Copyright © by Dr. Ajay kumar pathak
B. Sc IT SEMESTER 5 NOTES BASED ON NEP
SUBJECT : MN–1C (Minor From Discipline–1
(To be selected by the students from)
MN-1C: E-COMMERCE AND DIGITAL MARKETING
NOTES
OF THE E-COMMERCE AND DIGITAL MARKETING
|
MN-1C: E-Commerce and Digital Marketing |
||
|
4 Credits |
60 Class Hours |
Semester V. |
Course
Objectives:
- · To understand the increasing significance of E-Commerce and its applications in Business.
- ·
To provide an insight into Digital
Marketing activities on various Social Media platforms and its emerging
significance in Business
- ·
To understand Latest Trends, Practices
in E-Commerce and Digital Marketing,
COURSE
CONTENTS:
|
Unit-1 (10 Classes) |
An overview of E-Business, Models,
Types ·
Conceptual Framework of E-Commerce, General Model of Business; Defining
E-commerce, Characteristics, advantages and disadvantages, adoption and
impact of E- Business., Electronic Data Interchange (EDI); Types of e-Transactions – B2B, B2C, C2C, C2B etc., Electronic Storefronts, E-Marketplace |
|
Unit-2 (12 Classes) |
E-Business Technology and E Security ·
Web Presence – domain registration, website development, developing
static and dynamic webpages and hosting, registering the Website with Search
Engines. ·
Web server hardware and software; Data centre services. ·
Security –
service providers, digital certificates, encryption, SSL, Digital signatures. |
|
Unit-3 (10 Classes) |
Electronic Payment Systems: ·
Overview of electronic Payment Technology, Online
payment mechanism; Electronic Payment systems, payment Gateway, EFT,
NEFT, RTGS, SWIFT, NFC, Green Channel. ·
Legal issues: Laws for E-Commerce, Issues of
Trademarks & Domain Names |
|
Unit-4 (14 Classes) |
Digital Marketing – I ·
Introduction to Digital Marketing, Advantages and Limitations of
Digital Marketing. Keyword research, Competitor analysis in digital
marketing. ·
Various Activities of Digital Marketing: Search Engine Algorithm, Search Engine Optimization and stages, Search
Engine Marketing, Content
Marketing and Content Influencer Marketing, Remarketing, Campaign Marketing, E-mail Marketing, Display Advertising, Blog Marketing, Viral Marketing, Podcasts and Vodcasts. |
|
Unit-5 (14 Classes) |
Digital Marketing – II ·
The P.O.E.M. framework. ·
Digital Marketing on Various Social Media Platforms. ·
Online Advertisement, Online Marketing Research, Online PR. ·
Web Analytics. ·
Promoting Web Traffic. ·
Latest Developments and Strategies in Digital Marketing. |
**** NOTES
*****
UNIT-2
:- E-BUSINESS TECHNOLOGY AND E SECURITY
E-BUSINESS TECHNOLOGY:-
E-Business
Technology = Doing business activities with the help of digital technology.
E-Business Technology means, Using
digital tools like computers, internet, apps, websites, software, and online
payment systems to run a business.
E-business technology refers to
the use of internet-based technologies like hardware, software, and networks to
conduct and transform business processes electronically. This includes
everything from online sales (e-commerce) to managing internal processes like
payroll, collaborating with partners, and managing supply chains. Key
technologies include databases, online payment systems, customer relationship
management (CRM) systems, and enterprise resource planning (ERP) systems.
It helps a business do things like:
·
Selling products online
·
Advertising on social media
·
Accepting online payments
·
Talking to customers digitally
·
Managing stock, orders, and delivery using
software
Core components and examples:-
1. Hardware: The physical devices and infrastructure that support
e-business.
Example:- HDD, RAM, PEN DRIVE , PROCESSOR, CAMERA FOR EYES
READER, THUMB READER , ETC
2. Software: Applications and systems that manage various
business functions electronically, such as:
·
Customer
Relationship Management (CRM): Managing customer interactions.
·
Enterprise
Resource Planning (ERP): Managing a company's core business processes.
·
Document
Management Systems: Handling electronic documents.
·
Networks and
Internet: The communication infrastructure that enables e-business, including
the internet, extranets, and intranets.
·
Online Payment
Systems: Facilitating secure electronic transactions.
· Only people nearby could visit her shop
WHAT PART IS E-BUSINESS TECHNOLOGY IN THIS EXAMPLE?
|
Activity |
Technology Used |
Why it is E-Business Technology |
|
Showing sarees online |
Facebook, Instagram |
Digital marketing |
|
Selling sarees |
Website / Online store |
Online selling |
|
Receiving payments |
UPI, Google Pay |
Online payment technology |
|
Delivering |
Courier tracking system |
Digital delivery service |
|
Managing stock |
Inventory software |
Computer-based management |
WEB PRESENCE:- Web presence is the
combination of all your online channels—website, social media, blogs, and
listings—where people can find and interact with you. OR Web presence refers to the
visibility and accessibility of a business, individual, or organization on the
internet. This is achieved through various digital channels and assets such as
websites, social media profiles, online advertisements, and search engine
results. A strong web presence is crucial for businesses in today’s digital
world, as it enhances brand visibility, drives online engagement, and attracts
potential customers. The purpose of having a solid web presence is to build
credibility, reach more people, and connect with customers. It shows products,
shares info, and engages instantly. It boosts branding, fosters customer
relationships, and keeps businesses competitive by meeting digital trends.
IMPORTANCE OF WEB PRESENCE:- In today's digital age, a strong web presence is
crucial for businesses to establish their brand identity, stay competitive, and
adapt to changing online trends. It helps businesses connect with their target
audience easily, enhances visibility on search engines, and fosters trust and
loyalty among customers. Without an effective web presence, it becomes
difficult for businesses to attract and retain customers in a crowded digital
marketplace.
Web presence is a critical aspect of digital marketing
due to its significant impact on how businesses and brands reach and engage
with their target audience in the modern digital era. A strong web presence
allows companies to establish their brand identity, improve their visibility on
search engines, foster brand credibility, and provide necessary information to
potential customers. Additionally, with online platforms constantly changing, a
strong web presence enables businesses to adapt to new trends, stay ahead of
their competitors, and generate more leads and conversions. Ultimately, an
effective web presence is essential to facilitate increased customer
interaction, brand recognition, and long-term business growth.
