Types of Compensation

The term ‘compensation’ refers to all forms of financial returns and tangible benefits that employees receive as part of the employment relationship.

In the era of globalization, where the business environment has become increasingly complex and challenging, structuring an effective compensation package to attract and retain talent is an important function of organizational effectiveness.

Compensation may achieve several purposes assisting in recruitment, job performance, and job satisfaction.

In other words we can say that Compensation is the process of providing adequate, equitable and fair remuneration to the employees.

Compensation can be classified into two categories:

  • Financial Compensation
  • Non-Financial Compensation
  1. Financial Compensation

Financial compensation is most popular and important compensation that is given in the form of money. It is the most important motivational factor that satisfies employees’ basic needs like food, clothing, etc.

It is further categorized into two parts:

  1. Direct Compensation

Direct compensation means compensating employees by paying them money in the following forms:

  • Wages: Wages means remuneration paid in cash for the work performed by an employee.
  • Bonus: Bonus means extra cash paid to an employee for exceeding his performance or on completion of specified project or target.

Other financial incentives that are directly given to employees in the form of cash.

  1. Indirect Compensation (Fringe Benefits)

Indirect compensation as the indirect financial and non- financial payments employees receive for continuing their employment with the company which are an important part of every employee’s compensation. Other terms such as fringe benefits, employee services, supplementary compensation and supplementary pay are used.

Armstrong says indirect compensation or employee benefits are elements of remuneration given in addition to the various forms of cash pay. They also include items that are not strictly remuneration such as annual holidays.

Management uses it ostensibly to facilitate its recruitment effort or influence the potential of employees coming to work for a company, influence their stay or create greater commitment, raise morale, reduce absenteeism in general and improve the strength of the organization by instituting a comprehensive programme in this area.

According to Chhabra, indirect or supplementary compensation involves ‘fringe benefits’ offered through several employee services and benefits such as housing, subsidized food, medical aid, creches and so on. It involves rewards provided by organizations to employees for their membership, attendance or participation in the organization.

Because of the increasing costs of fringe benefits, some people also label them as ‘hidden payroll.’ Benefits currently account for almost 40 per cent of the total compensation costs for each employee. The basic purpose of fringe benefits or supplementary compensation is to attract and maintain efficient human resources within the organization and to motivate them.

Types of Indirect Compensation

Below are some of the more popular indirect compensations offered by today’s organizations

(i) Social Security

This is a federally administered insurance system. According to law, both employer and employee must pay into the system, and a certain percentage of the employee’s salary is paid up to a maximum limit. How much is paid by employer and employee is calculated on the average monthly wage (weighted towards the later years). It is provided mainly to give financial security to employees when they retire.

(ii) Workers’ Compensation

It is meant to protect employees from loss of income and to cover extra expenses associated with job-related injuries or illness. The laws generally provide for replacement of lost income, medical expenses, rehabilitation of some sort of death benefits to survivors, and lump-sum disability payments.

(iii) Retirement Plans

Retirement and pension plans, which provide a source of income to people who have retired, represent money paid for past services. Private plans can be funded entirely by the organization or jointly by the organization and the employee during the time of employment.

One popular form of pension plan is the defined-benefit plan. Under this plan, the employer pledges to provide a benefit determined by a definite formula at the employee’s retirement date. The other major type of retirement plan is the defined contribution plan, which calls for a fixed or known annual contribution instead of a known benefit.

(iv) Paid Holidays

These comprise Christmas Day, New Year’s Day, Independence Day, Labour Day, etc. One relatively new concept is the floating holiday, which is observed at the discretion of the employee or the employer.

Another relatively new concept is referred to as personal time-off or personal days. Under this concept, organizations give employees a certain number of days with pay to attend to personal affairs. Normally these days can be taken at the employee’s discretion.

(v) Paid Vacations

Typically, an employee must meet a certain length-of-service requirement before becoming eligible for paid vacation. The time allowed for paid vacations generally depends on the employee’s length of service.

Unlike holiday policies that usually affect everyone in the same manner, vacation policies may differ among categories of employees. Most organizations allow employees to take vacation by the day or week but not in units of less than a day.

(vi) Other Benefits

Organizations may offer a wide range of additional benefits, including food services, exercise facilities, health and first-aid services, financial and legal advice, and purchase discounts. The extent and attractiveness of these benefits vary considerably among organizations. For example, purchase discounts would be especially attractive to employees of retail store or an airline.

  1. Non-Financial Compensation

Non-financial compensation refers to compensating employee not in form of money but in some other forms that stimulate employees’ morale and also improve his performance.

It can be in the following forms:

  • Job security
  • Recognition
  • Participation
  • Pride in job
  • Delegation of responsibility
  • Other incentives

Types of Compensation: Prevalent in the Indian Industries

The basic types of compensation prevalent particularly in the Indian industries are:

  • Basic pay
  • Dearness or cost of living allowance
  • Incentive payments
  • Performance-based remuneration
  • Bonus
  • Fringe benefits and miscellaneous cash allowances.
  1. Basic Pay

Basic pay universally constitutes the most important component of compensation. However, there are variations in the manner in which basic pay is determined and paid. It may be on daily, weekly or monthly basis. In India, under the Minimum Wages Act, 1948, both the central and state governments have fixed minimum daily rates of wages for a large number of sweated employments.

In the U.S.A., U. K. and France, there has been the practice of fixing hourly rates of wages for several categories of workers. In the organised sectors in India, the practice of prescribing monthly basic rates of wages under wage scales with provision of annual increments is widely prevalent.

Basic wages are significant for workers for a variety of reasons. Generally speaking, most other cash allowances made available to workers, such as dearness allowance, house rent allowance, city compensatory allowance, medical allowance and so on, are linked with the quantum of basic wages. Besides, contributions to social security funds such as provident and pension funds, gratuity and certain cash allowances are often linked to basic wages.

The quantum of basic pay is also taken into account in determining the scales of certain fringe benefits, such as housing accommodation, and travelling and leave travel allowances. Overtime payments for additional hours worked are also usually based on basic pay.

  1. Dearness or Cost of Living Allowance

Dearness allowance or cost of living allowance, separate and distinct from basic pay, has been an important component of compensation in industrial and governmental employments in India and a number of Asian countries. The basic purpose behind the provision of dearness allowance is to offset the rise in prices of consumption goods and to protect the real wages from being encroached by price rise.

Starting during the Second World War period on a temporary and experimental basis, the system has become a permanent feature of the wage structure in Indian industries and governmental and semi-governmental employments.

In general, the quantum of dearness allowance payable to industrial workers as well as government and semi-government employees is linked with the fluctuations in the Consumer Price Index Numbers for industrial workers worked out by Labour Bureau, Ministry of Labour, and Government of India, which has been engaged in the task since 1946.

The specific schemes for the determination of D.A. have considerably varied from time to time. In its earliest form, flat rates on a graduated basis without any linkage to CPI numbers were prevalent. Subsequently, calculation of D.A. came to be made with reference to rise or fall in the CPI numbers calculated by either the central or state governments.

Initially, the percentage of neutralisation for the rise in prices was higher in low wage brackets tapering off gradually when wages rose. Later, a more or less consistent formula providing for neutralisation for rise in prices on a common percentage basis emerged for government and semi-government employees. However, the industrial establishments have their own separate schemes generally worked out on the basis of negotiations.

