Module-3
Module-3
● Wi-Fi networks use radio waves to transmit data between devices and a
wireless router. The wireless router is connected to the internet and acts as a
gateway for all of the devices on the network to access the internet.
● Wi-Fi networks operate on two different frequency bands: 2.4 GHz and 5
GHz. The 2.4 GHz band is slower but has better range than the 5 GHz band.
The 5 GHz band is faster but has a shorter range than the 2.4 GHz band.
● Most Wi-Fi devices support both frequency bands. The device will
automatically connect to the frequency band that provides the best
performance.
Types of wireless transmission media
How Can You Protect Your Wireless Network from Hackers?
● Use a strong password: Use a strong password for your Wi-Fi network
that is at least 12 characters long and includes a mix of upper and
lowercase letters, numbers, and symbols.
● Enable encryption: Enable encryption on your wireless router. This
will encrypt the data that is transmitted over the network, making it
more difficult for attackers to intercept.
● Disable SSID broadcasting: Disable SSID broadcasting to prevent
your network from being easily identified by attackers.
Contd..
● Wi-Fi provides fast and easy Internet or intranet broadband access from
public hotspots located at airports, hotels, Internet cafés, universities,
conference centers, offices, and homes. Mesh networks use multiple Wifi
access points to create a wide area network that can be quite large.
Contd..
○ Compliance: Using cloud services may be subject to legal compliance regulations, depending on the industry.
Organizations must make sure their cloud provider complies with these specifications and has access to the
required paperwork.
○ Data Loss: Data loss is the most common cloud security risk of cloud computing. It is also known as data
leakage. Data loss is the process in which data is deleted, corrupted, and unreadable by a user, software, or
application. In a cloud computing environment, data loss occurs when our sensitive data is in somebody else's
hands, one or more data elements can not be utilized by the data owner, the hard disk is not working properly,
and the software is not updated.
○ Data Breach: It is the process in which confidential data is viewed, accessed, or stolen by a third party
without any authorization, so the organization's data is hacked by hackers.
○ Account Hijacking: It is a serious security risk in cloud computing. It is the process in which individual
users' or organizations' cloud account (bank account, email account, and social media account) is stolen by
hackers. The hackers use the stolen account to perform unauthorized activities.
Contd..
○ Data Security and Privacy: The security of sensitive data is one of the main issues with cloud computing.
Access controls must be in place to restrict who can access the data, and organizations must make sure that
their data is encrypted both in transit and at rest.
○ Vendor Lock-In: Switching cloud providers can be expensive and complex, which might result in vendor
lock-in. When choosing a cloud provider, businesses should take this into account and make sure they have a
plan in place in case switching providers becomes essential.
○ DDoS: Cloud service companies are a prime target for distributed denial of service (DDoS) attacks, which can
cause downtime and data loss. Organizations should verify that the cloud provider has sufficient defenses
against DDoS assaults in place.
○ Identity and Access Management: The security of cloud computing environments depends on effective
identity and access management. To prevent unauthorized access to their data, organizations must make sure
that they have robust authentication and authorization mechanisms in place.
What is mobile commerce?
● SCM (short for Supply Chain Management) systems help streamline your
supply chain processes. They do this by offering you functions such as
inventory management, product distribution and tracking, and supply and
demand forecasting.
With social commerce, individuals can collaborate online, obtain advice from trusted
individuals, and find and purchase goods and services. Below we list a few examples of
social commerce:
● Disney allows people to book tickets on Facebook without leaving the social
network.
● PepsiCo gives a live notification when its customers are close to physical stores
(grocery, restaurants, gas stations) that sell Pepsi products. The company then uses
Foursquare to send them coupons and discount information.
● Mountain Dew attracts video game lovers and sports enthusiasts via Dewmocracy
contests. The company also encourages the most dedicated community members to
contribute ideas on company products.
Benefits to Customers
● Really Simple Syndication (RSS) is a Web 2.0 feature that allows you
to receive the information you want (customized information), when
you want it, without having to surf thousands of Web sites.
● RSS allows anyone to syndicate (publish) his or her blog, or any other
content, to anyone who has an interest in subscribing to it.
● When changes to the content are made, subscribers receive a
notification of the changes and an idea of what the new content
contains.
● Subscribers can then click on a link that will take them to the full text
of the new content.
Contd..
● For example, CNN.com provides RSS feeds for each of its main
topic areas, such as world news, sports news, technology news,
and entertainment news.
● NBC uses RSS feeds to allow viewers to download the most
current version of shows such as Meet the Press and NBC Nightly
News.
● You can find thousands of Web sites that offer RSS feeds at
Syndic8 (www.syndic8.com) and NewsIsFree
(www.newsisfree.com).
Describe the benefits and risks of social commerce to
companies.
● Social commerce refers to the delivery of electronic commerce
activities and transactions through social computing.
● Benefits of social commerce to customers include the following:
better and faster vendors’ response to complaints; customers
can assist other customers; customers’ expectations can be
met more fully and quickly; customers can easily search, link,
chat, and buy while staying in the social network’s page.
Contd..