EXAMPLES
a) Local Grocery Store with a Website and WhatsApp
Presence: Many Indian grocery
stores now have simple websites showing their products and prices. They also
use WhatsApp groups for orders and customer communication. This dual web
presence makes it easy for customers in their area to find them online and
place orders conveniently.
b) Small Boutique on Instagram and Facebook: Numerous small fashion boutiques in India use Instagram
and Facebook to showcase their collections, share customer reviews, and run
ads. Their social media profiles act as a key part of their web presence,
driving direct customer engagement and sales without a complex website.
c) Home Tutor Advertising on Local Google Listings and
YouTube: An Indian home tutor
may have a Google Business profile showing their contact details and reviews, a
basic website, and a YouTube channel with tutorial videos. This combination
increases their visibility and credibility online, attracting more students.
DOMAIN REGISTRATION:- Domain registration is the process of reserving a
unique name on the internet, like "ajay.com," for a set period,
usually one year, through a domain registrar. This process secures your
exclusive right to use that name for a website, custom email addresses, or
other online services. It also makes your website easier for people to find,
adds professional credibility, and prevents others from taking your chosen
name, according to SiteGround, Markshield, and InMotion Hosting
A domain name registrar provides domain name
registrations to the general public. A common misconception is that registrars
sell domain names; these domain names are actually owned by registries and can
only be leased by users.
A domain name is a string of text that maps to an
alphanumeric IP address, used to access a website from client software. In
plain English, a domain name is the text that a user types into a browser
window to reach a particular website. For instance, the domain name for Google
is ‘google.com’.
The actual
address of a website is a complex numerical IP address (e.g. 192.0.2.2), but
thanks to DNS (Domain Name System), users are able to enter human-friendly
domain names and be routed to the websites they are looking for. This process
is known as a DNS lookup.
WHAT IS A DOMAIN NAME REGISTRAR?:- A domain name registrar is a business that handles the
reservation of domain names as well as the assignment of IP addresses for those
domain names. Domain names are alphanumeric aliases used to access websites;
for example, Cloudflare’s domain name is ‘cloudflare.com’ and the IP address
would be something like 192.0.2.1 (just an example). Domain names make it
easier to access websites without having to memorize and enter alphanumeric IP
addresses.
WHAT IS A DOMAIN NAME? :- A
domain name uniquely identifies a website and can’t be the same with other
websites. If you look in your browser’s address bar, you’ll see the domain name
of the site you’re visiting, like www.hostpapa.com, for instance. While a
domain name is associated with a website, they’re not the same thing. Every
website also has an IP address, its official identifier on the Internet, but IP
addresses are just a series of numbers. Accessing a website using its IP address
instead of a readable domain name would be ineffective for internet users.
When your website is created, you, your web developer,
or your web hosting company will associate the site’s IP address with the
domain name you purchase. This isn’t a permanent decision – if you buy a
different domain name in the future, it’s simple to redirect your website to
the new domain.
TYPES OF DOMAINS:-
There are more than 362 million domain names
registered worldwide, and growing.
Some of the most-used domain types today
1. Generic
Top-Level Domains (gTLDs) :- Top-level domains (TLDs) are the highest
level in the hierarchical Domain Name System (DNS) of the internet. They are
the domain name parts that appear immediately after the last dot, such as .com,
.org, or .net. TLDs help categorize domain names by their purpose, owner, or
geographic location. Understanding
Examples of TLDs :-
.com (Commercial)“, .org
(Organization), .net (Network) , .info (Information)
2. Sponsored
Top-Level Domains (TLDs) sTLDs:- are specialized TLDs sponsored by specific
organizations or communities.
Examples of TLDs :- .edu (Education)“: Reserved for
accredited educational institutions. ,
.gov (Government)“: Reserved for government entities., .mil (Military)“: Reserved for the U.S.
military.
3. Type
2: Country Code Top-Level Domains (ccTLDs):-
Country Code Top-Level Domains add a geographical element to your domain name.
Domain name examples include .us, .uk, and .ca. They represent the United
States, the United Kingdom, and Canada, respectively. Choosing a ccTLD can have
several advantages. It includes localized branding, increased trust among local
audiences.
4. Subdomains
:- Subdomains are extensions of your main
domain name. They can help organize different sections of your website. For
example, “blog.example.com” or “shop.example.com.”
HOW TO REGISTER A DOMAIN NAME or PROCESS:-
Domain Registration Process
·
Determine, if
desirous Department/Organisation qualifies to receive a domain name under
GOV.IN by reviewing the guidelines.
·
Review the domain
naming conventions and ensure that the desired domain name complies with the
conventions.
·
Check
availability for the desired domain name.
·
Register the
Domain Name request using Online Registration Service.
· Follow the instruction for generating and signing Authorization(Annexure-I) and Forwarding(Annexure-II) Letter online for registration of the domain.
·
User may
refer Help Video for complete
assistance.
Premium (paid) domain name example
FRUCY.com , EarnHost.com, EarnBunny.com, Fruuty.com,
CharmHost.com etc.
WHAT IS A WEBSITE DEVELOPMENT:-
Ecommerce website development refers to the process of
creating the technical structure of an online store. This involves setting up
the frontend, which is what customers interact with when browsing products and
making purchases, and the backend, which handles the data processing, order
management, and integration with other systems like inventory or customer
relationship management.
1. Web Design: This is all about the visual layout,
colors, fonts, and overall look and feel of the site. Good web design makes a
website attractive and easy to use, enhancing the experience for visitors.
2. Web Content: The heart of a website is its
content—text, images, videos, and other information displayed on the pages.
Content is what tells your story, conveys your message, and engages users.
3. Programming: This is the technical part, using
languages like HTML, CSS, and JavaScript to bring the website to life.
Programming ensures the site functions correctly, enabling features like
navigation menus, interactive forms, and more.
4. Database Management: Behind the scenes, databases
store and manage all the content and data on a website. For example, user
information, product details, and blog posts are often stored in databases,
making it easy to update and manage content.
TYPES OF WEBSITE DEVELOPMENT:- Website development comes in different forms, each with a unique focus and role in building a fully functional site.
1. Front-End Development: This is the part of website
development that users interact with directly. Also called “client-side”
development, it involves designing the layout, buttons, and navigation, along
with all the elements users see and engage with. Using tools like HTML, CSS,
and JavaScript, front-end developers create an attractive, intuitive
experience.