In many countries such as the U.S.A. and Australia, there are schemes of automatic revision of basic rates of pay when prices rise above the specified level. Many collective agreements in the U.S.A. contain escalator clauses to avoid frequent bargaining for revision of wage rates.

  1. Incentive Payments

In a number of industrial undertakings, employees are in receipt of incentive payments. These incentive schemes are generally directly related to the quantum, and in some cases, to the quality of goods produced by individual employees or a group of them. The specific schemes vary from organization to organization, and with different sets of employees in the same organization.

There are schemes, such as the straight piece-rate system, in which the earnings of employees vary in the same proportion as increase in output. In many schemes, incentive payments are lower than the proportion of increase in output. There are also schemes in which incentive payments are higher in proportion to the increase in output. In a number of schemes, incentive payments vary in different proportions at different levels of output. Performance based remuneration described below may also be considered incentive payment.

  1. Performance Based Remuneration

During more recent years, especially after the onset of globalization and competition, many categories of employees, particularly managerial and supervisory personnel, have been receiving performance based remuneration.

Such a remuneration is worked out on the basis of the outcome of performance appraisal of individual employees, which takes into account the level of their performance in such areas as extent of improvement in the quantity and quality of products or services, acquisition of skills and capabilities, regularity of attendance, relationship with co-employees, capacity to face challenging situations and extent of commitment to work.

The specific schemes of performance appraisal vary from organization to organization and different sets of personnel in the same organization. Based on performance appraisals, individual employees are allotted specific grades, and are remunerated and given inducements based on their performance. Performance appraisal also constitutes key to decisions in other areas of HRM such as promotion, transfer, demotion and even separation.

  1. Bonus

Employees in a large number of industrial establishments in India have been in receipt of profit- sharing bonus. Initially, the practice of giving bonus to industrial workers started on an ad hoc basis primarily at the discretion of employers. However, during the course of time, it became a major bone of contention between employers and workmen, often resulting in industrial unrest and work stoppages.

Many disputes on the question of bonus came up for decision by industrial tribunals and even Supreme Court. In view of the mounting and regular unrest over the question, the Payment of Bonus Act was enacted in 1965. The Act specifies in some detail the formula for the calculation of bonus, and prescribes both the minimum and maximum bonus payable to specified categories of workers.

  1. Fringe Benefits and Miscellaneous Cash Allowances

Apart from wages and salaries, incentive payments, dearness allowance and bonuses, employees are often in receipt of several types of indirect compensation or fringe benefits, both in cash and kind.

These include housing facilities and house rent allowance, city compensatory allowance, leave-travel facilities, medical facilities and allowances, educational facilities and allowances for the children of employees, social security benefits such as sickness benefit, provident fund, gratuity and pension, concessional availability of electricity and food-grains, transport facilities, supply of uniforms and so on.

The nature and scale of fringe benefits vary widely from organization to organization. To the employer, they are a part of labour cost. In many organizations, they constitute a substantial portion of labour cost, surpassing even the wage bill.

Many of these fringe benefits are made available to employees voluntarily by the employers; many have been the outcome of collective agreements and many others have been statutorily imposed. Many employers, owning large-scale industrial establishments and also those having their establishments in remote and isolated areas, provide housing accommodation to their employees and have also established well-equipped hospitals and dispensaries.

Gary Dessler and Biju Varkkey have preferred to keep various forms of compensation into two main categories direct financial payments such as wages, salaries, incentives, commission and bonuses, and indirect financial payments such as employer-paid insurance and leave travel concessions. Joseph J. Martocchio has classified seven types of monetary or core compensation in the context of practices in the U.S.A.

These are as follows hourly pay, annual salary, cost of living adjustments, seniority pay, merit pay, incentive pay and person-focused pay, pay-for-knowledge and skill-based pay. Practices in regard to forms of compensation or their combinations vary from organisation to organisation depending on a set of internal and external factors.

Performance Standards

Performance Standards are the establishment of organizational or system standards, targets, and goals to improve public health practices.  Standards may be set based on national, state, or scientific guidelines, benchmarking against similar organizations, the public’s or leaders’ expectations, or other methods.

Developing Performance Standards

While performance elements tell employees what they have to do, the standards tell them how well they have to do it. The first article in this series defined and reviewed the characteristics of critical, non-critical, and additional performance elements. This article reviews the principles of writing good standards that can be used effectively to appraise employee performance of those elements.

A performance standard is a management-approved expression of the performance threshold(s), requirement(s), or expectation(s) that must be met to be appraised at a particular level of performance. A Fully Successful (or equivalent) standard must be established for each critical element and included in the employee performance plan. If other levels of performance are used by the appraisal program, writing standards for those levels and including tem in the performance plan is not required by is encouraged so that employees will know what they have to do to meet standards higher than Fully Successful.

Example of Performance Standards for PA Positions

(i) Develops project objectives, budgets, work plans and implementation strategies:

  • Consistent with departmental goals
  • Communicates clearly to all levels
  • Falls within budget guidelines
  • Can reasonably be accomplished in specified time frame
  • Follows up and resolves problems in timely manner to keep project on track.

(ii) Analyzes synthesizes and communicates financial information and data in complex account structures; uses data to develop budget and financial plans:

  • Uses appropriate sources of information
  • Uses the most recent data
  • Meets specified deadlines
  • Conclusions and recommendations are justified by the data
  • Federal, state and university guidelines are followed

(iii) Designs/develops and negotiates contracts with clients and vendors:

  • Contracts are clear, complete and reflect the needs of the unit
  • Negotiation skills are such that the best value is achieved for the institution
  • Solutions are effective and mutually acceptable
  • Good client and vendor relationships are maintained
  • Contracts are consistent with all federal, state and university policies and procedures

(iv) Develops policies and/or interprets and implements all federal, state, local and university policies, procedure and regulations:

  • Policies are clearly written and include all necessary components
  • All pre-approval steps have been followed to include necessary in-put from concerned parties
  • Sufficient research is conducted to provide accurate background knowledge necessary to the process of development and/or interpretation
  • Communication regarding policies is done in a timely manner to all affected groups and in an unambiguous, customer friendly manner

(v) Performs management duties with accountability and authority for the strategic direction of the department:

  • Planning, budget, staffing, resource allocation, policy development, staff supervision, etc.
  • The unit is in compliance with governmental and university policies and procedures
  • Staff morale remains high
  • Complaints about personnel, leadership and work of department are minimal
  • Organizational goals are achieved in timely manner

(vi) Assists students with academic problems and/or advises students regarding degree requirements:

  • Works with students in a customer oriented manner
  • Gives accurate information
  • Keeps updated on requirement changes and keeps students informed
  • Knows and utilizes resources to resolve problems

Implementing e-Business Security

Security is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith in e-business if its security is compromised. Following are the essential requirements for safe e-payments/transactions:

  • Confidentiality: Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
  • Integrity: Information should not be altered during its transmission over the network.
  • Availability: Information should be available wherever and whenever required within a time limit specified.
  • Authenticity: There should be a mechanism to authenticate a user before giving him/her an access to the required information.
  • Non-Repudiability: It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt.
  • Encryption: Information should be encrypted and decrypted only by an authorized user.
  • Auditability: Data should be recorded in such a way that it can be audited for integrity requirements.

