Social Media and e-
Commerce Security
Social media
• Social media refers to online platforms and websites that allow users to
create, share, and interact with content generated by themselves and
others.
• These platforms facilitate the exchange of information, ideas, and media
in a virtual social environment.
• Users can connect with friends, family, colleagues, and even strangers,
forming online communities based on shared interests, relationships, or
activities.
Examples of popular social media platforms include:
• Facebook: A platform for connecting with friends and family, sharing updates, photos, and links.
• X (Formerly Twitter): A microblogging (With a microblog, we share short messages with an online
audience to improve engagement.) platform where users share short messages (tweets) with
followers.
• Instagram: A photo and video-sharing platform known for its visual content.
• LinkedIn: A professional networking platform for career-related connections and discussions.
• Snapchat: A multimedia messaging app for sharing photos and videos that disappear after being
viewed.
• YouTube: A video-sharing platform where users can upload, view, and share videos.
Please note:
Blogs and microblogs
• The main difference between traditional blogs and microblogs is their
length.
• Blogs are more long-form and can be anywhere from one paragraph to
many pages.
• Microblogs, however, are smaller and more concise. Creating a microblog
takes less time, facilitating quick communication with your audience.
Significance of Social Media in Today's World:
• Global Connectivity: Social media connects people globally, allowing them to communicate
and share information irrespective of geographical boundaries.
• Information and News Sharing: Social media serves as a real-time source of news and
information. Users can quickly share and access news updates, making it a powerful tool for
disseminating information.
• Community Building: Social media enables the formation of communities based on shared
interests, hobbies, professions, and more. It fosters a sense of belonging among users.
• Marketing and Business: Businesses utilise social media for marketing, brand promotion,
and customer engagement. It provides a cost-effective way for companies to reach a wide
audience.
• Political and Social Movements: Social media has played a significant role in political
activism and social movements. It serves as a platform for expressing opinions,
organising events, and raising awareness.
• Education and Awareness: Social media is used for educational purposes, spreading
information, and raising awareness on various issues, including health, environment, and
social justice.
• Entertainment: Social media platforms are a major source of entertainment, with users
sharing and consuming a wide variety of content, including videos, memes, and other
forms of creative expression.
• Real-time Interaction: Social media facilitates real-time interaction and communication,
allowing individuals to stay connected with friends and family, irrespective of physical
distance.
Basic checklist for privacy and security settings
of popular social media platforms
Facebook
Profile Privacy:
Go to Settings & Privacy > Settings > Privacy.
Adjust settings for "Who can see your future posts?" and "Review all your posts and things you're tagged in."
Timeline and Tagging:
Manage who can post on your timeline and who can tag you in posts and photos.
Enable Timeline Review to review tags before they appear on your timeline.
Friend Requests:
Control who can send you friend requests.
Set up friend request filtering.
Apps and Websites:
Review and manage the apps and websites connected to your Facebook account.
X (Formerly Twitter)
Account Privacy:
• Go to Settings and privacy > Privacy and safety.
• Adjust settings for tweet privacy, who can tag you in photos, and who can see your
location.
Security:
• Enable login verification for an extra layer of security.
Notifications:
• Customize notification settings to control what you get notified about.
Instagram
Account Privacy:
• Go to Settings > Privacy > Account Privacy.
• Adjust settings for private account, comments, and tags.
Story Controls:
• Manage who can see your stories and who can reply to them.
Activity Status:
• Disable or limit the visibility of your activity status.
Two-Factor Authentication:
• Enable two-factor authentication for added security.
Please note:
Two-factor authentication (2FA) is an identity and access management security method that
requires two forms of identification to access resources and data.
LinkedIn
Profile Privacy:
• Go to Settings & Privacy > Visibility.
• Adjust settings for who can see your connections, activity feed, and more.
Job Seeking Preferences:
• If applicable, manage job-seeking preferences carefully.
Data Privacy and Ads:
• Adjust settings for data privacy and advertising preferences.
Snapchat
Privacy Settings:
• Go to Settings > Privacy.
