SlideShare a Scribd company logo
5
Most read
12
Most read
14
Most read
1
PART - 2
CHAPTER 5
INTRODUCTION
TO M-COMMERCE
Presented by Nuzhat Ibrahim Memon
Security Issues in E-Commerce & M-Commerce
2
 Secrecy of the information
so that unauthorized user
cannot read it.
 It is achieved by using
cryptography
 All the message transmitted
are encrypted and only the
receiver can read it after
decrypting the message
using appropriate key.
 It helps in protecting the
confidential data like credit
card number
Confidentiality
 Ensures that the information
must not be accidentally or
maliciously altered or
tampered in transit.
 Receiver should receive the
same message as was sent by
the sender.
 If the message is altered in
between the transition, it
should be detected. This
removes the problem of
modifying the order quantity in
between and later creating the
payment problems.
Integrity
The valuable data or information that travels on the internet may be misused, stolen, corrupted or lost.
E-Commerce and M-Commerce security must meet four important aspects:
Presented by Nuzhat Ibrahim Memon
Securing Issues in E-Commerce & M-Commerce (cont.)
Authorization Non-repudiation
3
 Ensures that only
authentic users are
allowed to use the system.
 Login and Password is
one of the way to achieve
authentication.
 Sender of the message
cannot deny that he/she has
sent the message.
 It prevents sender or
receiver from denying a
transmitted message when
in fact they did send it.
 It is usually accomplished via
digital signatures or a
Trusted Third Party (TTP).
Presented by Nuzhat Ibrahim Memon
Internet Security Threats
Malicious Code Sniffing
4
 Malicious code is one that
causes damage to a
computer or system.
 Either Active itself or be like
a virus requiring a user to
perform an action as clicking
on something or opening
an e-mail attachment.
 It can also affect a network,
send messages through e-
mail and steal information or
cause even more damage by
deleting file.
 Program that uses Internet to
record information that passes
through a computer or router in
transits from sender or receiver.
 Like tapping the telephone wire
and recording the conversation.
 It can read e-mail, login,
password, credit card numbers.
Presented by Nuzhat Ibrahim Memon
Internet Security Threats
5
 Electronic defacing of an
existing website page.
 An attacker replaces the
website’s original content
with his/her own content.
 It is an example of
integrity violation.
 Equivalent electronic
equivalent of destroying
property or to placing
graffiti on someone’s
photograph.
Cyber Vandalism
 DoS is an attack used to shut
down a machine or network,
making it inaccessible to its
intended users.
 An attacker may be able to
prevent the user from accessing
e-mail, websites, online
account etc.
 The users are flooded with
hundreds and thousands of
messages that create traffic
problem on the network.
Denial of Service attack
Attacker
Presented by Nuzhat Ibrahim Memon
Internet Security Threats
6
 Spoofing is pretending to be someone you are not.
 Representing a website as authentic when it is actually a
fake.
 It is a technique where the attacker tries to assume the
identity of another person or system for transacting with
victim site.
 For example, an attacker can create a fake website as
www.gswan.co.in and substitute his IP address for the real
website IP address.
 All the user’s visiting to the real site will then be redirected
to the fake website.
Spoofing
Presented by Nuzhat Ibrahim Memon
Security Measures
7
 Computer program
 Detects, prevent and takes action to remove the malicious codes
like viruses, worms and Trojan horses from the infected system.
 Once a system is infected by virus, it will replicates itself (spread
by attaching it to other programs or files ) within the system
and also spread to other systems by taking control of the users
email and sending out copies of itself to those in the users contact
list.
 The infection may be simple as causing strange noises, pop-ups and
other annoying things on the system.
 It may delete the files and slow down the system or also can
damage the hardware or destroy the entire computer system.
 Most common way a system is attacked is through e-mail or
through internet download.
 Antivirus software is critical to be installed and kept updated
regularly on the computer.
Antivirus Software
Presented by Nuzhat Ibrahim Memon
Security Measures
8
 Companies having their own websites have to control the access to
the network services both inside and outside the company
network.
 Device (computer/router) places between the network and the
Internet to monitor and control the traffic between the company’s
local network and the outside world.
 A firewall protects the local network against the following:
 Email services that sometimes create problems.