Measures to ensure Security

Major security measures are following:

  • Encryption: It is a very effective and practical way to safeguard the data being transmitted over the network. Sender of the information encrypts the data using a secret code and only the specified receiver can decrypt the data using the same or a different secret code.
  • Digital Signature: Digital signature ensures the authenticity of the information. A digital signature is an e-signature authenticated through encryption and password.
  • Security Certificates: Security certificate is a unique digital id used to verify the identity of an individual website or user.

Secure Electronic Transaction

It is a secure protocol developed by MasterCard and Visa in collaboration. Theoretically, it is the best security protocol. It has the following components:

  • Card Holder’s Digital Wallet Software: Digital Wallet allows the card holder to make secure purchases online via point and click interface.
  • Merchant Software: This software helps merchants to communicate with potential customers and financial institutions in a secure manner.
  • Payment Gateway Server Software: Payment gateway provides automatic and standard payment process. It supports the process for merchant’s certificate request.
  • Certificate Authority Software: This software is used by financial institutions to issue digital certificates to card holders and merchants, and to enable them to register their account agreements for secure electronic commerce.

6 e-commerce security strategies

Install HTTPS protocols

These protocols have increased their popularity in recent years, compared to traditional HTTP, more vulnerable than HTTPS. The HTTPS protocol has been used normally in parts of the website intended for payments, due to the need to armor the information of customers and companies.

At present, however, the use of these protocols has become widespread. Now they are needed in the entire website, which has condemned the old HTTP protocols to ostracism, so to speak.

Parallel to these protocols, it is also essential to install SSL certificates (secure sockets layer), responsible for protecting data in transit during the payment process. In addition, the installation of HTTPS servers has a positive effect on user confidence during navigation.

Implements CVV and AVS verification systems

Payment processing is one of the most sensitive aspects of e-commerce cybersecurity. Businesses should exercise extreme caution, especially when credit or debit cards are involved.

Requiring the CVV (Card Verification Value) code is a highly recommended practice. And it is for two reasons:

  • Increase security in online payments. Requiring CVV codes makes it much more difficult to process a fraudulent transaction.
  • Cybercriminals may have stolen a credit card number, but not the physical card (although this last scenario is possible, it is very minority).

Perform periodic backups

This is another of the most effective e-commerce security strategies. And it certainly doesn’t require hiring industry professionals.

Simply install UpdraftPlus, BackupBuddy, BoldGrid Backup, BackWPup, and other security plugins and make regular copies of e-commerce databases. It is extremely important to make regular backups of your site’s data. Among the biggest threats to our e-commerce are not only malware or phishing. There is also human error.

While there are ways to manually back up your data, it’s easy to forget or stop doing so systematically. Consequently, the use of plugins and backup tools is required to shield databases and all sensitive e-commerce information.

Use of multilayer security or Multi-Layered

Multilayered security means the use of different measures, such as the installation of a firewall, which provides an initial defense against cyber threats.

In addition, the use of a CDN (content delivery network) allows an extra layer of security to be added, since this system diversifies the copies of data in several geographical points.

This measure is also useful for preventing DDoS (denial-of-service attack) attacks. Without a doubt, one of the most important e-commerce security strategies.

Performs transaction monitoring

What are the best e-commerce security strategies?

When we talk about monitoring transactions, you may imagine a group of professionals locked in a room full of screens and computer equipment, reviewing each transaction online. This is not necessary! Setting up alerts for suspicious movements in transactions is enough.

One of the most popular is to block a transaction when the billing and shipping addresses do not match. This is an anomaly that could hide some kind of fraud or credit card theft.

Avoid storing credit/debit card information

Beyond e-commerce security and encryption techniques and tools, the best online stores use common sense to protect their customers.

The best way to avoid credit and debit card information leaks is to not store them. We know: credit card numbers and customer names are essential to facilitate quick payment. However, it is not necessary to store them on online servers.

Today, moreover, such storage would violate the rules set out in the PCI standards. The loss of this information not only compromises the reputation of e-commerce users: it also puts financial institutions and companies at risk.

An excellent alternative is to use payment gateways such as PayPal, WePay, Skrill, Stripe or Authorize.net. In this way, sensitive information will be the responsibility of these platforms, which also have better security protocols than conventional e-commerce.

Encryption, Types, Benefits, Challenges

Encryption is a security technique that converts readable data (plaintext) into an unreadable format (ciphertext) using algorithms and encryption keys. It ensures that sensitive information, such as passwords, credit card details, and personal data, remains secure during storage or transmission over networks like the internet. Only authorized parties with the correct decryption key can convert the ciphertext back to its original form. Encryption is a core element of cybersecurity and e-commerce security, protecting data from hackers, identity thieves, and unauthorized access. Common encryption types include symmetric encryption (same key for encryption and decryption) and asymmetric encryption (public and private keys).

Types of Encryption:

  • Symmetric Encryption

Symmetric encryption uses a single key for both encryption and decryption of data. The sender encrypts the data with the key, and the receiver uses the same key to decrypt it. It is fast, efficient, and suitable for encrypting large volumes of data. However, its main challenge lies in securely sharing the key between parties, as interception can compromise security. Popular symmetric encryption algorithms include AES (Advanced Encryption Standard), DES (Data Encryption Standard), and 3DES (Triple DES). Symmetric encryption is widely used in database encryption, file protection, and secure communications where speed is a priority and key management is well-handled.

  • Asymmetric Encryption

Asymmetric encryption uses a pair of keys — a public key for encryption and a private key for decryption. The public key can be shared openly, while the private key remains secret. This method enhances security since even if the public key is intercepted, the private key is required to decrypt the data. Asymmetric encryption is slower than symmetric encryption but offers more secure key distribution. Common algorithms include RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). It is often used for digital signatures, secure email, SSL/TLS certificates, and encrypting small amounts of data, such as symmetric keys in hybrid encryption systems.

  • Hashing

Hashing is a one-way encryption technique that converts input data into a fixed-length string called a hash value or digest. It cannot be reversed to obtain the original data, making it ideal for storing sensitive information like passwords. Even small changes in the input produce drastically different hash values. Hashing is used in data integrity verification, digital signatures, and authentication systems. Popular hashing algorithms include MD5 (Message Digest 5), SHA-1 (Secure Hash Algorithm 1), and SHA-256. While hashing ensures integrity, it is vulnerable to brute force and collision attacks, which can be mitigated using techniques like salting and stronger algorithms.

  • Hybrid Encryption

Hybrid encryption combines the strengths of symmetric and asymmetric encryption for improved performance and security. In this method, asymmetric encryption is used to securely exchange a symmetric key, and symmetric encryption is then used to encrypt the actual data. This approach ensures secure key distribution while maintaining high-speed data encryption. Hybrid encryption is commonly used in secure web communications (HTTPS), email encryption, and online transactions. For example, in SSL/TLS protocols, RSA or ECC encrypts the symmetric session key, and AES encrypts the data. This method balances speed and security, making it suitable for modern e-commerce and cloud communication systems.

Benefits of Encryption:

  • Data Confidentiality

Encryption ensures that sensitive information remains private and inaccessible to unauthorized users. By converting readable data (plaintext) into an unreadable format (ciphertext), only those with the correct decryption key can access it. This prevents hackers, cybercriminals, or unauthorized individuals from interpreting stolen data. Confidentiality is crucial in industries like banking, healthcare, and e-commerce, where customer trust depends on secure data handling. Even if data is intercepted during transmission or stolen from storage, encryption keeps it safe from exploitation. This benefit is especially important for protecting personal, financial, and corporate information in the age of rising cyber threats.