• Adjust settings for who can contact you, view your stories, and see your
location.
Map and Location Sharing:
• Review and manage who can see your location on the Snap Map.
Memories and Saved Snaps:
• Adjust settings for who can save your snaps and view your memories.
General strategies to ensure privacy and security in social media platforms
Use Strong Passwords:
• Use unique, strong passwords for each social media account.
Two-Factor Authentication:
• Enable two-factor authentication wherever available.
Regularly Review App Permissions:
• Periodically review and revoke access to third-party apps.
Keep Apps Updated:
• Keep your social media apps and devices up to date with the latest security patches.
Beware of Phishing Attempts:
• Be cautious of phishing attempts and never share your login credentials with
suspicious links.
Reporting and redressal mechanism for violations
and misuse of social media platforms
Facebook
Reporting Content:
• Click on the three dots next to the content (post, photo, etc.) you want to report.
• Choose the appropriate option (e.g., "Find support or report post").
• Follow the on-screen instructions to complete the report.
Reporting Profiles:
• Go to the profile you want to report.
• Click on the three dots on the profile.
• Choose "Find support or report profile" and follow the instructions.
Help Center:
• Visit the Facebook Help Center for additional assistance and guidance on various
issues.
X (Formerly Twitter)
Reporting Tweets:
• Click on the downward arrow on the tweet.
• Select "Report Tweet" and follow the instructions.
Reporting Profiles:
• Go to the profile you want to report.
• Click on the three dots on the profile.
• Select "Report" and follow the instructions.
Support Center:
• Visit the Support Center of X for more assistance and information.
Instagram
Reporting Content:
• Click on the three dots above the post.
• Choose "Report" and follow the on-screen instructions.
Reporting Profiles:
• Go to the profile you want to report.
• Click on the three dots on the profile.
• Choose "Report" and follow the instructions.
Help Center:
• Visit the Instagram Help Center for additional resources and support.
LinkedIn
Reporting Content or Profiles:
• Click on the three dots on the content or profile.
• Choose "Report this" and follow the instructions.
Help Center:
• Visit the LinkedIn Help Center for more information and assistance.
Snapchat
Reporting Content or Profiles:
• Press and hold on to the content or profile.
• Choose the reporting option and follow the instructions.
Support:
• Visit the Snapchat Support page for additional help.
General strategies
Document the Issue:
• If possible, take screenshots or note details of the violation for reference.
Review Platform Policies:
• Familiarize yourself with the platform's community guidelines and policies.
Contact Support:
• If the reporting mechanism doesn't address your concern, look for ways to contact the
platform's support directly.
Law Enforcement:
• In cases of serious offences, consider involving law enforcement and report the issue to the
relevant authorities.
Mobile wallets
• Google is often cited as the company to offer the first digital wallet.
• In 2011 it launched Google Wallet (now known as Google Pay Send and part of Google Pay)
• Mobile wallets, also known as digital wallets or e-wallets, are virtual wallets that allow users to
store and manage their financial information securely on a mobile device.
• These wallets enable various financial transactions, including making payments, transferring
money etc.
https://youtu.be/l2VzcFH-F68
https://youtu.be/S_Im0Yrltkk
https://youtu.be/qn-zxW-KVus
Advantages of Mobile Wallets
Convenience:
• Mobile wallets offer a convenient and quick way to make transactions without the need for physical
cash or cards.
Security:
• Security features such as encryption and biometric authentication enhance the safety of financial
transactions.
Digital Record Keeping:
• Users can easily track their transaction history and receipts within the mobile wallet.
Contactless Payments:
• Mobile wallets support contactless payments, contributing to a faster and more hygienic payment
experience.
Integration with Other Apps:
• Some mobile wallets integrate with other apps and services, providing a seamless user experience.
Examples of Mobile Wallets
Apple Pay:
Available on Apple devices, Apple Pay allows users to make payments using their iPhones, Apple Watches, iPads, and Macs.
Google Pay:
Google Pay is compatible with Android devices and facilitates payments, in-app purchases, and peer-to-peer transactions.
