Group 3: Internet Security, Selling and Chatting On The Web

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

GROUP 3

INTERNET SECURITY, SELLING AND CHATTING ON THE WEB


INTERNET SECURITY

• Internet security is a branch of computer security specifically related to not only internet,


often involving browser security and the World Wide Web, but also network security as
it applies to other applications or operating systems as a whole. Its objective is to
establish rules and measures to use against attacks over the Internet. The Internet
represents an insecure channel for exchanging information, which leads to a high risk
of intrusion or fraud, such as phishing, online viruses, trojans, worms and more.
• Many methods are used to protect the transfer of data, including encryption and from-the-
ground-up engineering. The current focus is on prevention as much as on real time
protection against well known and new threats.
INTERNET SECURITY THREATS

1. Malicious software
• An internet user can be tricked or forced into downloading software that is of malicious intent onto a computer. Such software comes in
many forms, such as viruses, Trojan horses, spyware, and worms.
• Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to
private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not
include software that causes unintentional harm due to some deficiency. The term bad ware is sometimes used, and applied to both true
(malicious) malware and unintentionally harmful software.
• A botnet is a network of zombie computers that have been taken over by a robot or bot that performs large-scale malicious acts for the
creator of the botnet.
• Computer viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The
common use of a virus is to take over a computer to steal data.
• Computer worms are programs that can replicate themselves throughout a computer network, performing malicious tasks throughout.
• Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the
creator(s) of the malware in order for the restriction to be removed.
INTERNET SECURITY THREATS C’TD

• Scareware is scam software of usually limited or no benefit, containing malicious payloads, that is
sold to consumers via certain unethical marketing practices. The selling approach uses social
engineering to cause shock, anxiety, or the perception of a threat, generally directed at an
unsuspecting user.
• Spyware refers to programs that surreptitiously monitor activity on a computer system and report that
information to others without the user's consent.
• One particular kind of spyware is key logging malware. Keystroke logging, often referred to
as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on
a keyboard.
• A Trojan horse, commonly known as a Trojan, is a general term for malicious software that pretends
to be harmless, so that a user will be convinced to download it onto the computer.
INTERNET SECURITY THREATS C’TD

2. Denial-of-service attacks
• A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer
resource unavailable to its intended users. Another way of understanding DDoS is seeing it as attacks in cloud computing
environment that are growing due to the essential characteristics of cloud computing. Although the means to carry out, motives
for, and targets of a DoS attack may vary, it generally consists of the concerted efforts to prevent an Internet site or service from
functioning efficiently or at all, temporarily or indefinitely. According to businesses who participated in an international business
security survey, 25% of respondents experienced a DoS attack in 2007 and 16.8% experienced one in 2010. DoS attacks often
use bots (or a botnet) to carry out the attack.
3. Phishing
• Phishing is an attack which targets online users for extraction of their sensitive information such as username, password and
credit card information. Phishing occurs when the attacker pretends to be a trustworthy entity, either via email or web page.
Victims are directed to fake web pages, which are dressed to look legitimate, via spoof emails, instant messenger/social media
or other avenues. Often tactics such as email spoofing are used to make emails appear to be from legitimate senders, or long
complex subdomains hide the real website host.
INTERNET SECURITY THREATS C’TD

4. Application vulnerabilities
• Applications used to access Internet resources may contain security vulnerabilities such
as memory safety bugs or flawed authentication checks. The most severe of these bugs
can give network attackers full control over the computer. Most security applications and
suites are incapable of adequate defense against these kinds of attacks.
• A very and widespread web-browser application vulnerability is the so-called Cross-
Origin Resource Sharing (CORS) vulnerability - for maximum security and privacy,
make sure to adopt adequate countermeasures against it (such as the example patches
provided for Web Kit-based browsers).
INTERNET SECURITY TIPS

1. Lock up your computer


• Leaving your PC unattended makes room for attack and insertion of malware. To prevent this is it always recommended that you lock
up PC even if you are going to be away from it for a very short time period. Locking of your PC is also essential particularly if you
have any confidential data stored on an external hard drive or a flash drive.
2. Websites with HTTPS are secure
• URLs are not secure when they start with ‘https://’. URLs starting with ‘https://’ are considered to be safe as they use Hypertext
Transfer Protocol (HTTP) along with the Secure Socket Layer (SSL)/Transport Layer Security (TLS) protocol. This highlights the fact
that everything that happens between your browser and the web server gets encrypted, thus protecting all your Internet activities.
3. Exercise safe clicking rules
• If you come across a suspicious or doubtful link, never click on it immediately and instead go ahead and take another look at the URL
of the website the link directs you to. Malicious actors frequently become attracted to spelling mistakes and use these as a tool to
direct you to an unfriendly domain.
INTERNET SECURITY TIPS