2. Back-End Development: Often described as the
“server-side” of development, back-end work happens behind the scenes. It
involves setting up and managing the server, databases, and the logic that
powers the website. This setup may depend on your hosting model—understanding
the pros and cons of on premise vs cloud infrastructure can influence cost, scalability,
and maintenance requirements. Back-end development is responsible for making
sure the site functions smoothly, handling tasks like processing user logins,
storing data, and connecting the front end with the database.
3. Full-Stack Development: Full-stack developers have skills in both front-end and back-end development. They can handle everything needed to build a complete website, from how it looks to how it operates. This makes full-stack developers versatile and highly valuable in website development.
DEVELOPING STATIC AND DYNAMIC WEBPAGES AND
HOSTING:-
STATIC WEBPAGES are simple pages where the content is fixed unless
you manually change the code. Developing
a static web page involves creating a website where the content delivered to
the user is exactly as stored on the server, without server-side
processing. This typically involves using HTML, CSS, and optionally
JavaScript.
Explanations :- Built with HTML and CSS (and maybe a little JavaScript). Every user sees the same content until you edit the file. Good for simple sites like portfolios, info pages, and small company sites.
STEPS: DEVELOP A STATIC WEBPAGE
STEP 1 :- Plan
the page
·
Decide purpose:
e.g., “personal portfolio” or “product landing page”.
·
Decide sections:
header, hero/banner, about, services, contact, footer.
STEP 2:- Set
up your folder
·
Create a folder, for example: my-static-site.
·
Inside it, create:
ü index.html
ü style.css
ü (optional)
script.js
ü an
images/ folder for images.
STEP 3:- Create basic HTML structure in index.html
·
Add:
ü Doctype
ü html,
head, body tags
ü Link
to CSS file
ü Optional
script link at end of body.
STEP 4:- Add content sections (still in index.html)
·
Header with site title and menu.
·
Main content:
ü A
hero section with a big title and button.
ü About
section.
ü Services
or projects section.
ü Contact
section (even a simple email link).
·
Footer with copyright line.
STEP 5:- Style with CSS (style.css)
·
Set base styles: font, background color, text
color.
·
Style header: background color, horizontal menu.
·
Style hero: center text, big heading, button
styles.
·
Use margins, padding, and layout (flexbox) for
sections.
·
Add basic responsiveness (e.g., make layout
stack on small screens).
STEP 6 :- (Optional) Add small interactions with JavaScript
·
Simple actions like:
ü Scroll
to section when clicking a button.
ü Show/hide
a mobile menu on small screens.
STEP 7:- Test locally
·
Open index.html with your browser.
·
Make edits, reload, fix any layout or spelling
issues.
DYNAMIC WEBPAGES can change content automatically based on user input,
databases, or logic on the server or in JavaScript. Developing dynamic web
pages involves creating web content that changes based on user interactions,
data from databases, or other external factors. This is in contrast to
static web pages, which display the same content to all users.
STEPS: DEVELOP A DYNAMIC WEBPAGE (SIMPLE
EXAMPLE PATTERN)
Simple pattern using a dynamic backend (the concept is
similar whatever language you pick):-
STEP 1: Choose a stack
·
Example beginner-friendly stacks:
ü Node.js
+ Express (JavaScript)
ü PHP
+ MySQL
ü Python
(Flask or Django) + database
STEP 2 :- Plan the dynamic behavior
·
Decide what must change automatically, for
example:
ü A
page that shows a list of messages submitted by users.
ü A
page that greets the user by name based on a query parameter.
·
Decide what data source:
ü For
learning, you can use an in-memory array or JSON file.
ü In
real apps, you use databases (MySQL, PostgreSQL, MongoDB, etc.).
STEP 3:- Set up project
·
Install runtime (e.g., Node.js).
·
Create a project folder (my-dynamic-site).
·
Initialize project (for Node: npm init -y).
·
Install web framework (for Node: npm install
express).
STEP 4:- Create server file
·
Create server.js (or app.js).
·
Import framework.
·
Create an app object.
·
Define routes:
ü GET
/ → returns HTML that might contain dynamic content.
ü GET
/hello?name=Dr. Ajay → reads name from query and prints “Hello, Dr. Ajay”.
·
Start the server (e.g., app.listen(3000)).
STEP 5:- Connect templates (optional but standard)
·
Use a template engine (like EJS (Embedded
JavaScript and is a templating engine used to generate dynamic HTML.), or Handlebars (The handlebar is a physical
component for steering, while Handlebars the library uses expressions within
text to dynamically generate HTML or other text formats.)) or render HTML
yourself.
·
Pass data from your server code into the
template:
ü Example
data: an array of “projects” or “messages”.
·
Template loops over the data and prints it as
HTML.
STEP 6:- (Optional) Use a database
·
Choose a database (e.g., SQLite for simple,
MySQL/PostgreSQL (PostgreSQL is a powerful, open-source, object-relational
database management system ) for more).
·
Create a table (e.g., messages, users,
products).
·
In your route handlers:
ü Read
from database and pass data to template.
ü Insert
new records when clicking a form “submit”.
STEP 7:- Test locally
·
Run server (e.g., node server.js).
·
Open http://localhost:3000
in browser.
·
Try sending requests (click links, submit forms)
and see content change.
HOSTING is
the process of putting your website files on an online server so that anyone
can open them through a domain name. Web hosting is a service that stores
a website's files (like code, images, and text) on a server and makes them
accessible to anyone on the internet. A web hosting provider maintains these servers,
ensuring the website remains online 24/7 by handling the infrastructure,
security, and internet connection. Essentially, it's like renting space on the
internet to publish your website.
STEPS: HOST A WEBSITE (STATIC OR DYNAMIC)
STEP 1:- Choose hosting type
·
For static
websites:
ü Services like Netlify, GitHub Pages, Vercel,
traditional shared hosting.
STEP 1 :- For dynamic websites
·
Shared hosting
that supports your language (e.g., PHP hosting).
·
Cloud platforms
(e.g., VPS (Virtual Private Server), PaaS (Platform as a Service) like Render,
Railway, etc.).
STEP 2:- Prepare your files
·
Static:
ü Ensure
index.html is in the root with style.css, script.js, images, etc.
·
Dynamic:
ü Include
all code files (server file, package files, templates, etc.).
ü Ensure
configuration uses environment variables for ports, database URLs, etc.
STEP 3:-
Create an account and new site on your
hosting
·
Sign up on the hosting platform.
·
Create a new “site” or “project”.
·
For static platforms:
ü Either
upload files or connect to a Git repository.
·
For dynamic platforms:
ü Configure
“build” and “start” commands if required.