Samsung Pay:
Samsung Pay supports transactions on Samsung devices and is known for its compatibility with both NFC and traditional magnetic
stripe card readers.
PayPal:
Originally an online payment platform, PayPal has expanded to support mobile payments, allowing users to make transactions and
transfer funds through their mobile app.
Venmo:
Owned by PayPal, Venmo is a peer-to-peer payment app popular in the United States, especially among younger users, for splitting
bills and sharing expenses.
Cash App:
Developed by Square, Cash App enables users to send money, receive payments, and invest in stocks.
Paytm:
A popular mobile wallet in India, Paytm provides services such as mobile recharges, bill payments, and online shopping.
UPIs
• Unified Payments Interface (UPI) is a real-time payments system in India that allows
users to link multiple bank accounts to a single mobile application.
• It enables users to make instant money transfers, pay bills, and conduct various
financial transactions using their smartphones.
• UPI was developed by the National Payments Corporation of India (NPCI) to promote
digital payments and enhance financial inclusion.
• UPI has not only simplified the process of making payments but has also brought
millions of unbanked Indians into the formal banking system.
Key Features of UPI
Real-Time Transactions:
UPI enables immediate fund transfers between bank accounts on a real-time basis, making it a quick and efficient payment system.
Multiple Bank Account Linking:
Users can link multiple bank accounts to a single UPI application, providing flexibility and convenience in managing finances.
Single ID for Transactions:
Each user is assigned a unique UPI ID, which is often linked to their mobile number. This ID serves as a single identifier for making and receiving
payments.
Interoperability:
UPI is designed to be interoperable across different banks and financial institutions. Users can make transactions seamlessly between banks.
Mobile Number as Identifier:
UPI transactions can be initiated using the recipient's UPI ID, mobile number, or bank account details. This simplifies the payment process.
Secure Authentication:
UPI transactions are secured by authentication, including a UPI PIN that users set up during the registration process.
Merchant Payments:
UPI is widely used for making payments to merchants both online and offline. Many businesses and service providers accept UPI payments.
Bill Payments and Recharges:
Users can pay utility bills, recharge mobile phones, and perform other financial activities through UPI-enabled apps.
Request Money Feature:
UPI allows users to request money from others, streamlining the process of splitting bills or sharing expenses.
• Major differences between mobile wallet and UPI
Configure security settings in mobile wallets
Use Strong Authentication:
Enable biometric authentication (fingerprint or facial recognition) if your device supports it. This adds an extra layer of security.
Set a strong PIN or password for your mobile device and enable the option to lock your device after a short period of inactivity.
Keep Software Updated:
Regularly update your mobile wallet app to ensure you have the latest security patches and features.
Enable Two-Factor Authentication (2FA):
Some mobile wallets offer the option to enable two-factor authentication. This typically involves receiving a code on another
device or through SMS to confirm your identity when logging in or making transactions.
Enable Notifications:
Turn on transaction notifications so that you're alerted whenever a transaction occurs with your mobile wallet. This helps you
quickly identify any unauthorized activity.
Use Secure Wi-Fi Connections:
Avoid using public Wi-Fi for financial transactions. If you need to make a transaction, use a secure, private Wi-Fi connection or
your mobile data.
Set Spending Limits:
Some mobile wallets allow you to set spending limits for added security. This can help prevent large or unauthorized
transactions.
Regularly Check Your Transactions:
Periodically review your transaction history to ensure that all transactions are legitimate. If you notice any suspicious activity,
report it to your mobile wallet provider immediately.
Enable Remote Wipe/Find My Device:
Ensure that your mobile device has remote wipe and tracking capabilities in case it's lost or stolen. This allows you to remotely
erase sensitive data and locate your device.
Secure Your Mobile Device:
Install and regularly update a reputable antivirus and anti-malware app on your mobile device to protect against malicious
software.
Be Cautious with Third-Party Apps:
Only download mobile wallet apps from official app stores to reduce the risk of installing malicious software. Be cautious
about granting unnecessary permissions to apps.