4. Have different passwords for all your accounts


• As users of the web, we access a number of websites and hence have too many accounts. Always have different passwords for every
single account. Do not use the same passwords for all your accounts even if the password is very strong and difficult to crack. Following
this rule will help prevent hackers and protect all your Internet-related activities.
5. Use difficult to answer security questions
• As internet users, we often tend to forget our passwords to certain sites and end up resetting them all over again. While doing this we
come across security questions that will have to be answered. Coming up with genuine answers is a big NO as any hacker will be able to
easily guess them. Instead, use vague and unrelated answers that can also have numerals. Make sure you remember these answers as
you may have to use them in case you get locked.
6. Update your operating system and all software
• Popups appear occasionally just to remind you of a new update. These popups can become annoying and there are users who simply
close them without even giving them a read. Failing to read these popup reminders will only make room for easy attacks and your PC
will definitely have no protection.
INTERNET SECURITY TIPS

7. Be careful when you browse


• Personal browsing activities like shopping or banking or paying bills should be performed on your own device and on a trustworthy a
network as hackers are out there to instantly steal all your data and use it for illegal purposes.
8. Delete suspicious email attachments
• Never open any doubtful attachments or links sent by strangers. If you do receive them, instantly delete them as hackers generally send
malware by hacking an email account and sending emails to all the contacts on a victim’s contact list. If you get an email from known
contacts and if it looks suspicious, immediately email those individuals and let them know that they could have been hacked. These
known contacts will have to change their password and activate 2-step authentication.
9. Be cautious when using public Wi-Fi
• Using free public Wi-Fi to access websites actually puts you at risk of allowing an individual to seize your data. This is true because it is
just not possible to find out how protected any public Wi-Fi can be. However, if you are in a situation where you have to urgently use
the net, then make sure to switch off file sharing on your PC prior to connecting your PC to the free Wi-Fi connection. Also, make sure
that you are connected to a VPN and never sign into any website asking for a password.
INTERNET SECURITY TIPS

10. Share minimal sensitive data


• With Facebook, Twitter and other social networks becoming greatly popular these days, individuals
using them post everything happening in their lives on these networks. These individuals ignore
the fact that there are criminals out there who can become their friend very easily and obtain
access to almost all their personal details. Hence, we have to be cautious about what we really
need to post on these social networks. As users of the internet, it is indeed our responsibility to
close all vulnerable holes that allow hackers to enter your personal world.
SELLING AND CHATTING ON THE WEB

• When thinking about online sales and e-commerce, you probably get the picture of a
website with a shopping cart and a bunch of products. That definitely works but there is
so much more to be done on an e-commerce website.
• Your sales process can go beyond the boundaries of normal websites by
integrating different channels as well as a mobile-friendly design. You can use tools
like live/online chat that are normally associated with support to create proactive sales
campaigns that reach out to customers who browse your products.
SELLING ON THE WEB / ONLINE SELLING

• Online selling is the act or process of selling goods, products or services via an internet or
mobile app, auction site, online classified advertisement, online shop, social networking,
social media or web shop.
• One advantage is that, Selling directly online increases your reach to esteemed buyers.
With an online store, your profits are no longer limited by the number of customers that
can physically visit your location. You can sell across towns, states, and even across
borders, removing all geographical limitations.
FACTORS TO CONSIDER WHEN SELLING ON THE
WEB

1. Make sure you have a market.


• You probably have a basic web site already; are you getting requests for online buying
from potential customers? It is never truly possible to judge in advance whether a market
exists, but there should be at least some indication of a demand for an online presence.
2. Use a clicks-and-mortar strategy if possible.
• The clicks-and-mortar approach is the most effective and economic. This combines
offline resources, such as store brands, channels with an online e-commerce presence.
FACTORS TO CONSIDER WHEN SELLING ON THE
WEB
3. Integrate the shopping experience.
• Consumers look to the web primarily for information; they may use the web site initially to find out about
the product, then buy by phone or in person.
4. Plan how you will deal with content, pricing, stock management, fulfilment, support, payment,
returns, support and security.
• These are the basics of any business, but there can be added complications online. You’ll need to value
and address each of them.
5. Develop an easy-to-use purchase process.
• Your purchase process must be reliable and very easy to use.
FACTORS TO CONSIDER WHEN SELLING ON THE
WEB

6. Consider localization issues.


• If you want to sell seriously to foreign marketplaces, you will have to localize the web site.