  • Data Integrity

Encryption safeguards the accuracy and completeness of data by preventing unauthorized modifications. While encryption itself does not directly detect changes, when combined with hashing or digital signatures, it ensures that the data received is exactly as intended. Any alteration during storage or transmission makes the data unreadable or invalid. This is essential for maintaining trustworthy transactions, secure file sharing, and legal document protection. Integrity is especially important in financial systems, government communications, and e-commerce, where even small changes can lead to significant errors or fraud. Encryption thereby strengthens trust and reliability in digital information exchange and storage.

  • Secure Data Transmission

Encryption protects data as it travels across networks, ensuring it remains safe from interception and eavesdropping. This is critical in online banking, shopping, and communication platforms where sensitive information like passwords, payment details, and personal messages are transmitted. Protocols like SSL/TLS rely on encryption to secure web traffic between browsers and servers. Without encryption, transmitted data could be captured and misused by hackers using packet sniffing tools. By converting the information into ciphertext, encryption ensures that even if intercepted, the data is meaningless to attackers, providing a safe communication channel for individuals and businesses.

  • Regulatory Compliance

Many industries are legally required to protect customer data using encryption to comply with privacy and security regulations. Laws like the GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), and PCI DSS (Payment Card Industry Data Security Standard) mandate encryption for sensitive personal, medical, and financial data. Non-compliance can result in severe legal penalties, financial losses, and reputational damage. By implementing encryption, organizations meet these standards, demonstrate due diligence, and build trust with customers and partners. Compliance also helps businesses expand globally by adhering to international security norms and protecting cross-border data transfers.

  • Protection Against Data Breaches

Encryption acts as a strong defense mechanism against data breaches. Even if cybercriminals manage to steal databases or intercept files, the encrypted data is useless without the decryption key. This drastically reduces the risk of financial loss, identity theft, and corporate espionage. Many high-profile breaches have shown that unencrypted data leads to severe consequences for businesses and customers. With encryption in place, organizations can limit the damage caused by security incidents and assure stakeholders that sensitive data remains secure. This protective layer is vital in today’s environment, where cyberattacks are increasingly sophisticated and persistent.

  • Trust and Customer Confidence

When businesses use encryption to protect customer data, they enhance trust and loyalty. Customers are more likely to engage with organizations that prioritize security, especially when sharing personal or financial details. Encrypted communications and transactions reassure clients that their information is safe from hackers and fraudsters. This trust translates into stronger brand reputation, higher customer retention, and a competitive advantage in the market. In e-commerce, banking, and healthcare, encryption is not just a technical safeguard but also a business asset. Demonstrating strong encryption practices can also serve as a marketing point, showcasing the company’s commitment to security.

Challenges of Encryption:

  • Performance Overhead

Encryption processes consume computational resources, including CPU power and memory. Strong encryption algorithms, while more secure, require greater processing time for encryption and decryption. This can slow down data transfers, reduce application responsiveness, and increase server workload, especially in high-traffic systems. For businesses managing large-scale transactions, the added latency may negatively affect user experience. In resource-constrained environments, such as mobile devices or IoT systems, performance issues are even more pronounced. Optimizing encryption without compromising security becomes a key challenge, particularly when balancing speed, usability, and robust data protection in time-sensitive applications.

  • Key Management Complexity

Encryption’s effectiveness heavily depends on secure key management. Storing, distributing, and rotating encryption keys without exposing them is challenging. If keys are lost, encrypted data may become permanently inaccessible; if stolen, security is compromised. Organizations must establish strict key lifecycle management policies, use hardware security modules (HSMs), and maintain secure backup processes. In large enterprises with multiple systems and users, key synchronization and revocation can be complex. Additionally, ensuring compliance with industry standards like PCI DSS or GDPR adds another layer of administrative difficulty, making key management a critical yet vulnerable point in encryption systems.

  • Compatibility and Integration Issues

Different systems, devices, and software may use varied encryption protocols and formats. Ensuring compatibility between legacy systems and modern encryption methods can be complex. For instance, older applications might not support current cryptographic standards, requiring expensive upgrades or custom integration. Cross-platform communication also poses risks if encryption algorithms differ. Migrating data from one system to another may require decryption and re-encryption, increasing exposure risk. Furthermore, cloud services, third-party integrations, and IoT devices often have their own encryption policies, making seamless interoperability a challenge for maintaining consistent and secure encryption practices.

  • Regulatory and Compliance Challenges

Encryption practices are subject to national and international regulations. Some countries impose restrictions on encryption strength or require government-accessible backdoors, creating conflicts between legal compliance and data privacy. In regulated industries like finance and healthcare, encryption must align with specific standards such as HIPAA or PCI DSS, which require precise key lengths, storage protocols, and audit trails. Businesses operating globally must navigate different jurisdictional rules, sometimes redesigning encryption approaches for different markets. Compliance audits and documentation add to operational burdens, making it essential yet challenging to maintain encryption practices that satisfy all legal and regulatory requirements.

  • Cost and Resource Requirements

Implementing robust encryption involves costs beyond just software or algorithm deployment. Businesses may need to invest in advanced hardware like HSMs, employ specialized IT staff, purchase licenses for enterprise-grade encryption solutions, and maintain secure backup systems. Operational expenses also include regular security audits, updates, and compliance checks. For small to medium-sized enterprises, these costs can be significant, leading some to opt for weaker or partial encryption, thus increasing vulnerability. Balancing the budget with the need for strong, up-to-date encryption is an ongoing challenge, particularly as threats evolve and encryption standards become more demanding.

  • False Sense of Security

While encryption is a powerful tool, it is not a complete security solution. Over-reliance on encryption can lead organizations to neglect other critical security measures such as access control, network security, and regular patching. If attackers bypass encryption by exploiting software vulnerabilities, stealing keys, or using phishing attacks, the data remains exposed. Employees and decision-makers may mistakenly believe that encryption alone makes their systems impervious to threats, leading to reduced vigilance. True security requires encryption to be part of a multi-layered defense strategy, combined with monitoring, firewalls, and robust authentication systems.

Decryption

The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.

One of the reasons for implementing an encryption-decryption system is privacy. As information travels over the Internet, it is necessary to scrutinise the access from unauthorized organizations or individuals. Due to this, the data is encrypted to reduce data loss and theft. Few common items that are encrypted include text files, images, e-mail messages, user data and directories. The recipient of decryption receives a prompt or window in which a password can be entered to access the encrypted data. For decryption, the system extracts and converts the garbled data and transforms it into words and images that are easily understandable not only by a reader but also by a system. Decryption can be done manually or automatically. It may also be performed with a set of keys or passwords.

There are many methods of conventional cryptography, one of the most important and popular method is Hill cipher Encryption and Decryption, which generates the random Matrix and is essentially the power of security. Decryption requires inverse of the matrix in Hill cipher. Hence while decryption one problem arises that the Inverse of the matrix does not always exist. If the matrix is not invertible then the encrypted content cannot be decrypted. This drawback is completely eliminated in the modified Hill cipher algorithm. Also this method requires the cracker to find the inverse of many square matrices which is not computationally easy. So the modified Hill-Cipher method is both easy to implement and difficult to crack.