STEP 4:-
Upload or deploy your code
·
Option A: Upload via web interface.
ü Zip
your project (for static only HTML/CSS/JS) and upload.
·
Option B: Use Git deployment.
ü Push
code to GitHub/GitLab/Bitbucket.
ü Link
hosting provider to the repository and enable auto deploy.
·
Option C: Use FTP (traditional hosting).
ü Use
an FTP client.
ü Connect
using host, username, password from hosting control panel.
ü Upload
your files to the public_html or www directory.
STEP 5:- Configure domain
·
Register a domain from a registrar (if you do
not have one).
·
On your hosting provider:
ü Add
the domain to your site/project.
·
On your domain registrar:
ü Point
DNS (Domain Name System) to your hosting (update nameservers or A/CNAME
(Canonical Name) records).
·
Wait for DNS propagation (often a few minutes to
a few hours).
STEP 6:- Enable HTTPS
·
Use the hosting provider’s option to issue a
free SSL certificate (often Let’s Encrypt).
·
Make sure your site is accessible via https://yourdomain.com.
STEP 7:- Test the live site
·
Open your domain in a browser.
·
Click through pages, test forms, confirm
everything works.
·
Fix any path issues (e.g., wrong links,
hard-coded localhost URLs).
SIMPLE COMPLETE EXAMPLE: STATIC + VERY SMALL
DYNAMIC BEHAVIOR
( PROGRAME CODE ) :-
Below is a simple
example of:
·
A static page (HTML + CSS + a tiny bit of JS).
·
A very simple “dynamic” behavior on the client
side (no backend): the page receives the user by name after form submission and
shows the current time.
PROGRAME 1:- index.html
xml
<!DOCTYPE html>
<html lang="en">
<head>
<meta
charset="UTF-8">
<title>Simple Webpage Example</title>
<link
rel="stylesheet" href="style.css">
</head>
<body>
<header
class="site-header">
<h1>My
Simple Website</h1>
<nav>
<a
href="#home">Home</a>
<a
href="#about">About</a>
<a
href="#contact">Contact</a>
</nav>
</header>
<main>
<!-- Hero
/ Home section -->
<section
id="home" class="hero">
<h2>Welcome to my page</h2>
<p>This is a basic example of a static webpage with a small
dynamic feature.</p>
<button
id="scroll-about-btn">Learn more</button>
</section>
<!-- About section -->
<section
id="about" class="section">
<h2>About</h2>
<p>
This
page is built using HTML for structure, CSS for styling, and JavaScript for
simple interactivity.
</p>
<p>
Enter
your name below to see a personalized greeting.
</p>
<form
id="greet-form">
<label for="name-input">Your name:</label>
<input type="text" id="name-input"
placeholder="Type your name here">
<button type="submit">Greet me</button>
</form>
<p
id="greeting-output" class="greeting-output"></p>
</section>
<!-- Contact
section -->
<section
id="contact" class="section">
<h2>Contact</h2>
<p>You can email me at: <a
href="mailto:you@example.com">you@example.com</a></p>
<p
id="time-output"></p>
</section>
</main>
<footer class="site-footer">
<p>© 2025 My Simple Website</p>
</footer>
<script src="script.js"></script>
</body>
</html>
PROGRAME 2 :- style.css
css
/* Reset some default spacing */
* {
box-sizing:
border-box;
margin: 0;
padding: 0;
}
body {
font-family: Arial,
sans-serif;
line-height:
1.6;
background-color: #f5f5f5;
color: #333;
}
/* Header and navigation */
.site-header {
background-color: #2c3e50;
color: #fff;
padding: 15px
20px;
display: flex;
justify-content: space-between;
align-items:
center;
}
.site-header h1 {
font-size:
1.4rem;
}
.site-header nav a {
color:
#ecf0f1;
margin-left:
15px;
text-decoration: none;
font-size:
0.95rem;
}
.site-header nav a:hover {
text-decoration: underline;
}
/* Hero section */
.hero {
background-color: #3498db;
color: #fff;
text-align:
center;
padding: 60px
20px;
}
.hero h2 {
font-size:
2rem;
margin-bottom:
10px;
}
.hero p {
font-size:
1rem;
margin-bottom:
20px;
}
.hero button {
background-color: #2c3e50;
color: #fff;
border: none;
padding: 10px
20px;
border-radius:
4px;
cursor:
pointer;
}
.hero button:hover {
background-color: #1a242f;
}
/* Generic section styling */
.section {
padding: 40px
20px;
max-width:
800px;
margin: 0
auto;
background-color:
#fff;
margin-top:
20px;
border-radius:
6px;
box-shadow: 0
2px 4px rgba(0, 0, 0, 0.1);
}
.section h2 {
margin-bottom:
15px;
}
.section p {
margin-bottom:
10px;
}
/* Greeting output styling */
.greeting-output {
margin-top:
10px;
font-weight:
bold;
color:
#27ae60;
}
/* Footer */
.site-footer {
text-align:
center;
padding: 15px;
margin-top:
30px;
background-color: #2c3e50;
color:
#ecf0f1;
font-size:
0.9rem;
}
/* Responsive tweaks */
@media (max-width: 600px) {
.site-header {
flex-direction: column;
align-items:
flex-start;
}
.site-header
nav {
margin-top:
10px;
}
}
PROGRAME 3:- script.js
Javascript
// Smooth scroll to About section when button clicked
const scrollButton = document.getElementById('scroll-about-btn');
const aboutSection = document.getElementById('about');
scrollButton.addEventListener('click', () => {
aboutSection.scrollIntoView({ behavior: 'smooth' });
});
// Simple greeting form logic
const greetForm = document.getElementById('greet-form');
const nameInput =
document.getElementById('name-input');
const greetingOutput =
document.getElementById('greeting-output');
greetForm.addEventListener('submit', (event) => {
event.preventDefault(); // prevent page refresh
const name =
nameInput.value.trim();
if (name) {
greetingOutput.textContent = `Hello, ${name}! Welcome to this simple
website.`;
} else {
greetingOutput.textContent = 'Please enter your name first.';
}
});
// Show current time in Contact section
const timeOutput =
document.getElementById('time-output');
function updateTime() {
const now =
new Date();
timeOutput.textContent = `Current time: ${now.toLocaleString()}`;
}
// update immediately and then every 30 seconds
updateTime();
setInterval(updateTime, 30000);
REGISTERING THE WEBSITE WITH SEARCH
ENGINES:-
Registering your website on search engines means
submitting your site so search engines like Google and Bing can find, and show
your website in their search results.
