unit 3,4,5


๐Ÿ“Œ UNIT – III Short Notes (4–8 Marks)


1. Electronic Data Interchange (EDI)

EDI = Automatic exchange of business documents between two organizations in a standard digital format.
Documents shared: Purchase Order, Invoice, Shipping details, Payment info.

How it works:

  1. Company creates document

  2. Converts to EDI standard (ANSI X12/EDIFACT)

  3. Transfers via Internet/VAN

  4. Receiver decodes EDI into its system

  5. Order processed automatically

Benefits: Fast processing, no manual errors, cost saving.


2. Lack of Standardization in EDI – Challenges

Technical Issues:
• Different formats → compatibility problems
• Integration difficult → needs converters
• No uniform security → data theft risk
• Complex setup with each new partner

Financial Issues:
• High setup cost (software + integration)
• Frequent maintenance cost
• Training staff → extra cost
• Small firms avoid EDI → slow adoption


3. Man-in-the-Middle (MITM) Attack & Prevention

MITM attack → Attacker sits between user & payment website, steals or modifies data like card details/OTP.

How it happens:

  1. Fake Wi-Fi/website

  2. User enters credentials

  3. Attacker intercepts & forwards data

  4. Payment details stolen

Prevention:
• HTTPS + SSL/TLS
• Digital certificates verification
• Avoid public Wi-Fi/use VPN
• OTP/2FA authentication
• Certificate pinning in apps


4. PEM & PGP Email Security (Short)

Normal email is insecure → No confidentiality, authentication & integrity.

PEM (Privacy Enhanced Mail):
Uses X.509 certificates.
Steps: Create mail → Hash → Sign with private key → Encrypt using session key → Receiver decrypts & verifies signature.

PGP (Pretty Good Privacy):
Similar to PEM but uses Web of Trust.
Encrypt with receiver public key, sign using private key, receiver verifies using public key.


5. RSA Key Generation & Encryption (Short)

Steps:

  1. Select primes p, q

  2. n = p×q

  3. ฯ†(n) = (p–1)(q–1)

  4. Select e such that gcd(e, ฯ†(n))=1

  5. Find d such that e×d≡1 mod ฯ†(n)

Public key = (e, n)
Private key = (d, n)

Encryption: C = Mแต‰ mod n
Decryption: M = Cแตˆ mod n


6. Digital Signature & Certificates (Short)

Digital Signature:
• Electronic signature generated using encryption
• Provides → Authentication + Integrity + Non-repudiation

Process:
Hash message → Encrypt hash with private key → Send as signature → Receiver decrypts using public key → Matches hash.

Digital Certificate:
Issued by CA, contains Public key + Owner name + Validity.
Used in HTTPS to verify website identity.


๐Ÿ“ฃ UNIT – IV Short Notes (4–8 Marks)


7. E-Advertising & Online Marketing

E-advertising = Promotion using Internet platforms like Google Ads, YouTube ads, Instagram ads.

Online Marketing = Broader term including SEO, Content marketing, Social media, Email marketing.

Importance:
• Global reach
• Low cost
• Real-time analytics
• Fast & measurable result
• Targeted audience
• Interaction with customers


8. Online vs Offline Branding (Short Table)

Online Branding Offline Branding
Internet-based TV, radio, print media
Low cost Expensive
Global reach Mostly local
Interactive One-way communication
Measurable analytics Hard to measure
Quick changes possible Slow & costly updates

๐Ÿ’ณ UNIT – V Short Notes (4–8 Marks)


9. Digital Tokens

Digital token = Data that represents money/identity/authorization.

Uses:
• Card tokenization (secure card numbers)
• Session authentication
• Reward coins / virtual currency
Benefit → Increases security & privacy.


10. Credit, Debit & Smart Card (Difference)

Credit Card Debit Card Smart Card
Pay now, repay later Money deducted instantly Chip-based secure storage
Credit limit by bank Uses account balance Can store balance/data
Interest if late No interest Used in metro, ID, payments

11. Micropayment System

Very small payments like ₹1–₹10 used for songs/articles/in-app purchases.

Challenges:
• High transaction fee compared to amount
• Users avoid entering card for small value
• Too many OTP steps → user drop
• Fraud risk & scalability issues

Solutions → Wallet, Prepaid balance, Auto UPI.


12. Digital Wallet

Electronic wallet storing money & card details.
Examples: Paytm, PhonePe, AmazonPay, Google Pay Wallet.

Advantages:
• Fast checkout
• Good for micropayment
• Cashback/offers
• Secure token-based payment


13. Electronic Cash (e-Cash)

Digital form of currency like cash.

Features:
• Anonymous transactions
• No double spending
• Bank verifies digital coins
Used in → CBDC (digital rupee concept)



Comments

Popular posts from this blog

unit 1,2