Secure Your Backup and Recovery Options:
If your mobile wallet supports backup and recovery options, make sure they are secure. Use strong, unique passwords for
recovery and backup processes.
Configure security settings in UPIs
Secure Your UPI PIN:
The UPI PIN is a crucial security element. It is required to authorize transactions. Choose a strong UPI PIN and
do not share it with anyone. Avoid using easily guessable PINs, such as your birthdate or simple combinations.
Enable App Lock:
Many UPI apps allow you to set an additional app lock, which requires a password, PIN, or biometric
authentication to open the app. Enable this feature for an extra layer of security.
Biometric Authentication:
If your mobile device supports biometric authentication (fingerprint or facial recognition), enable it for the UPI
app. This adds an extra layer of security to your transactions.
Secure Your Mobile Device:
Keep your mobile device's operating system and the UPI app itself up-to-date. Install security updates regularly
to patch any vulnerabilities.
Use Trusted Apps:
Download the UPI app only from official app stores. Avoid installing apps from unknown sources to reduce the
risk of downloading malicious software.
Two-Factor Authentication (2FA):
Some UPI apps may offer two-factor authentication options. Enable them if available, as they
provide an additional layer of security.
Transaction Limits:
Set transaction limits based on your comfort level. Some UPI apps allow you to set daily or
per-transaction limits. Adjust these according to your preferences to prevent large or
unauthorized transactions.
Check Transaction History:
Regularly review your UPI transaction history. If you notice any suspicious or unauthorized
transactions, report them to your bank immediately.
Secure Your Mobile Number:
Ensure that the mobile number linked to your UPI account is secure. If you change your
mobile number, update it in the UPI app and inform your bank.
Educate Yourself:
Stay informed about the latest security features and best practices provided by your
UPI app and bank. They may introduce new security measures, and being aware of
them is essential.
Be Wary of Phishing:
Be cautious about clicking on links or responding to messages claiming to be from your
UPI provider. Always use the official app or website to access your UPI account.
Log Out After Transactions:
Log out of the UPI app after completing transactions, especially if you are using a
shared device.
Net banking
• NetBanking, short for Internet Banking, refers to the use of banking
services and transactions conducted over the internet.
• It allows customers to perform various financial transactions and access
banking services using a computer or mobile device connected to the
Internet.
• NetBanking has become a convenient and widely used method for
managing personal and business finances.
Advantages of netbanking
Convenience: NetBanking allows users to perform various banking transactions from the comfort of their
homes or any location with internet access. This eliminates the need to visit a physical bank branch.
24/7 Access: Users can access their accounts and conduct transactions at any time, including weekends
and holidays. This flexibility is especially beneficial for individuals with busy schedules.
Time-Saving: Online banking significantly reduces the time required for financial transactions. Users can
complete tasks quickly, such as transferring funds, paying bills, and checking account balances.
Cost-Efficiency: Many netbanking services have lower transaction fees and operating costs compared to
traditional in-person banking methods. This can result in cost savings for both customers and banks.
Instant Transactions: Certain transactions, such as fund transfers between accounts, are processed
instantly, providing immediate access to funds for the recipient.
Real-Time Monitoring: Users can monitor their account activities in real-time. This instant visibility enhances financial
awareness and helps users detect and address any unauthorized transactions promptly.
Paperless Statements: NetBanking reduces the need for paper statements, as users can access electronic statements online.
This contributes to environmental conservation and reduces paperwork.
Mobile Accessibility: Many banks provide dedicated mobile apps, allowing users to perform banking activities on their
smartphones or tablets. This mobile accessibility adds to the convenience of NetBanking.
Flexibility: Users can manage multiple accounts, including checking, savings, and credit cards, from a single online platform. This
centralized approach simplifies financial management.
Online Banking Rewards: Some banks offer rewards programs or cashback incentives for using their NetBanking services,
providing additional benefits to users.
Security Features: NetBanking platforms incorporate robust security measures, such as encryption, secure login credentials, and
multi-factor authentication, to protect users' financial information.