Here are the simple steps to register your website on
the main search engines.
STEPS TO REGISTER A WEBSITE ON SEARCH
ENGINES:-
STEP 1:-
Create and Prepare Your Website
·
Make sure your
website is live and accessible on the internet with a domain name.
·
Have an XML
sitemap file ready (usually at yourwebsite.com/sitemap.xml). This file tells
search engines about all the important pages on your site.
STEP 2:- Set up Google Search Console and Verify Ownership
·
Go to Google Search Console
(search.google.com/search-console).
·
Add your website by entering your domain name.
·
Verify that you own the site. The easiest way is
by adding a TXT record to your domain’s DNS (Domain Name System) settings (your
domain provider dashboard).
·
Verification proves you control the site, so Google
trusts you to submit important info.
STEP
3:- Submit Your
Sitemap in Google Search Console
·
Once verified, look for the “Sitemaps” section
in the sidebar.
·
Paste your sitemap URL (e.g.,
yourwebsite.com/sitemap.xml) and submit it.
·
This tells Google which pages should be crawled
and indexed faster.
STEP 4: Use
URL Inspection Tool for Important Pages
·
In Search Console, use the URL Inspection tool
to submit any new or important pages individually for faster indexing.
·
Paste the URL and click “Request Indexing”.
STEP 5:- Set
up Bing Webmaster Tools and Verify Site
·
Go to Bing Webmaster Tools
(bing.com/webmasters).
·
Sign in and add your website.
·
Verify ownership, similarly by adding a DNS
(Domain Name System) record or uploading a file to your site.
STEP 6:- Submit
Sitemap to Bing
·
In Bing Webmaster Tools, go to the “Sitemaps”
section.
·
Submit the sitemap URL as you did in Google
Search Console.
·
This submission also automatically covers Yahoo
search since Bing powers Yahoo’s search results.
STEP 7:- No
Manual Submission Needed for DuckDuckGo
·
DuckDuckGo automatically finds your site through
Bing, so submitting on Bing covers this.
STEP 8:- Optional:
Submit to Other Search Engines like Yandex or Baidu
·
For Russia/Kazakhstan/Others: use Yandex
Webmaster tools and submit sitemap similarly.
·
For China audiences: use Baidu Webmaster with
some language adjustments.
STEP 9:- Maintain and Update
·
Whenever you add new pages or significant
updates, resubmit your sitemap or URLs for re-indexing.
·
Regularly check your Webmaster tools for crawl
errors or issues.
Each step involves setting up free Webmaster or Search
Console tools provided by search engines to help you control indexing and site
visibility better. This process speeds up how quickly your site appears in
search results and helps track website performance.
WEB SERVER HARDWARE:- ( A server is any computer used to present (or “serve”)
files or make programs available to other computers associated with it through
a network (such as a LAN or a WAN). In computing, a server is a piece of
computer hardware or software (computer program) that endows with functionality
for other programs or devices, called "clients". )
A server is a computer system that provides data,
information, and other resources to other computer systems or devices on a
network. Server hardware is a physical component of the server system that
facilitates this data processing, management, and storage.
Server hardware comprises a server system, including
the computer chassis, power supply, motherboard, processor, memory, storage
devices, and network interface cards. It is designed to provide high processing
power, reliability, and security levels to support critical business
applications, services, and processes. Server hardware differs from regular
computer hardware because it is optimized to simultaneously support multiple
users, applications, and processes.
A server system typically has higher processing power,
larger memory capacity, and storage devices to accommodate the demands of
multiple users accessing the system concurrently.
TYPES OF SERVER HARDWARE:-
1. Rack-mounted
servers:- These servers are mounted on
racks, providing a space-saving solution for data centers or server rooms. They
typically come in different sizes and can accommodate different hardware
configurations. Rack-mounted servers can be a good option if you are a business
owner starting your business.
2. Blade
servers:- These are high-density servers
that are designed to fit in a rack enclosure. Blade servers are ideal for
organizations requiring high computing power and flexibility in their server
systems.
They typically have a smaller form factor, low power
consumption, and are hot-swappable. These benefits have made blade servers
quite popular among business owners out there in the world.
3. Tower
servers:- These are standalone servers
designed to be installed on a desk or a floor. Tower servers are ideal for
small to medium-sized businesses that require a server system for their
day-to-day operations. They are usually less expensive than rack-mounted or
blade servers and offer scalability and reliability.
4. Micro
servers:- These small form factor servers
are designed for low power consumption and are ideal for small business
applications. They are typically less expensive than other types of servers and
offer a low-cost solution for businesses that require a server system but have
limited resources.
5. Mainframe
servers:- These large and powerful
servers are designed to support multiple users and applications concurrently.
They are typically used by large organizations or government agencies requiring
high computing power, reliability, and security.
WEB SERVER SOFTWARE:- A web server software that uses HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web. A web server software, dedicated to running this software, which can fulfill client requests on the World Wide Web. Web servers can repeatedly be found embedded in devices such as printers, routers, webcams and serving only a local network. On the software side, a web server includes several parts that control how web user’s access hosted files. At a minimum, this is an HTTP server. An HTTP server is software that understands URLs (web addresses) and HTTP (the protocol your browser uses to view web pages). An HTTP server can be accessed through the domain names of the websites it stores, and it delivers the content of these hosted websites to the end user's device.
The web server may then be used as a part of a system
for monitoring or administering the device in question. This typically means
that no other software has to be installed on the client computer since only a
web browser is obligatory (which now is incorporated with most operating
systems). These web pages are more often than not static content that includes
HTML documents, images, style sheets, tests etc. Apart from HTTP, a web server
also supports SMTP (Simple Mail transfer Protocol) and FTP (File Transfer
Protocol) protocol for emailing and for file transfer and storage.
FEATURES OF WEB SERVER SOFTWARE:-
1. Client Request Processing: A Web server processes
client requests that are sent using HTTP protocol, both for static and dynamic
pages
2. IP-Sharing or Virtual Server: A Web server can work as
many virtual Web servers, serving many businesses with individual domain names
but all domains directing to the same IP address of the computer.
3. Logical File: A Web server can have a logical file
name corresponding to a physical file. The physical file may be in the same
computer or in another computer, and also the logical name and the physical
name do not have to be the same. The Web server translates a logical URL into a
physical file address.
4. Security: Web servers are located publicly on the
Internet or privately in an organizational intranet, usually behind the
firewalls. The public documents are configured to be viewed by anonymous users.
