Top » Catalog » NMIMS » 2017-December »


e-Commerce and Cyber Laws-NMIMS Dec 17

e-Commerce and Cyber Laws-NMIMS Dec 17

Must read before purchase: You must edit approx 10-20 percent answer for avoid copy case.

Note: We provide online mcq (multiple choice question) question bank for online exam and assignment help. Contact us for more information.

Q1: After demonetisation, e-wallets rode a wave as customers short of cash quickly downloaded apps to pay digitally for everything from mobile phone recharges and cabs to groceries and flight tickets. Digital wallet providers like Paytm, Mobikwik and PayU came to the rescue. Banks also have their own apps which customers find easy to use and are gaining much popularity. What are e-wallets? Do you think e-wallets will survive long in the market? Give justification for you answer. (10 Marks)


Q2: Rushing into the conference room for his next meeting, Prerak, a marketing executive with a consumer goods company, was sure he would not be able to visit his parents in the suburbs in time to replenish their medicine stock. His parents had medicines only for a day or two. His work could have taken a toll on the health of his parents, but not this time. He opened the app of 1mg on his smartphone and placed an order by using images of the prescriptions he had saved earlier. 1mg, an online pharmacy based in Gurgaon, helps people order medicines and also provides information and suggestions on the medicines and its side-effects. Despite the convenience, ease and huge discounts being offered , customers are still not open to the idea of ordering medicines online. Identify the different players in this space and the probable inhibitions to order medicines online. Mention some steps that online pharmacies can take to alleviate these concerns of the people. (10 Marks)


Q3. Indian businesses are facing rising instances of cybercrime and the response mechanism to address these risks remains low. Two-third of businesses in India were unable to detect a cyber attack-incident in real time due to insufficient understanding of the motive behind the attack. A report highlights that employees emerged as one of the weakest links in the company’s defence systems and over 90 per cent respondents identified social media as a big risk area. Hackers scour through social media database of employees of organisations they intend to attack and send them phishing mails. Employees post extensive details regarding their work profile on social networking websites. These social media platforms act as goldmines for cyber criminals to identify and target key individuals for a successful breach. (Source: Adapted from a E&Y report)


a. What are different types of cyber-attacks? What steps can organizations take in order to prevent being a victim of cyber attacks? As a Chief Security Officer (CSO) of an organization, what action will you bring into immediate effect to curb cyber attack on the system? (5 Marks)

b. What are the different types of hackers? Describe one instance where such large scale cyber attacks have taken place and have caused mayhem and destruction to an organization. What were the lessons learnt by this organization? (5 Marks)

Quick Find
Use keywords to find the product you are looking for.
Advanced Search
0 items
Share Product

osCommerce Online Merchant Copyright © 2010 osCommerce
osCommerce provides no warranty and is redistributable under the GNU General Public License
Note: We provide all Solutions and Contents for Reference/Study purpose only.