 Undesirable material like photos, videos entering into local
network.
 Unauthorized persons gaining access to local network.
 Unauthorized data or information leaving the company’s
network.
 Blocks the traffic from outside world to the local network.
 Protect from any type of network attack.
Firewall
Presented by Nuzhat Ibrahim Memon
Security Measures
9
 Digital Certificate / Digital ID – proving identify in electronic
transactions.
 With a digital certificate, we can assure the business organizations,
online services and friends that the electronic information they
receive from us are authentic.
 Third party issues certificates is known as Certification Authority
(CA).
 Public key which is used for encrypting messages
 The digital signature of the certification authority so that a
receiver can verify that the certificate is real.
Digital Certificate
Presented by Nuzhat Ibrahim Memon
Security Measures
10
 An art of protecting the information by transforming it into an
unreadable form.
 Encryption is the transformation of normal text or plain text into
unreadable or secret text known as cipher text.
 Secret key is used to encrypt and decrypt a message.
 Messages are encrypted just before they are sent on the internet or
network. When the encrypted message is received by the receiver, it needs
to be decrypted. Decryption is the reverse of encryption. It is the
transformation of encrypted text back into normal text.
 Encryption is used to protect data in transit, for example, data being
transferred via networks like internet or ecommerce, mobile telephones,
Bluetooth devices and bank ATM (Automatic Teller Machines)
 A coded form of ”WAVES” using encryption.
 Here the encryption mechanism substitutes each alphabet with the
alphabet that comes before it.
Plain text (normal text)
Cipher text (unreadable/secret text)
Cryptography
Presented by Nuzhat Ibrahim Memon
W A V E S
V Z U D R
Security Measures
11
 Securing web transaction on the internet
 Developed by Netscape.
 During the e-commerce transactions, all the information is exchanged
in secured manner using SSL by encrypting all the messages.
 If a site is secured by Verisign, then the security logo of VeriSign is
displayed on the login screen of the secured site.
 On clicking the you will get the owner information and the
validity of the certificate.
 This indicates that the communication with this site is
secured and the owner of the website is valid who is
certified by the authority like VeriSign
 Starts from https:// rather than http://
Secure Socket Layer (SSL)
Presented by Nuzhat Ibrahim Memon
Securing Intellectual Properties
12
Indian Government has established the IT laws (Information technology laws) under the IT act.
Intellectual Properties: books | software | music | video | copyrights | trademarks | webpages
 Copyright provides the author with a tool to
protect his/her original work from being
used or taken by other without permission.
 Applicable to books, software programs &
articles.
 Copyright matter cannot be used freely.
 Copying contents from the website also
violates copyright laws.
Copyright
 Specific logo, mark, word, symbol,
design, phrase, image used by an
individuals or a company to distinguish
product or service from that of other in
the market.
 Trademark symbols : TM : Trade Mark
SM : Service Mark ® : Registered
Trademark
 Competition over domain names is
another legal issue.
 Earlier, the domain names were given on
first come first serve (FCFS)basis.
 Thus people would register domain
names that were not in use but would be
of importance, Later on such domain
names were sold to concerned
company at a very high price is known
as cyber-squatting.
 Mislead the consumers who generally
make typographical errors while
entering a URL.
Domain Name Disputes
Presented by Nuzhat Ibrahim Memon
Protecting Intellectual Property
Steganography
 Process of hiding information
within other information.
 It works by replacing unused
data in computer files such as
images, sound or text with
invisible information.
 This hidden information can be
text, cipher text, image.
Digital Watermarking
 Digital code inserted into a digital
image, audio or video file which can
identify the file’s copyright information.
 Allows hiding information in a totally
invisible manner.
 In Digital world, artist can watermark
their work by hiding their name within
the image.
 In the field of data security, watermarks
can be used for certification and
authentication.
 Big problem of unauthorized mp3 audio
distribution.
 A visible digital watermark can be added
with GIMP.
13Presented by Nuzhat Ibrahim Memon
Exercise
"new unique zero-error hidden accurate text“
THANK YOU!
Speaker Name
Email:
speakermail@website.com
Phone:
+7 888 999-000-11
Presented by Nuzhat Ibrahim Memon