For extranet users, the files and folders are configured for validation of
username and password. Access controls provide or deny access to files based on
the username or by extranet company URL. Web servers allow processing digital
certificates and private/public key pairs and also support Secure Socket Layer
(SSL)
5. Site Management: Web server provides tools to manage
multiple Web sites, file security, virtual file, and log file analysis
Administration of a Web server can be performed from a remote computer in the
network Administrators can grant or deny Web access to individual computers,
groups of computers, or entire domains. Administrators can stop and restart all
Web services without stopping and restarting the computer Site management also
include authoring tools such as Microsoft Front page 2000.
6. Application Development: Application development
includes Web editors and extensions to produce Web pages – either static or
dynamic. These include HTML editors such as FrontPage for static Web pages for
dynamic Web pages, there are protocols such as Common Gateway Interface (CGI),
Application programming Interface (API), and Active Server Pages (ASP) that are
used by programs such as Java, C++, and VBScript to develop dynamic Web pages.
DATA CENTRE SERVICES.:- Data center services encompass all of the services and
facility-related components or activities that support the implementation,
maintenance, operation, and enhancement of a data center, which is an
environment that provides processing, storage, networking, management and the
distribution of data within an enterprise. Generally, data center services fall
into two categories: services provided to a data center or services provided
from a data center. While many data center services can be primarily software
oriented, others are still relatively physical, where comprehensive systems may
involve a mix of hardware, software and human resources. Many of these services
may apply to the physical structures involved in the data center, such as
setting up adequate environmental and security equipment, as well as handling
needs for utilities such as power and broadband. Both consumer and business
applications are contributing to the growing dominance of datacenter services
and cloud services in India. This has given rise to many companies offering
Data Center Services in India and cloud service providers in India. We at IDBI
(Industrial Development Bank of India ) Intech, have been providing IT enabled
Services which includes managing of IT Infrastructure and Data Centre. We manage
3-Tier Data Centre, Disaster Recovery site and Near DR site for IDBI Bank. We
also provide end to end solution for the procurement and management of the
entire IT Infrastructure.
FIGURE OF DATA CENTER
DATA CENTER CONSIDERATIONS INCLUDE:
1. Redundancy/backup:- the level of redundancy varies widely based on
the quality of a data center; in high tier data centers, multiple redundancies
in power and backup servers are built into the infrastructure.
2. Efficiency:-
the amount of electricity used at a large data center rivals that of a small
town. Whenever possible, data centers attempt to cut down on costs by
optimizing cooling processes and using energy-efficient hardware.
3. Security:- proper
physical security, both in terms of electronic surveillance, access controls,
and on-site security guards reduce the risk associated with bad actors
attempting to gain site access.
4. Environmental controls/factors:- maintaining the right
environmental conditions is necessary for the proper functioning of electronic
hardware. Keeping both temperature and humidity within acceptable parameters
requires the proper balance of air conditioning, humidity control, and airflow
regulation. In areas that are vulnerable to earthquakes, properly secured
servers are also a necessary concern.
5. Maintenance and monitoring:- on-site or on-call network engineers are needed in
order stay on top of server crashes and other hardware failures. Proper
response helps to ensure server uptime and eliminate reductions in quality of
service.
6. Bandwidth:- a
data center is incomplete without the bandwidth necessary to handle all the
requisite network traffic. Bandwidth considerations are a central component in
data center infrastructure, with external network connections and internal data
center topology both designed around sufficient network capacity.
WHAT ARE THE MAIN COMPONENTS OF DATA CENTRE
ARCHITECTURE?
Data centre design has six main components: computing,
storage, networks, power infrastructure, cooling systems, and security systems.
These are the foundation of flawless data centre operation and are integral to
its design and functionality.
1. Computing:-
Computing resources are responsible for processing and executing tasks and
applications within data centres. These are usually high-performance servers
and other computing assets necessary to meet the data centre's processing
requirements.
2. Storage:- The storage component encompasses
both the hardware and infrastructure, which stores and manages data within the
data centre. This component consists of storage area networks (SAN),
network-attached storage (NAS), and other solutions that serve as
high-capacity, reliable, and scalable data storage equipment.
3. Networks:- The
network elements focus on the networking capabilities of the data centre.
Networking consists of switches, routers, firewalls, and all other hardware
elements that ensure connectivity, security, and efficient transfer of data
within the data centre.
4. Power infrastructure:- Power
infrastructure consists of Uninterruptible Power Supply (UPS) systems, backup
generators, and power distribution units (PDUs) provide a stable and reliable
power supply.
5. Cooling systems:- Cooling
systems include Computer Room Air Conditioning (CRAC) units, liquid cooling
systems, and hot/cold aisle containment to maintain optimal temperature and
humidity levels.
6. Security systems:- Physical
and network security measures to protect data and infrastructure from
unauthorised access and cyber threats.
TYPES OF DATA CENTERS:-
Data centers are housed in secured environments with
controlled access. The six common data center types are:
1. Enterprise data centers.
2. Managed service(s) data centers.
3. Colocation data centers.
4. Cloud data centers.
5. Hyperscale data centers.
6. Edge data centers.
1. Enterprise
data center:- An enterprise data center is typically owned by a
single organization or enterprise with predictable usage and limited
scalability requirements. These data centers may be located on-premise or
off-site and can also operate as private cloud data centers.
Managed internally, enterprise data centers are
generally used to handle the organization’s internal data and IT workloads.
They are best suited for organizations with sufficient resources and expertise
to build, operate, and maintain their own facilities.
2. Managed
services data center:- A managed service data center is
usually located off-site and operated by a Managed Service Provider (MSP).
While the maintenance and operational responsibilities are outsourced to the
MSP, a single organization may still own the rights to use the facility. These
data centers are designed for predictable usage, making them less scalable than
other models. Managed services data centers are ideal for organizations with
large-scale computing needs but lacking the internal expertise and resources to
independently operate and maintain a facility.
3.
Colocation data center:- In a collocated data center, several organizations
share the physical space while managing their own computing infrastructure. The
building infrastructure, including cooling, HVAC (Heating, Ventilation, and Air
Conditioning ), and power, is operated by a third-party MSP or vendor.
Colocation data centers offer higher scalability, attracting a diverse customer
base with varying usage demands. This model is particularly suitable for
organizations that have the expertise to manage limited data center operations
but lack the capital expenditures (CapEx) and resources to build and operate an
entire facility.