To encrypt a file or other information stored in a computer means to convert it into a secret code so that it can’t be used or understood until it is decoded or decrypted. You might want to encrypt a file if it contained a secret formula for a new invention, or some financial plans that your competitors would love to know about in advance. When you encrypt something, the computer will ask you to set up a password. After that, no one will be able to make sense of the information unless they have the same password.

Encryption hides your data from curious eyes. This is a process of encoding data to prevent unauthorized person from viewing or modifying it. The main features of data encryption are:

  1. Prevents unwanted access to documents and e-mail messages
  2. Strongest levels of encryption are very difficult to break.

Process and Types of Encryption

The process of data encryption consists of certain steps. The data passes through a mathematical formula called an algorithm, which converts it into encrypted data called ciphertext. These algorithms create a key and then encapsulate the message with this key.

There are two types of encryptions: asymmetric and symmetric.

Asymmetric Encryption

In public key (asymmetric) encryption, two mathematically-related keys are used: one to encrypt the message and the other to decrypt it. These two keys combine to form a key pair. Asymmetric encryption provides both data encryption and validation of the communicating parties’ identities and is considered more secure than symmetric encryption, but is computationally slower.

A public key encryption scheme has six major parts:

  1. Plaintext: This is the text message to which an algorithm is applied.
  2. Encryption Algorithm: It performs mathematical operations to conduct substitutions and transformations to the plaintext.
  3. Public and Private Keys: This is a pair of keys where one is used for encryption and the other for decryption.
  4. Cipher text: This is the encrypted or scrambled message produced by applying the algorithm to the plaintext message using key.
  5. Decryption Algorithm: This algorithm generates the ciphertext and the matching key to produce the plaintext.

The Encryption Process

The asymmetric data encryption process has the following steps:

  1. The process of encryption begins by converting the text to a pre-hash code. This code is generated using a mathematical formula.
  2. This pre-hash code is encrypted by the software using the sender’s private key.
  3. The private key would be generated using the algorithm used by the software.
  4. The encrypted pre-hash code and the message are encrypted again using the sender’s private key.
  5. The next step is for the sender of the message to retrieve the public key of the person this information is intended for.
  6. The sender encrypts the secret key with the recipient’s public key, so only the recipient can decrypt it with his/her private key, thus concluding the encryption process.

The Decryption Process

The asymmetric data decryption process has the following steps:

  1. The recipient uses his/her private key to decrypt the secret key.
  2. The recipient uses their private key along with the secret key to decipher the encrypted pre-hash code and the encrypted message.
  3. The recipient then retrieves the sender’s public key. This public key is used to decrypt the pre-hash code and to verify the sender’s identity.
  4. The recipient generates a post-hash code from the message. If the pos~-hash code equals the pre-hash code, then this verifies that the message has not been changed enroute.

Symmetric Encryption

Private Key encryption (Symmetric), also referred to as conventional or single-key encryption is based on secret key that is shared by both communicating parties. It enquires all parties that are communicating to share a common key. The sending party uses the secret key as part of the mathematical operation to encrypt (or encipher) plain text to cipher text. The receiving party uses the same secret key to decrypt (or decipher) the cipher text to plain text.

Examples of symmetric encryption schemes are the RSA RC4 algorithm (which provides the basis for Microsoft Point-to-Point Encryption (MPPE), Data Encryption Standard (DES), the International Data Encryption Algorithm (IDEA), and the Skipjack encryption technology proposed by the United S12; tesgovernment (and implemented in the Clipper chip).

An encryption scheme has five major parts:

  1. Plaintext: This is the text message to which an algorithm is applied.
  2. Encryption Algorithm: Performs mathematical operations to conduct substitutions and transformations to the plaintext.
  3. Secret Key: This is the input for the algorithm as the key dictates the encrypted outcome.
  4. Cipher text: This is the encrypted or scrambled message produced by applying the algorithm to the plaintext message using the secret key.
  5. Decryption Algorithm: This is the encryption algorithm in reverse. It uses the ciphertext, and the secret key to derive the plaintext message.

e-Business communication channels

Marketing is primarily about communication, and e-commerce communication is much more than merely a collection of words. To understand the communication process on an e-commerce website better, let us break it up into two primary categories:

Communicating Effectively Pre-Sales

Everything about your website constitutes your communication. Think about it this way: you are expecting the customer to transfer money to you with a few clicks with nothing in return for the time being. The actual product, in the case of physical products, is delivered later. That is such a giant leap of faith that it took a few years for customers to accept it in the mid to late 90s.

You have to make sure that your communication is effective, consistent, and builds confidence in the mind of the customer.

Communicating Effectively Post-Sales

The customer has already paid you money. So, you do not need to invest any serious money into communicating with them post-sales, right? Wrong!

With high expenses on pay per click, branding, and other marketing efforts, you need to develop a loyal following. Unless you have a significant proportion of repeat customers, you are not a serious e-commerce player.

Pre-sales issues such as price might be quite important. But post-sales the customer is only interested in the service she gets. This service could be in the form of:

  • When will my product be delivered?
  • How do I use my product?
  • How do I get my product repaired?
  • How do I buy accessories or consumables for my product?
  • Tools and Channels of Communication

As an e-commerce business, you should put in the effort to communicate the way the customers prefer. For instance, person A could be more of a telephone person who likes to talk and reach a solution. Person B could prefer to communicate only by email, while person C may prefer a live chat. Gaining an understanding of the many tools available to you will help you reach each client in the format they are most accustomed to using.

Live Chat

Some customers love the live chat feature. It has the benefits of getting the problem solved right now, without the irritation of keeping a telephone receiver pressed to your ear while waiting. Even when the waiting period lasts a few minutes for live chat, customers do not complain too much as they are able to continue performing a parallel task on the same computer. E-commerce professionals have shown a lot of hesitation in providing live chat, as it is very resource-intensive.

Email

Unlike live chat, which is an option, email support is an absolute must-have for any e-commerce player. In addition to providing an email address for support, it is recommended that you have a ticketing system, which allows for efficiently handling a case in case of multiple emails about the same issue.

Phone Support

Quite like live chat, phone support is also considered to be resource-intensive. But the demand for phone support is so high that most e-commerce players end up providing it.

Product Descriptions

Product descriptions are the most voluminous communication between the e-commerce merchant and the customer. Though product descriptions are not personalized they influence the customer to a great extent. To avoid me-too sites, it is important that you consider the possibility of having original product descriptions written for your website. In addition to adding value to the customer, original content also assists in SEO.

Advertisements

Your advertisements are one of the most expensive modes of communication. You do need to do the math to optimize your per click spends. However, do not let that cause you to overlook the basic message that your advertisements are communicating.

Blog

A blog presents an interesting platform for you to converse with your customers and prospects. In adding to the freshness of the site, a well-cultivated blog helps build credibility and trust.

User Generated

It is unanimously accepted that encouraging user engagement by permitting them to add their own content increases the stickiness of the site. This user-generated content could be in the form of buyer reviews, comments, queries, discussion boards, shared images, and videos.