Remote Account Management: Users can update personal information, set up automatic payments, and perform other account
management tasks without visiting a physical branch.
Disadvantages
Security Concerns:
One of the primary concerns is the risk of security breaches. Phishing attacks, malware, and
unauthorized access can compromise sensitive financial information if users are not vigilant.
Technology Dependence:
NetBanking relies on stable internet connections and technology. Users may face difficulties if they
experience internet outages or if they are not comfortable using digital devices.
Limited Services:
While many transactions can be completed online, some complex services or specific transactions
may still require a visit to a physical bank branch.
Technical Issues:
Technical glitches, server downtimes, or maintenance periods can disrupt online banking services.
Users may experience difficulties accessing their accounts during such incidents.
Limited Cash Transactions:
NetBanking primarily deals with digital transactions, and users may face limitations when it comes to
depositing or withdrawing physical cash directly through online platforms.
Accessibility Challenges:
In some regions, especially rural areas, access to the internet and digital devices may be limited. This can create challenges for
individuals who rely on traditional banking methods.
Learning Curve:
Older individuals or those less familiar with technology may find it challenging to adapt to online banking platforms, leading to
potential user errors.
Privacy Concerns:
Users may have concerns about the privacy of their personal and financial information stored online. Trust in the security measures
of the bank's online platform is crucial.
Transaction Limits:
Some transactions may have limits imposed by the bank, affecting the amount of money that can be transferred or withdrawn in a
single transaction.
Dependence on Third-Party Providers:
Online banking platforms often rely on third-party service providers for certain functionalities. Any issues with these providers can
impact the overall performance of NetBanking services.
Dependence on Mobile Devices:
Mobile banking apps are convenient, but they also introduce dependencies on smartphones and tablets. Users may face challenges
if their mobile devices are lost, stolen, or malfunction.
Data Breach Risks:
In the event of a data breach at the bank or the online banking platform, users' personal and financial information may be at risk.
Checklist for secure net banking
1. Secure Passwords:
1. Use a strong, unique password for your net banking account.
2. Avoid easily guessable passwords like birthdays or common words.
3. Include a mix of uppercase and lowercase letters, numbers, and special characters.
4. Change your password regularly.
2. Two-Factor Authentication (2FA):
1. Enable two-factor authentication if your bank provides this option.
2. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your mobile
device.
3. Secure Access:
1. Access your net banking only from secure and trusted devices.
2. Avoid using public computers or unsecured Wi-Fi networks for banking transactions.
4. Up-to-Date Antivirus Software:
1. Install and regularly update antivirus and anti-malware software on your devices.
2. Run regular scans to detect and remove any malicious software.
5. Secure Connection (HTTPS):
1. Ensure that the bank's website uses a secure connection (HTTPS).
2. Look for the padlock icon in the address bar to verify the site's security.
6. Secure Browsing Practices:
1. Avoid clicking on suspicious links or pop-ups.
2. Type the bank's website URL directly into your browser or use a bookmark.
3. Be cautious of phishing emails and never provide sensitive information through email links.
7. Monitor Account Activity:
1. Regularly review your account statements and transaction history.
2. Report any unauthorized transactions to your bank immediately.
8. Logout:
1. Always log out of your net banking session, especially when using public computers.
2. Close the browser window after logging out.
9. Secure Mobile Banking:
1. If using a mobile banking app, ensure it is from a legitimate source (official app store).
2. Set up a screen lock on your mobile device for an additional layer of security.
10. Secure Communication:
1. If you receive emails or calls claiming to be from your bank, verify their authenticity by contacting the bank
directly using official contact information.
11. Update Contact Information:
1. Keep your contact information, especially your email and phone number, up to date with your bank to
receive important alerts and notifications.
12. Educate Yourself:
1. Stay informed about the latest security threats and best practices for online banking security.
13. Secure Document Storage:
1. Keep physical and digital copies of your important banking documents in a secure location.
14. Bank's Official App/Website:
1. Use only the official website or mobile app of your bank for net banking.