credit and debit cards. Its a very basic payment gateway a simple solution for small businesses. Skrill is used by over 120,000 merchants with more than 100 payment options and 41 currencies covering 200 countries and territories. Skrill processes payments in such a way as to help your customers feel secure, since they do not give personal payment information to the seller. It does not require the sender to register an account, only the recipient. 8. Payza Payza is yet another quick and convenient method to receive funds from customers. With over 9 million members, Payza offers its services in 197 countries and in 21 different currencies. Payza offers foreign exchange services, fraud screening services, email invoicing, mass and single remittances and business management tools. If you use Payza it means you will have access to many great tools such as checkout payment buttons, shopping cart integration, merchant marketing kits, online invoicing and payouts. 9. Quickpay QuickPay is another safe choice for online payment transactions. QuickPay works with all common credit and debit cards as well as other popular payment methods such as Paypal, Sofort Banking and other e-banking facilities. With QuickPay payment solutions, there are no sign up fees and you can access all common payment types within the one solution. Also, they have a great API to code with. 10 .Sagepay Last but not least, Sage Pay delivers secure and efficient payment services processing millions of payments each month for over 40,000 businesses. Payments are processed securely online and over the phone with streamlined integration to your website or e-commerce platform. There are no contracts or hidden fees, however, the merchant account application process can take quite a long time, about 5-10 working days.

Q.7 EFT: ELECTRONIC FUND TRANSFER Electronic funds transfer (EFT) is the electronic exchange, transfer of money from one account to another, either within a single financial institution or across multiple institutions, through computer-based systems. The term covers a number of different concepts: Wire transfer via an international banking network Cardholder-initiated transactions, using a payment card such as a credit or debit card Direct deposit payment initiated by the payer Direct debit payments, sometimes called electronic checks, for which a business debits the consumer's bank accounts for payment for goods or services Electronic bill payment in online banking, which may be delivered by EFT or paper check Transactions involving stored value of electronic money, possibly in a private currency Electronic Benefit Transfer

Electronic Funds Transfers (EFTs) Explained A check is merely a one-time written authorization for the payer's bank to pay the payee. An EFT Authorization is also a written authorization to pay but it is good for multiple transactions. It authorizes a depositors' bank to move funds from his/her bank account to the bank account of the authorized merchant. This movement of funds is done between banks electronically, and so the term Electronic Funds Transfer (EFT). EFT is also called ACH (for Automated Clearing House). The electronic movement of funds between banks is more convenient, efficient, secure, faster and far less costly to than the handling of paper checks. The banking system moves trillions of dollars electronically every year. How do EFTs/ACH work? 1. Authorization: Your member provides you with written authorization to allow you to electronically debit his/her account, along with a voided check.

2. Enter Data: You enter the customer's checking or savings account data into Gym Assistant. 3. Generate Member Transaction Data: Three days before your processing day (or "debit date"), you use Gym Assistant to generate a data file listing each of the transactions that should occur on the debit date. This file is saved in a secure encrypted format. 4. Transmit: You send the secure data file to the EFT Processor through the intenet. 5. Record Member Payments: In Gym Assistant, you record all payments that were transferred successfully. The due date for each member is moved forward by one month. 6. Processing: After the EFT Processor receives your data, the processor reformats and submits the data to the Federal Reserve's secure Automated Clearing House (ACH) electronic banking system. 7. Payment: The money is deducted from your member's account by his/her bank on the debit date, and then immediately deposited into your business bank account. 8. Reporting: A few days after the debit date the EFT Processor sends you a record of any unpaid items and the reason for each non-payment. In Gym Assistant, you then reverse the previouslyrecorded payments for any members with unpaid items. Those members will automatically be denied entry until their payment has been made. Unauthorized intrusion Intrusion can be both either physical or logical. In physical intrusion, the intruder physically could enter an organization to steal information system assets or carry out sabotage. For example the Intruder might try to remove hard disks. In case of logical intrusion, the intruder might be trying to have an unauthorized access to the system. The purpose could be damaging or stealing data, installation of bug or wire tapping -- Spying on communication within the organization.

Q.9 How to prevent unauthorized computer access.? Below is additional information about helping to secure your computer and prevent any unauthorized access from other people or software programs; helping keep your information safe. Operating system and software patches and updates There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data. Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of thirdparty companies and links to each of their pages can be found on our third-party support page. How to update a Microsoft Windows computer. Passwords

Make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account. 1. Change passwords often. It is recommended at least once every few months. 2. Create a BIOS password. 3. When creating a password, add numbers or other characters to the password to make it more difficult to guess; for example, 1mypassword23!. 4. Do not use sticky notes around your computer to write down passwords. Instead use a password manager. Complete information and links to information about computer passwords. Get a hardware or software firewall

We highly recommend all computer users have a firewall solution. There are two ways a firewall can protect your computer andnetwork. 1. Hardware firewall - A hardware firewall is a hardware device that is connected to your network. Often many home users who have a home network use their network router as a firewall solution. 2. Software firewall - A software firewall is a software program that you install on your computer that helps protect that computer from unauthorized incoming and outgoing data. Below is a listing of a few of the more widely used software firewall programs. Agnitum Outpost Firewall BlackICE PC Protection Kerio Personal Firewall Sygate Firewall Tiny software Tiny Personal Firewall Network Associates Zone Labs Zone Alarm Note: A software firewall is only going to protect the computer that has the firewall installed on it. How to enable or disable the Microsoft Windows firewall. Trojans, viruses, spyware, and other malware

Software Trojans, viruses, spyware, and other malware can not only damage or destroy your computer data but is also capable of monitoring your computer to learn more about your viewing habits on the Internet or even log all your keystrokes to capture sensitive data such as passwords and credit card information. To help protect your computer from these threats we suggest installing a virus protection program as well as a spyware protection program. What are the current available antivirus programs? My web browser has been hijacked. Know how to handle e-mails

Today, e-mail is one of the most popular features on the Internet. Being able to identify threats sent through e-mail can help keep your computer and your personal information safe. Below are some of the most common threats you may encounter while using e-mail.

Attachments - Never open or run e-mail attachments. Viruses, spyware, and other malware are commonly distributed through e-mails that have attachments. For example, an e-mail may want you to open an attachment of claiming to be a funny video, when it's really a virus. Phishing - Phishing or an e-mail phish is an e-mail that appears to be from an official company (such as your bank) indicating you need to log onto the site to check your account settings. However, the e-mails are really sites setup to steal confidential information such as your passwords, credit card information, social security information, etc. See the phishing definition for additional information about this term as well as examples of these e-mails. Alternative browser

Before the release of Microsoft Windows XP SP2 and Internet Explorer 7.0, Microsoft Internet Explorer was notorious for security and spyware related issues. Although it has improved since then we still highly recommend considering an alternative browser such as Mozilla Firefox. Run system scans to check for vulnerabilities There are several sites on the Internet that allow users to check their computers for potential threats or issues their network or computer may have that can allow users unauthorized access to their computer. Below are a listing of recommend sites to try: Gibson Research Corporation - The Gibson Research Corporation, or GRC, is a great location to learn about network security as well as well as test your computer or network for vulnerabilities. Hacker Wacker - Another great site with computer security related information, help, and programs to help test your computer and network.

You might also like