Cryptography, Objectives, Types, Advantages, Disadvantages

Cryptography is the practice and study of securing communication and information through encoding techniques, ensuring that only authorized parties can access or understand the data. It involves converting plain text into unreadable ciphertext using algorithms and encryption keys, protecting it from unauthorized access, tampering, or theft. Cryptography plays a crucial role in securing sensitive information in digital transactions, emails, online banking, and data storage. It supports confidentiality, data integrity, authentication, and non-repudiation. Modern cryptography combines mathematics, computer science, and engineering to develop secure protocols and encryption standards, forming the backbone of cybersecurity in e-commerce, government, defense, and personal communications.

Objectives of Cryptography:

  • Confidentiality

Confidentiality ensures that information is accessible only to authorized individuals and remains hidden from unauthorized access. Cryptography achieves confidentiality by encrypting data so that even if it is intercepted, it cannot be understood without the correct decryption key. This is crucial for protecting sensitive information such as financial transactions, personal data, trade secrets, and classified documents. In e-commerce, confidentiality safeguards customer details like credit card numbers and addresses. Without confidentiality, data breaches could occur, leading to identity theft, fraud, or loss of trust. Encryption algorithms like AES and RSA are commonly used to maintain confidentiality in digital communication.

  • Integrity

Integrity ensures that information remains accurate and unaltered during transmission or storage. Cryptography provides integrity by using techniques like hashing and digital signatures to detect any modification in data. If the data is tampered with, the cryptographic verification will fail, alerting the recipient. In business and e-commerce, maintaining integrity is essential for preventing fraud and ensuring reliable communication. For example, a payment instruction must arrive exactly as it was sent without any changes. Integrity also builds trust in digital systems, ensuring that users can rely on the accuracy of messages, documents, or transactions received.

  • Authentication

Authentication verifies the identity of the parties involved in communication or a transaction. Cryptography enables authentication through mechanisms like digital certificates, digital signatures, and public key infrastructure (PKI). This ensures that data is exchanged only between verified and trusted entities. In online banking, for example, authentication confirms that the website belongs to the legitimate bank and not a fraudulent copy. It also allows users to prove their identity to the system securely, preventing impersonation or unauthorized access. Without authentication, attackers could easily pose as trusted parties, leading to phishing, fraud, or unauthorized transactions.

  • Non-Repudiation

Non-repudiation ensures that a sender cannot deny sending a message, and the recipient cannot deny receiving it. This is achieved using cryptographic techniques such as digital signatures, which provide undeniable proof of a message’s origin and authenticity. In legal and business transactions, non-repudiation is crucial for resolving disputes and enforcing accountability. For example, when a customer approves an online payment, digital records can prove the approval even if they later deny it. Non-repudiation is widely used in e-commerce, e-contracts, and secure email systems to ensure that all actions are verifiable and cannot be repudiated.

  • Access Control

Access control ensures that only authorized individuals or systems can access specific data, systems, or resources. Cryptography supports access control by integrating with authentication and authorization mechanisms to verify user identities and assign appropriate permissions. For example, encrypted login credentials and secure tokens ensure that only legitimate users can access confidential business files. In corporate environments, access control prevents unauthorized employees from viewing sensitive financial reports or customer data. By combining cryptographic techniques with role-based or multi-factor authentication systems, organizations can tightly regulate access to critical systems, reducing the risk of insider threats and external breaches.

  • Data Protection

Data protection aims to safeguard sensitive information from unauthorized access, modification, or destruction. Cryptography protects data both in transit and at rest by converting it into unreadable ciphertext, accessible only to those with the correct decryption key. This prevents hackers, competitors, or malicious insiders from exploiting confidential business information, personal data, or intellectual property. For example, encrypted databases in e-commerce platforms keep customer credit card details safe from cyberattacks. Data protection through cryptography also helps organizations comply with legal requirements such as GDPR, HIPAA, or PCI-DSS, ensuring trust and reducing the risk of costly data breaches.

Types of Cryptography:

  • Symmetric-Key Cryptography

Symmetric-key cryptography, also known as secret-key cryptography, uses the same key for both encryption and decryption of data. It is fast, efficient, and suitable for encrypting large amounts of data. However, its main challenge is securely sharing the key between sender and receiver, as interception could compromise the entire communication. Common symmetric algorithms include AES (Advanced Encryption Standard), DES (Data Encryption Standard), and Blowfish. This method is widely used in securing files, database encryption, and internal communications. While it offers high speed, its security depends heavily on protecting the secret key from unauthorized access or theft.

  • Asymmetric-Key Cryptography

Asymmetric-key cryptography, also called public-key cryptography, uses two different but mathematically related keys: a public key for encryption and a private key for decryption. This eliminates the need to share a secret key, reducing the risk of interception. It is widely used in digital signatures, SSL/TLS for secure web browsing, and secure email communication. Popular algorithms include RSA, ECC (Elliptic Curve Cryptography), and DSA (Digital Signature Algorithm). While more secure for key distribution, asymmetric encryption is slower than symmetric methods, making it less ideal for encrypting large datasets directly, but excellent for secure key exchange and authentication.

  • Hash Functions

Hash functions are a type of cryptography that transform input data into a fixed-size string of characters, known as a hash value or digest. They are one-way functions, meaning the original data cannot be reconstructed from the hash. Hashing is primarily used for data integrity verification, password storage, and digital signatures. Popular hash algorithms include MD5, SHA-1, and SHA-256. Since even a small change in input data produces a completely different hash, they are effective in detecting tampering. However, they do not provide confidentiality and must be combined with other encryption techniques for complete security.

Advantages of Cryptography:

  • Data Confidentiality

Cryptography ensures that sensitive information is only accessible to authorized parties. By converting plain text into unreadable ciphertext, it prevents unauthorized access during storage or transmission. Even if hackers intercept the data, without the decryption key, it remains useless. This is critical in banking, e-commerce, healthcare, and government sectors where private data must be protected from cyberattacks. Symmetric and asymmetric encryption methods both play a key role in maintaining confidentiality. With robust cryptographic algorithms like AES and RSA, organizations can significantly reduce the risk of data breaches and safeguard trade secrets, personal information, and classified documents effectively.

  • Data Integrity

Cryptography maintains the accuracy and consistency of information by detecting any unauthorized alterations. Techniques like hashing generate a unique fingerprint of data; if even a single bit changes, the hash output changes drastically. This ensures recipients can verify that the data has not been tampered with during transmission. Cryptographic integrity checks are widely used in file downloads, software updates, and blockchain systems. By combining hashing with digital signatures, organizations can validate the origin and authenticity of the message, protecting against corruption, malware injection, and manipulation by malicious actors. It is essential for legal, medical, and financial records.

  • Authentication

Cryptography verifies the identity of individuals, systems, or organizations involved in a communication process. Public key infrastructure (PKI) and digital certificates help prove that the sender is genuine and not an imposter. This is essential in online transactions, email security, and secure login systems. Digital signatures, created using private keys, ensure that a message or file originates from a trusted source. Authentication protects against identity theft, phishing, and impersonation attacks. By establishing trust between parties, cryptography builds confidence in digital interactions, ensuring that sensitive exchanges—like financial transactions or business agreements—occur only between verified, legitimate participants.