4. Cloud
data center:- A cloud data center is a collection of distributed
facilities designed to provide global cloud-based services. These services are
offered on-demand and on a subscription basis, commonly as:
a) Software as a Service (SaaS).
b) Infrastructure as a Service (IaaS).
c) Platform as a Service (PaaS).
5. Hyperscale
data centers:- Hyperscale data centers are the largest players in the
industry, operated by technology like AWS (Amazon Web Services ), Microsoft
Azure, and Google Cloud. These facilities offer a variety of cloud services
with unparalleled scalability. Globally distributed and fully automated,
hyperscale data centers are managed by large technology enterprises that have
the resources, expertise, and CapEx to build and maintain extensive networks of
data centers worldwide. This model is ideal for tech companies aiming to
compete in the cloud computing space.
6. Edge
data center:- Lastly, edge data centers are located close to end-users,
such as individual consumers of telecommunications services. These facilities
are often managed and operated by ISPs and telcos. Edge data centers are used
for applications requiring real-time processing, IoT, and low-latency
workloads. This model is particularly well-suited for organizations providing
Internet-based services where user experience and networking performance are
critical to business success.
E SECURITY:- eCommerce
security is the guideline that ensures safe transactions through the internet.
It consists of protocols that safeguard people who engage in online selling and
buying goods and services. You need to gain your customers’ trust by putting in
place eCommerce security basics.
Such basics include:
1) Privacy
2) Integrity
3) Authentication
4) Non-repudiation
5) Encryption
6) Auditability
1. Privacy:- Privacy includes preventing any activity that will
lead to the sharing of customers’ data with unauthorized third parties. Apart
from the online seller that a customer has chosen, no one else should access
their personal information and account details. A breach of confidentiality
occurs when sellers let others have access to such information. An online
business should put in place at least a necessary minimum of anti-virus,
firewall, encryption, and other data protection. It will go a long way in
protecting credit card and bank details of clients.
2. Integrity:- Integrity is another crucial concept of eCommerce
Security. It means ensuring that any information that customers have shared
online remains unaltered. The principle states that the online business is
utilizing the customers’ information as given, without changing anything.
Altering any part of the data causes the buyer to lose confidence in the
security and integrity of the online enterprise.
3. Authentication:- The principle
of authentication in eCommerce security requires that both the seller and the
buyer should be real. They should be who they say they are. The business should
prove that it is real, deals with genuine items or services, and delivers what
it promises. The clients should also give their proof of identity to make the
seller feel secure about the online transactions. It is possible to ensure
authentication and identification. If you are unable to do so, hiring an expert
will help a lot. Among the standard solutions include client login information
and credit card PINs.
4. Non-repudiation:- Repudiation
means denial (rejection) . Therefore, non-repudiation is a legal principle that
instructs players not to deny their actions in a transaction. The business and
the buyer should follow through on the transaction part that they initiated.
eCommerce can feel less safe since it occurs in cyberspace with no live video.
Non-repudiation gives eCommerce security another layer. It confirms that the
communication that occurred between the two players indeed reached the
recipients. Therefore, a party in that particular transaction cannot deny a
signature, email, or purchase.
5. Encryption:- Information
should be encrypted and decrypted only by an authorized user.
6. Auditability:- Data should be
recorded in such a way that it can be audited for integrity requirements.
E-COMMERCE SECURITY THREATS AND ISSUES:-
1. Financial
Fraud:- Cybercriminals
often target payment transactions, attempting to tap funds from unsuspecting
users. These threats range from credit card fraud to identity theft. The 2 most
common types of financial fraud carried out by fraudsters include credit card
fraud and refund fraud.
2. Credit
Card Fraud:- This fraud is carried out
through a stolen credit card or through identity theft which enables the
fraudster to create a credit card with that identity. Carding, a practice where
small transactions are made to test the validity of stolen credit card details,
is another common threat. Transactions with stolen credit cards can be limited
by installing address verification systems. These systems check and verify
between the billing addresses provided by the customer to you and the bank.
3. Refund
Fraud:- Another trick up a fraudster’s cover
is to file requests for refunds or returns for non-existent orders or after
using the products.
4. Phishing:- Phishing attacks involve deceptive emails or websites
that appear genuine but are designed to trick users into revealing their
personal and financial information. Customers can receive messages or emails
from hackers pretending to be your e-commerce business.
5. DDoS
Attacks:- Distributed Denial of Service
(DDoS) attacks flood a website with crushing traffic rendering it inaccessible
to genuine users. E-commerce businesses are attractive targets.
6. Spamming:- Spam emails, comments, and messages can confusion
& disrupt the experience of your e-commerce platform. They can also have
malware or phishing links. They can also leave these links in their comments on
blog posts and contact forms. Clicking such a link directs your customers to
malicious sites. Spamming not only affects your website’s security but also
reduces its speed and performance drastically.
7. Bots:- Bots can be programmed to perform tasks like scraping
data (e.g., to collect Amazon product details), automating purchases, or
launching attacks. Malicious bots can cause confusion on e-commerce sites by
scraping them for inventory and price information. Hackers can then use the
data to lower or modify the prices on their websites in an attempt to lower
your sales and revenue.
8. Brute
Force Attacks:- Physical force attacks
involve repeated, automated login attempts to gain unauthorized access to user
accounts. Attackers can use brute force to attack your administrator panel,
crack your password, and compromise your account to steal information.
Automated tools help in trying out thousands of combinations in an attempt to
obtain your site’s passwords. It’s wise to use strong, complex passwords and
change them every few months.
9. Vulnerability Exploitation:- Vulnerabilities that exist in your e-commerce website can be exploited by hackers using SQL injections or cross-site scripting (XSS). SQL injections affect your database by corrupting it using codes that are put into query boxes on your site.
10. Malware:- Malicious software like spyware, viruses, trojans,
and ransomware is installed on your IT and computer systems without your
knowledge. Customers, admin, and other user devices may have trojan horses that
can easily swipe away any sensitive information from it and in the process
affect your e-commerce site as well.
SECURITY SERVICE PROVIDERS IN E COMMERCE:-
Security service providers in e-commerce are
specialized companies or platforms that offer cybersecurity solutions tailored
to protect online businesses from various digital threats. These providers
ensure the safety of online transactions, customer data, and the overall
integrity of e-commerce websites by implementing security measures like
firewalls, encryption, authentication protocols, and threat detection systems.
Security service providers focus on safeguarding
e-commerce websites and platforms from cyber attacks such as data breaches,
fraud, Distributed Denial of Service (DDoS) attacks, and malware infections.