7. Consider customer relationship management and personalization.


• The Internet offers many opportunities for a better understanding of customer’s behavior and for
developing a closer relationship with them.
8. Make sure that you buy the right software.
• There is no need to do all the work internally, as there is now a wide range of quality software
for e-commerce.
FACTORS TO CONSIDER WHEN SELLING ON THE
WEB

9. Make sure you have a team in place.


• An e-commerce web site needs day-to-day maintenance.
10. If you don’t market, they won’t come.
• You will need an aggressive marketing campaign to make your target market aware of
what you have to offer. The ideal situation is a seamless integration with marketing
strategy of the offline business.
ADVANTAGES OF SELLING ON THE WEB

1) Lower Set Up & Running Costs Than An Offline Businesses


2) The Business Can Be Operated From Anywhere
3) Scale-ability
4) No Opening Time Restrictions
5) More Measurable Than Other Sales Approaches
6) Less Time Intensive
7) Higher Margins & Better Cashflow
CHATTING ON THE WEB

• Online chat may refer to any kind of Communication over the Internet that offers


a real-time transmission of text messages from sender to receiver. Chat messages are
generally short in order to enable other participants to respond quickly. Thereby, a feeling
similar to a spoken conversation is created, which distinguishes chatting from other text-
based online communication forms such as Internet and email. Online chat may
address point-to-point communications as well as multicast communications from one
sender to many receivers and voice and video chat, or may be a feature of a web
conferencing service.
COMBINING SELLING & CHATTING ON THE WEB

• Over half of consumers are likely to do business with brands offering chat-based support. And this technology is only expected to
become even more popular. Brands can leverage chat apps to either provide support to existing customers or for messaging-
based sales.
WHY SALE WITH A CHAT?
1. Add a Personal Touch for a Service-driven Sales Process
• Online shopping is faster, more convenient and — often — more cost-effective than visiting brick-and-mortar stores.
• But there’s one key element missing from websites and apps: dedicated, personal service from a sales professional. As research is
a key aspect of both online and offline shopping, having someone ready to answer questions at any time can make a big impact on
the customer’s experience.
• Messaging-based sales offers businesses the chance to assist shoppers just ahead of, or during, the purchase process. A few
persuasive words from a rep could sway a buyer’s decision to purchase or walk away.
• Simply clicking or tapping the “live chat” button on a site or app connects customers to an agent in seconds, and a fast response
makes this as convenient as approaching a member of staff in a brick-and-mortar store.
COMBINING SELLING & CHATTING ON THE WEB

2. Engage Consumers through their Favorite Platforms


• We all have our own preferred ways of interacting with businesses, and the proliferation of online
communication tools makes it far easier than waiting on hold or sending a letter like we did in days gone by.
• Messaging based sales empowers your business to offer maximum convenience to every single prospective
and existing customer. Being available through Facebook Messenger, WhatsApp or another chat app means
you’re there for people in a way that’s familiar.
• Furthermore, chatbots deliver 24/7 virtual assistance if you can’t operate round-the-clock too, providing fast
answers to countless questions even when your office is shut down for the night. That means you can still
prompt people with intent to purchase without direct input.
• Email and phone service won’t disappear for a long, long time (if at all), but messaging based sales is a must
for every startup aiming to cater to a modern, broad audience.
COMBINING SELLING & CHATTING ON THE WEB

3. Reduce the Risk of Abandoned Transactions and Increase Conversion Opportunities


• We’ve all changed our mind about buying something at one time or another, particularly online.
Shopping on your phone or tablet is just so easy, fast and convenient, you can end up buying goods you
don’t need or really want if you don’t leave the checkout at the right time.
• But you could abandon a purchase for other reasons, such as feeling unsure if a product is right for you
or worth the money. Messaging based sales gives you the opportunity to explain items’ benefits, address
concerns and recommend alternatives — even if a shopper buys something cheaper, it’s better to retain
their custom and earn their trust than try to pressure them into a purchase that might not suit them.
• Make sure to present a chat option at every stage of the customer’s journey, and be proactive with
prompts: don’t always wait for users to seek help out. Offering assistance may help you secure
conversions, but staying invisible won’t.

You might also like