  • Non-Repudiation

Cryptography ensures non-repudiation, meaning that once a sender transmits data, they cannot deny sending it later. Digital signatures play a key role in achieving this by binding a message to the sender’s private key, which only they possess. If a dispute arises, the signature can be verified using the sender’s public key. This is crucial in legal agreements, online contracts, and e-commerce transactions, where proof of action is essential. Non-repudiation prevents fraud, protects contractual obligations, and ensures accountability in digital communications, making it a cornerstone for secure business operations, law enforcement, and governmental digital transactions worldwide.

  • Secure Communication

Cryptography enables safe data exchange over insecure channels like the internet. Encryption ensures that even if cybercriminals intercept the communication, they cannot interpret the information without the proper key. Protocols like SSL/TLS use cryptographic methods to secure websites, emails, and VoIP calls. This is vital for remote work, confidential negotiations, and transmitting sensitive corporate or military information. By safeguarding communications, cryptography also helps maintain privacy and prevents industrial espionage. Whether in instant messaging apps like WhatsApp or secure payment gateways, encryption forms the backbone of trusted online interactions, keeping conversations and transactions away from unauthorized surveillance.

  • Protection Against Cyber Threats

Cryptography is a key defense mechanism against a wide range of cyberattacks, including data breaches, phishing, ransomware, and man-in-the-middle attacks. By encrypting sensitive data, it limits the usefulness of stolen information to cybercriminals. Cryptographic methods also secure authentication processes, making it harder for attackers to gain unauthorized access. In addition, hashing protects stored passwords, and digital signatures verify software integrity to prevent malicious updates. With cyber threats becoming more advanced, organizations rely on cryptography as a foundational layer of their cybersecurity strategy, ensuring resilience against evolving hacking techniques and maintaining trust with customers and stakeholders.

Disadvantages of Cryptography:

  • High Computational Requirements

Strong cryptographic algorithms require significant processing power, which can slow down systems and applications. Encrypting and decrypting large volumes of data consumes CPU resources and increases latency, especially in real-time communication. This can be challenging for devices with limited hardware capacity, such as IoT devices or mobile systems. Asymmetric encryption, while more secure, is computationally heavier than symmetric encryption, making it less suitable for speed-critical operations. Organizations must invest in high-performance systems to handle encryption efficiently. This increases operational costs, particularly when securing high-traffic platforms like online banking, e-commerce, and large-scale corporate networks.

  • Key Management Challenges

Cryptography relies heavily on secure key storage, distribution, and rotation. Managing encryption keys becomes increasingly complex in large organizations with multiple users, systems, and applications. If keys are lost, encrypted data becomes irretrievable; if stolen, the security is compromised. Public key infrastructure (PKI) requires sophisticated management to ensure certificates are valid and up-to-date. Mishandling keys can nullify even the strongest encryption algorithms. The process of securely exchanging keys without interception in symmetric encryption also presents challenges. Poor key management practices have been at the root of many real-world data breaches, making this a critical concern in cybersecurity.

  • Vulnerability to Attacks

While cryptography strengthens security, it is not immune to attacks. Techniques like brute force, side-channel attacks, and cryptanalysis can exploit weaknesses in algorithms or key management. Outdated methods, such as MD5 or SHA-1, are no longer secure and can be broken with modern computing power. Social engineering and phishing can also bypass cryptographic safeguards by targeting human error. If encryption algorithms are poorly implemented, attackers can exploit vulnerabilities without breaking the encryption itself. This means cryptography must be regularly updated with strong, well-tested algorithms and implemented alongside other cybersecurity measures to remain effective against evolving threats.

  • Increased Cost of Implementation

Implementing strong cryptographic solutions requires significant investment in software, hardware, and skilled personnel. Organizations must purchase licenses for encryption tools, maintain secure key management systems, and train staff in cryptographic best practices. Regular updates, audits, and compliance with regulations like GDPR or HIPAA add further expenses. For small businesses, these costs can be prohibitive, leading to inadequate security. In addition, encrypting and decrypting large amounts of data can require advanced hardware accelerators. While the long-term benefits of encryption are substantial, the initial financial burden can be a deterrent for organizations with limited budgets.

  • Complexity for Users

From a user perspective, cryptography can introduce complexity in accessing or using systems. Long, complex passwords, multi-factor authentication, and secure key handling can be inconvenient for non-technical individuals. If the process is too cumbersome, users may bypass security measures, weakening the overall system. For example, employees might store encryption keys insecurely or share credentials to simplify work. User education is crucial, but even with training, human error remains a risk. Balancing usability with strong cryptographic protection is an ongoing challenge for system designers and IT security teams, as overly complex systems can harm productivity and compliance.

  • Risk of Data Loss

One of the biggest risks in cryptography is the loss of encryption keys or passwords. Without the correct key, encrypted data is impossible to recover, leading to permanent data loss. This is especially problematic in businesses where critical files, databases, or backups are encrypted. If keys are accidentally deleted, corrupted, or forgotten, even the rightful owner cannot access the information. This risk underscores the importance of secure and redundant key storage systems. While encryption protects against unauthorized access, it also creates the potential for irreversible loss if key management procedures are not strictly followed.

Virtual Private Network (VPN), Uses, Types, Components, Challenges, Applications

Virtual Private Network (VPN) is a secure technology that creates an encrypted tunnel between a user’s device and the internet, ensuring privacy and data protection. It hides the user’s IP address, making online activities anonymous and safeguarding against hackers, cybercriminals, and unauthorized surveillance. By routing traffic through remote servers, a VPN allows access to region-restricted content and prevents data interception on public Wi-Fi networks. Organizations use VPNs to provide employees with secure remote access to internal systems. VPNs ensure confidentiality, integrity, and secure communication over untrusted networks, making them vital for personal privacy, business security, and safe online browsing in today’s digital environment.

Uses of Virtual Private Network (VPN):

  • Secure Remote Access

A major use of VPNs is to provide secure remote access for employees working outside the office. Organizations configure VPNs to allow staff to connect safely to company networks from home, hotels, or while traveling. The encrypted tunnel ensures sensitive files, emails, and business data remain confidential and protected from cyberattacks. This is especially crucial for industries dealing with confidential financial, healthcare, or legal data. With the rise of remote and hybrid work, VPNs have become essential for maintaining productivity while safeguarding against data breaches, unauthorized access, and corporate espionage, enabling secure communication between employees and organizational systems.

  • Data Protection on Public Wi-Fi

Public Wi-Fi in cafes, airports, and hotels is often unsecured, making users vulnerable to hackers and identity theft. VPNs safeguard data by encrypting communication, preventing cybercriminals from intercepting login credentials, financial transactions, or personal details. Whether accessing banking apps, emails, or confidential work documents, a VPN ensures complete privacy. It protects against man-in-the-middle attacks, packet sniffing, and unauthorized surveillance on open networks. Travelers, students, and professionals rely on VPNs for safe connectivity. This makes VPNs vital for maintaining security when accessing sensitive data on public networks, significantly reducing the risk of cybercrime in everyday online activities.

  • Bypassing Geo-Restrictions

VPNs are widely used to bypass geo-restrictions imposed by websites, governments, or streaming platforms. By masking the real IP address and routing traffic through servers in different countries, users can access content unavailable in their region, such as blocked websites, restricted apps, or international streaming libraries. Businesses also benefit by accessing global market information and unrestricted resources. For travelers, VPNs help maintain access to home country services abroad. This feature is crucial in countries with heavy internet censorship, where VPNs restore freedom of information and unrestricted communication, empowering users to browse the internet without regional limitations.