More Related Content

PPTX
Std 12 Computer Chapter 4 Introduction to Ecommerce (Part 2)
PPTX
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 1)
PPTX
Std 12 Computer Chapter 2 Cascading Style Sheet and Javascript (Part-2)
PPTX
Std 12 Computer Chapter 3 Designing Simple Website using KompoZer
PPTX
Std 12 computer chapter 8 classes and object in java (part 2)
PPTX
Std 12 Computer Chapter 2 Cascading Style Sheets and Javascript(Part 1 CSS)
PPTX
Std 12 Computer Chapter 1 Creating Html Forms Using KompoZer
PPTX
HTML Text formatting tags
Std 12 Computer Chapter 4 Introduction to Ecommerce (Part 2)
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 1)
Std 12 Computer Chapter 2 Cascading Style Sheet and Javascript (Part-2)
Std 12 Computer Chapter 3 Designing Simple Website using KompoZer
Std 12 computer chapter 8 classes and object in java (part 2)
Std 12 Computer Chapter 2 Cascading Style Sheets and Javascript(Part 1 CSS)
Std 12 Computer Chapter 1 Creating Html Forms Using KompoZer
HTML Text formatting tags

What's hot (20)

PPTX
Gmail introduction
PPTX
Std 12 computer chapter 6 object oriented concepts (part 1)
PPTX
Std 12 computer chapter 6 object oriented concepts (part 2)
PDF
Html frames
PPT
PPTX
Ecommerce website with seo optimization
PPTX
Std 11 Computer Chapter 4 Introduction to Layers
PPTX
Web development using HTML and CSS
PPTX
Std 11 Computer Chapter 2 Animation Tool: Synfig
PPT
Web Development using HTML & CSS
PDF
02.project training and placement cell
PDF
HTML CSS Basics
PPTX
Email basics
PPTX
HTML Forms
PPTX
PPT
E commerce
PPTX
HTML Forms
PPT
Xml http request
PPTX
Chat application android app ppt
PPTX
Onlineline shopping Yash Bazaar.com
 
Gmail introduction
Std 12 computer chapter 6 object oriented concepts (part 1)
Std 12 computer chapter 6 object oriented concepts (part 2)
Html frames
Ecommerce website with seo optimization
Std 11 Computer Chapter 4 Introduction to Layers
Web development using HTML and CSS
Std 11 Computer Chapter 2 Animation Tool: Synfig
Web Development using HTML & CSS
02.project training and placement cell
HTML CSS Basics
Email basics
HTML Forms
E commerce
HTML Forms
Xml http request
Chat application android app ppt
Onlineline shopping Yash Bazaar.com
 
Ad

Similar to Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2) (20)

PPTX
Information security
PPTX
Cyber security best practices power point presentation
DOCX
E commerce security 4
PDF
Computer Security for Lawyers
PPTX
cyber security.pptx
PDF
E commerce- securing the business on internet
PPTX
mobile security.pptx
PPTX
Security Threats in E-Commerce
PDF
Cyber Privacy & Password Protection
PPTX
PDF
Ethical Hacking and Cyber Security
PDF
Sip 140208055023-phpapp02
PPT
Dos and Dont to be followed to protect information and technology
PPTX
Security Threats which security threat is any potential danger that can explo...
DOC
Computer Secutity.
PPTX
Computer security and
PPT
Cyber Crime & Security
PPTX
Exploring the Spectrum of Cyber Attacks .pptx
Information security
Cyber security best practices power point presentation
E commerce security 4
Computer Security for Lawyers
cyber security.pptx
E commerce- securing the business on internet
mobile security.pptx
Security Threats in E-Commerce
Cyber Privacy & Password Protection
Ethical Hacking and Cyber Security
Sip 140208055023-phpapp02
Dos and Dont to be followed to protect information and technology
Security Threats which security threat is any potential danger that can explo...
Computer Secutity.
Computer security and
Cyber Crime & Security
Exploring the Spectrum of Cyber Attacks .pptx
Ad