They help maintain customer trust by protecting sensitive information like
payment details and personal data.
Examples of these services include Web Application
Firewalls (WAF), Secure Socket Layer (SSL) certificates, two-factor
authentication (2FA), bot management, and vulnerability scanning.
EXAMPLES OF SECURITY SERVICE PROVIDERS
1) Cloudflare: Offers a Web Application Firewall that
protects e-commerce sites from malicious bots, DDoS (Distributed Denial of
Service) attacks, and provides threat intelligence and analytics.
2) Duo Security: Provides two-factor authentication
services to add an extra layer of security in user identification and access
management.
3) Sucuri: Specializes in website security including
malware scanning, removal, DDoS protection, and compliance assistance.
4) Atlant Security: A global cybersecurity firm providing
security audits, virtual Chief Information Security Officer (CISO) services,
and infrastructure hardening to support e-commerce brands.
5) Sophos and Imperva: Offer network security solutions
that protect data and online transactions for e-commerce platforms.
DIGITAL CERTIFICATES OR IDENTITY CERTIFICATES OR PUBLIC KEY CERTIFICATES :- A
digital certificate is a form of electronic credential that can prove the
authenticity of a user, device, server, or website. It uses PKI (public key
infrastructure) to help exchange communications and data securely over the
internet. This form of authentication is a type of cryptography that requires
the use of public and private keys to validate users.
Public key certificates are issued by trusted third
parties, a CA (certificate authorities), who signs the certificate, thus
verifying the identity of the device or user that is requesting access. To
ensure validity, the public key will be matched with a corresponding private
key that only the recipient has knowledge of. Digital certificates have a
specific key pair opens in a new tab that they are associated with: one public
and one private.
A digital certificate contains the following
identifiable information:-
1) User’s name
2) Company or department of user
3) IP (internet protocol) address or serial number of
device
4) Copy of the public key from a certificate holder
5) Duration of time the certificate is valid for
6) Domain certificate is authorized to represent
BENEFITS OF DIGITAL CERTIFICATION:-
1) Security:- Digital certificates can keep
internal and external communications confidential and protect the integrity of
the data. It can also provide access control, ensuring only the intended
recipient receives and can access the data.
2) Authentication:-
With a digital certificate, users can be sure that the entity or person they
are communicating with is who they say they are and makes sure that
communications reach only the intended recipient.
3) Scalability:-
Digital certificates can be used across a variety of platforms for individuals
and large and small businesses. They can be issued, renewed, and revoked in a
matter of seconds. They can be used to secure a range of user devices and be
managed through one centralized system.
4) Reliability:-
A digital certificate can only be issued by a publicly trusted and carefully examined
CA (certificate authorities), meaning that they cannot be easily tricked or
faked.
5) Public trust:- The
use of a digital certificate proves authenticity of a website, documents, or
emails. It can assure users and clients that the company or individual is
genuine and respects privacy and values security.
TYPES OF DIGITAL CERTIFICATES IN
CRYPTOGRAPHY:-
1. TLS/SSL
certificate:- A TLS/SSL (Transport Layer
Security / secure socket layer) , certificate sits on a server— such as an
application, mail, or web server—to ensure communication with its clients is
private and encrypted. The certificate provides authentication for the server
to send and receive encrypted messages to clients. The existence of a TLS/SSL
certificate is signified by the Hypertext Transfer Protocol Secure (HTTPS)
designation at the start of a Uniform Resource Locator (URL) or web address.
It comes in
three forms:-
a) Domain validated:- A domain validated certificate is a
quick validation method that is acceptable for any website. It is cheap to
obtain and can be issued in a matter of minutes.
b) Organization validated:- This provides light business
authentication and is ideal for organizations selling products online through
e-commerce.
c) Extended validation:- This offers full business
authentication, which is required by larger organizations or any business
dealing with highly sensitive information. It is typically used by businesses
in the financial industry and offers the highest level of authentication,
security, and trust.
2. Code
signing certificate:- A code signing
certificate is used to confirm the authenticity of software or files downloaded
through the internet. The developer or publisher signs the software to confirm
that it is genuine to users that download it. This is useful for software
providers that make their programs available on third-party sites to prove that
files have not been tampered with.
3. Client
certificate:- A client certificate is a
digital ID that identifies an individual user to another user or machine, or
one machine to another. A common example of this is email, where a sender signs
a communication digitally and its signature is verified by the recipient.
Client certificates can also be used to help users access protected databases.
ENCRYPTION:- Encryption is the process of transforming readable plain text into unreadable ciphertext to mask sensitive information from unauthorized users. Organizations regularly use encryption in data security to protect sensitive data from unauthorized access and data breaches. Encryption is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key. Encrypted data can be protected while at rest on computers or in transit between them, or while being processed, regardless of whether those computers are located on-premises or are
remote cloud servers. Google Cloud offers a variety of
ways to encrypt data and protect an organization’s cryptographic keys. Learn
more about key management, confidential computing, and Google Cloud’s security
offerings.
WHY IS ENCRYPTION IMPORTANT OR OBJECTIVES OF
ENCRYPTION? :-
1) Confidentiality. Encodes the data to prevent it from being
understood if it is intercepted.
2) Authentication. Verifies the origin of the data that
has been encrypted.
3) Integrity. Validates that the data has not been
altered since it was encrypted.
4) Nonrepudiation. Prevents senders from denying they
sent the encrypted data.
DIGITAL SIGNATURES :- A digital signature is a virtual stamp that proves who
sent a digital message or file and that it hasn’t been tampered with. It
verifies the sender’s identity and the integrity of the digital document,
making it legally binding. It works like a pair of keys. Both the sender (the
person or company who creates and sends the contract) and the receiver (the one
who must sign the document) each have a pair of keys.
1) Private key: Used to create the digital signature (and kept only by you).
2) Public key: Used by others to verify the digital signature. You share it with
anyone who needs to verify your signature. If you use an e-signing platform
like Ajay, your public key cryptography can be automatically made available to
the other party through the platform.
The sender uses their private key to create a digital signature, which is a unique code linked to that document. This code serves as a personal seal, proving the document is genuinely from the sender. The receiver uses the sender’s public key to verify the signature. If the code matches, it confirms that the document and signature are authentic and unchanged. This is crucial for online data security and trust because it ensures that information comes from the right source and hasn’t been altered after signing.

No comments:
Post a Comment
PLEASE DO LEAVE YOUR COMMENTS