More from Nuzhat Memon (20)

PPTX
Std 10 chapter 11 data type, expression and operators important MCQs
PPTX
Std 10 Chapter 10 Introduction to C Language Important MCQs
PPTX
Std 12 chapter 7 Java Basics Important MCQs
PPTX
Std 12 computer chapter 8 classes and objects in java important MCQs
PPTX
Std 12 Computer Chapter 6 object oriented concept important mcqs
PPTX
Std 12 computer java basics part 3 control structure
PPTX
Std 12 Computer Chapter 7 Java Basics (Part 2)
PPTX
Std 12 Computer Chapter 7 Java Basics (Part 1)
PPTX
Std 12 Computer Chapter 13 other useful free tools and services important MCQs
PPTX
Std 12 Computer Chapter 9 Working with Array and String in Java important MCQs
PPTX
Std 10 computer chapter 10 introduction to c language (part2)
PPTX
Std 10 computer chapter 10 introduction to c language (part1)
PPTX
Std 10 computer chapter 9 Problems and Problem Solving
PPTX
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...
PPTX
Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)
PPTX
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1 Basics Opera...
PPTX
Std 11 Computer Chapter 4 Introduction to Layers (Part 3 Solving Textual Exe...
PPTX
Std 11 Computer Chapter 4 Introduction to Layers (Part 2 Practical :Rotation ...
PPTX
Std 11 Computer Chapter 3 Creating Animation using Synfig (Part 3) [practica...
PPTX
Std 11 Computer Chapter 3 Creating Animation using Synfig (part 1)
Std 10 chapter 11 data type, expression and operators important MCQs
Std 10 Chapter 10 Introduction to C Language Important MCQs
Std 12 chapter 7 Java Basics Important MCQs
Std 12 computer chapter 8 classes and objects in java important MCQs
Std 12 Computer Chapter 6 object oriented concept important mcqs
Std 12 computer java basics part 3 control structure
Std 12 Computer Chapter 7 Java Basics (Part 2)
Std 12 Computer Chapter 7 Java Basics (Part 1)
Std 12 Computer Chapter 13 other useful free tools and services important MCQs
Std 12 Computer Chapter 9 Working with Array and String in Java important MCQs
Std 10 computer chapter 10 introduction to c language (part2)
Std 10 computer chapter 10 introduction to c language (part1)
Std 10 computer chapter 9 Problems and Problem Solving
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...
Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1 Basics Opera...
Std 11 Computer Chapter 4 Introduction to Layers (Part 3 Solving Textual Exe...
Std 11 Computer Chapter 4 Introduction to Layers (Part 2 Practical :Rotation ...
Std 11 Computer Chapter 3 Creating Animation using Synfig (Part 3) [practica...
Std 11 Computer Chapter 3 Creating Animation using Synfig (part 1)

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Types and Its function , kingdom of life
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
RMMM.pdf make it easy to upload and study
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Lesson notes of climatology university.
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
FourierSeries-QuestionsWithAnswers(Part-A).pdf
VCE English Exam - Section C Student Revision Booklet
Cell Types and Its function , kingdom of life
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Final Presentation General Medicine 03-08-2024.pptx
Complications of Minimal Access Surgery at WLH
RMMM.pdf make it easy to upload and study
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Chinmaya Tiranga quiz Grand Finale.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Final Presentation General Medicine 03-08-2024.pptx
Pharma ospi slides which help in ospi learning
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Lesson notes of climatology university.
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Microbial diseases, their pathogenesis and prophylaxis
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)

  • 1. 1 PART - 2 CHAPTER 5 INTRODUCTION TO M-COMMERCE Presented by Nuzhat Ibrahim Memon
  • 2. Security Issues in E-Commerce & M-Commerce 2  Secrecy of the information so that unauthorized user cannot read it.  It is achieved by using cryptography  All the message transmitted are encrypted and only the receiver can read it after decrypting the message using appropriate key.  It helps in protecting the confidential data like credit card number Confidentiality  Ensures that the information must not be accidentally or maliciously altered or tampered in transit.  Receiver should receive the same message as was sent by the sender.  If the message is altered in between the transition, it should be detected. This removes the problem of modifying the order quantity in between and later creating the payment problems. Integrity The valuable data or information that travels on the internet may be misused, stolen, corrupted or lost. E-Commerce and M-Commerce security must meet four important aspects: Presented by Nuzhat Ibrahim Memon
  • 3. Securing Issues in E-Commerce & M-Commerce (cont.) Authorization Non-repudiation 3  Ensures that only authentic users are allowed to use the system.  Login and Password is one of the way to achieve authentication.  Sender of the message cannot deny that he/she has sent the message.  It prevents sender or receiver from denying a transmitted message when in fact they did send it.  It is usually accomplished via digital signatures or a Trusted Third Party (TTP). Presented by Nuzhat Ibrahim Memon
  • 4. Internet Security Threats Malicious Code Sniffing 4  Malicious code is one that causes damage to a computer or system.  Either Active itself or be like a virus requiring a user to perform an action as clicking on something or opening an e-mail attachment.  It can also affect a network, send messages through e- mail and steal information or cause even more damage by deleting file.  Program that uses Internet to record information that passes through a computer or router in transits from sender or receiver.  Like tapping the telephone wire and recording the conversation.  It can read e-mail, login, password, credit card numbers. Presented by Nuzhat Ibrahim Memon
  • 5. Internet Security Threats 5  Electronic defacing of an existing website page.  An attacker replaces the website’s original content with his/her own content.  It is an example of integrity violation.  Equivalent electronic equivalent of destroying property or to placing graffiti on someone’s photograph. Cyber Vandalism  DoS is an attack used to shut down a machine or network, making it inaccessible to its intended users.  An attacker may be able to prevent the user from accessing e-mail, websites, online account etc.  The users are flooded with hundreds and thousands of messages that create traffic problem on the network. Denial of Service attack Attacker Presented by Nuzhat Ibrahim Memon
  • 6. Internet Security Threats 6  Spoofing is pretending to be someone you are not.  Representing a website as authentic when it is actually a fake.  It is a technique where the attacker tries to assume the identity of another person or system for transacting with victim site.  For example, an attacker can create a fake website as www.gswan.co.in and substitute his IP address for the real website IP address.  All the user’s visiting to the real site will then be redirected to the fake website. Spoofing Presented by Nuzhat Ibrahim Memon
  • 7. Security Measures 7  Computer program  Detects, prevent and takes action to remove the malicious codes like viruses, worms and Trojan horses from the infected system.  Once a system is infected by virus, it will replicates itself (spread by attaching it to other programs or files ) within the system and also spread to other systems by taking control of the users email and sending out copies of itself to those in the users contact list.  The infection may be simple as causing strange noises, pop-ups and other annoying things on the system.  It may delete the files and slow down the system or also can damage the hardware or destroy the entire computer system.  Most common way a system is attacked is through e-mail or through internet download.  Antivirus software is critical to be installed and kept updated regularly on the computer. Antivirus Software Presented by Nuzhat Ibrahim Memon
  • 8. Security Measures 8  Companies having their own websites have to control the access to the network services both inside and outside the company network.  Device (computer/router) places between the network and the Internet to monitor and control the traffic between the company’s local network and the outside world.  A firewall protects the local network against the following:  Email services that sometimes create problems.  Undesirable material like photos, videos entering into local network.  Unauthorized persons gaining access to local network.  Unauthorized data or information leaving the company’s network.  Blocks the traffic from outside world to the local network.  Protect from any type of network attack. Firewall Presented by Nuzhat Ibrahim Memon
  • 9. Security Measures 9  Digital Certificate / Digital ID – proving identify in electronic transactions.  With a digital certificate, we can assure the business organizations, online services and friends that the electronic information they receive from us are authentic.  Third party issues certificates is known as Certification Authority (CA).  Public key which is used for encrypting messages  The digital signature of the certification authority so that a receiver can verify that the certificate is real. Digital Certificate Presented by Nuzhat Ibrahim Memon
  • 10. Security Measures 10  An art of protecting the information by transforming it into an unreadable form.  Encryption is the transformation of normal text or plain text into unreadable or secret text known as cipher text.  Secret key is used to encrypt and decrypt a message.  Messages are encrypted just before they are sent on the internet or network. When the encrypted message is received by the receiver, it needs to be decrypted. Decryption is the reverse of encryption. It is the transformation of encrypted text back into normal text.  Encryption is used to protect data in transit, for example, data being transferred via networks like internet or ecommerce, mobile telephones, Bluetooth devices and bank ATM (Automatic Teller Machines)  A coded form of ”WAVES” using encryption.  Here the encryption mechanism substitutes each alphabet with the alphabet that comes before it. Plain text (normal text) Cipher text (unreadable/secret text) Cryptography Presented by Nuzhat Ibrahim Memon W A V E S V Z U D R
  • 11. Security Measures 11  Securing web transaction on the internet  Developed by Netscape.  During the e-commerce transactions, all the information is exchanged in secured manner using SSL by encrypting all the messages.  If a site is secured by Verisign, then the security logo of VeriSign is displayed on the login screen of the secured site.  On clicking the you will get the owner information and the validity of the certificate.  This indicates that the communication with this site is secured and the owner of the website is valid who is certified by the authority like VeriSign  Starts from https:// rather than http:// Secure Socket Layer (SSL) Presented by Nuzhat Ibrahim Memon
  • 12. Securing Intellectual Properties 12 Indian Government has established the IT laws (Information technology laws) under the IT act. Intellectual Properties: books | software | music | video | copyrights | trademarks | webpages  Copyright provides the author with a tool to protect his/her original work from being used or taken by other without permission.  Applicable to books, software programs & articles.  Copyright matter cannot be used freely.  Copying contents from the website also violates copyright laws. Copyright  Specific logo, mark, word, symbol, design, phrase, image used by an individuals or a company to distinguish product or service from that of other in the market.  Trademark symbols : TM : Trade Mark SM : Service Mark ® : Registered Trademark  Competition over domain names is another legal issue.  Earlier, the domain names were given on first come first serve (FCFS)basis.  Thus people would register domain names that were not in use but would be of importance, Later on such domain names were sold to concerned company at a very high price is known as cyber-squatting.  Mislead the consumers who generally make typographical errors while entering a URL. Domain Name Disputes Presented by Nuzhat Ibrahim Memon
  • 13. Protecting Intellectual Property Steganography  Process of hiding information within other information.  It works by replacing unused data in computer files such as images, sound or text with invisible information.  This hidden information can be text, cipher text, image. Digital Watermarking  Digital code inserted into a digital image, audio or video file which can identify the file’s copyright information.  Allows hiding information in a totally invisible manner.  In Digital world, artist can watermark their work by hiding their name within the image.  In the field of data security, watermarks can be used for certification and authentication.  Big problem of unauthorized mp3 audio distribution.  A visible digital watermark can be added with GIMP. 13Presented by Nuzhat Ibrahim Memon Exercise "new unique zero-error hidden accurate text“
  • 14. THANK YOU! Speaker Name Email: [email protected] Phone: +7 888 999-000-11 Presented by Nuzhat Ibrahim Memon