  • Enhanced Online Privacy

A VPN enhances online privacy by hiding a user’s real IP address, replacing it with the VPN server’s address. This prevents websites, advertisers, and even internet service providers (ISPs) from tracking browsing habits or collecting personal data. By anonymizing internet activities, VPNs protect users from targeted ads, surveillance, and profiling. This is highly valuable for individuals concerned with digital rights, journalists handling sensitive information, or anyone seeking freedom from intrusive online monitoring. VPNs allow users to maintain control over their personal information, ensuring that their identity and browsing history remain private while they engage in secure internet communication.

  • Safe Online Transactions

VPNs play a vital role in securing online banking and e-commerce transactions. Cybercriminals often target financial data such as credit card details, passwords, and account information. VPN encryption prevents hackers from intercepting this sensitive data, particularly on untrusted networks. Businesses use VPNs to safeguard B2B payments, digital contracts, and sensitive customer information. For individuals, VPNs provide peace of mind while shopping online or accessing financial accounts. By minimizing the risk of fraud, phishing, and data theft, VPNs ensure secure financial interactions, protecting both buyers and sellers. This makes VPNs indispensable for ensuring trust and safety in online commerce.

Types of Virtual Private Network (VPN):

  • Remote Access VPN

A Remote Access VPN allows individual users to securely connect to a private network from a remote location. Commonly used by employees, it enables access to organizational resources such as files, applications, and intranet services. The connection is established through an encrypted tunnel, protecting data from interception by hackers or malicious actors. Remote Access VPNs are crucial in today’s remote work environment, ensuring that users can safely connect from home, hotels, or public Wi-Fi networks. This type of VPN provides flexibility, mobility, and secure communication, making it ideal for businesses and individuals seeking private and protected internet access.

  • Site-to-Site VPN

A Site-to-Site VPN, often used by large organizations, connects entire networks across multiple locations. Instead of individual user connections, it securely links branch offices to a central office network over the internet. This type of VPN is commonly categorized into Intranet-based VPNs (for connecting internal networks) and Extranet-based VPNs (for connecting with partner or vendor networks). Site-to-Site VPNs use encryption protocols to ensure safe communication between networks. They reduce the need for expensive leased lines and improve organizational collaboration. Businesses with global branches benefit by securely sharing resources, data, and applications across offices, enabling seamless enterprise-wide connectivity.

  • Client-Based VPN

Client-Based VPNs require users to install VPN software on their devices, such as laptops, smartphones, or desktops. Once installed, the VPN client manages the encrypted connection between the user device and the VPN server. Authentication methods like usernames, passwords, and digital certificates are used to validate users. Client-Based VPNs are highly versatile, allowing secure browsing, remote access to business resources, and private internet usage. They also protect users on public Wi-Fi networks by encrypting traffic. Individuals, freelancers, and small businesses often prefer this type of VPN for its ease of setup, flexibility, and strong security in personal or professional use.

  • Network-Based VPN

A Network-Based VPN is managed by a network provider and allows multiple users to connect to the VPN through their service provider’s network infrastructure. This type of VPN is generally used by enterprises for connecting large-scale networks without requiring individual client software installations. The service provider handles the technical complexities, ensuring reliable and secure communication between multiple business locations. Network-Based VPNs offer scalability, making them suitable for organizations with growing connectivity needs. By outsourcing management to a provider, businesses save time and resources while ensuring data encryption, secure collaboration, and stable performance across distributed office environments and partner networks.

  • Mobile VPN

Mobile VPNs are designed specifically for users who frequently change networks or move across different coverage areas, such as mobile employees, field workers, or public safety personnel. Unlike traditional VPNs, which may drop the connection when the network changes, a Mobile VPN maintains a continuous session even if users switch between Wi-Fi, mobile data, or different hotspots. This ensures secure, uninterrupted connectivity for critical tasks. Mobile VPNs are widely used in healthcare, logistics, law enforcement, and transportation industries where mobility is essential. They provide strong data encryption and reliability, supporting secure communication on the go without interruptions.

Components of Virtual Private Network (VPN):

  • VPN Client

The VPN client is software installed on the user’s device, such as a computer, smartphone, or tablet. It initiates and manages the secure connection to the VPN server by creating an encrypted tunnel. The client handles authentication, encryption, and data encapsulation before transmitting information. Popular VPN clients come with user-friendly interfaces, allowing individuals to choose server locations, enable or disable connections, and manage security preferences. Without the VPN client, the user cannot establish a secure tunnel with the VPN server. It ensures that all internet traffic from the device is routed through the VPN for security and privacy.

  • VPN Server

The VPN server is the backbone of the VPN infrastructure. It authenticates incoming client requests, establishes encrypted tunnels, and routes data securely across networks. Servers are located globally, allowing users to mask their IP addresses and appear as if they are browsing from another region. The server ensures privacy by hiding user identity and provides security by encrypting transmitted data. In business VPNs, servers also provide access to corporate networks and shared resources. High-performance servers are critical to ensure speed, stability, and reliability of VPN services, making them a vital component of both commercial and enterprise-grade VPN systems.

  • VPN Protocols

VPN protocols define how data is transmitted, encrypted, and authenticated between the VPN client and server. Common protocols include OpenVPN, IPSec, PPTP, L2TP, and WireGuard. Each has unique strengths: for instance, OpenVPN offers high security, while WireGuard emphasizes speed and efficiency. Protocols determine the level of encryption, speed, and overall reliability of the VPN connection. Strong protocols prevent unauthorized access and ensure secure data transmission over public or private networks. They act as the foundation of VPN security, balancing performance with protection depending on the use case, whether for business, streaming, or general browsing needs.

  • Authentication System

Authentication is a core component that verifies user identity before granting VPN access. It prevents unauthorized users from entering the secure network. Authentication systems often rely on usernames, passwords, digital certificates, or multi-factor authentication (MFA) for additional protection. Advanced VPNs may use biometric verification or smart cards in corporate settings. Proper authentication ensures that only authorized personnel can access sensitive data or organizational resources. By combining secure login credentials with encryption, the authentication system provides a robust defense against cyberattacks, identity theft, and unauthorized intrusion, making it a crucial part of the VPN’s security framework.

  • Encryption Mechanism

Encryption is the process of converting readable data into an unreadable code to prevent unauthorized access. In a VPN, encryption mechanisms protect data as it travels through the tunnel between client and server. Strong encryption standards like AES-256 or ChaCha20 are commonly used to secure sensitive information. Even if intercepted, encrypted data cannot be understood without the proper decryption key. This ensures confidentiality, integrity, and security of communications over the internet. Encryption is vital for preventing eavesdropping, hacking, or data leakage, especially when using public Wi-Fi or transmitting sensitive business information across untrusted networks.

Challenges of Virtual Private Network (VPN):

  • Performance and Speed Issues

One of the biggest challenges of VPNs is the reduction in internet speed. Since data must be encrypted, transmitted through a tunnel, and then decrypted at the server end, this process introduces latency. The further the VPN server is from the user, the slower the connection becomes. High encryption levels such as AES-256, while secure, consume additional processing power and can slow browsing or streaming. In business environments, heavy usage by multiple employees may strain bandwidth. Poorly configured or overcrowded servers can also degrade performance. Users often struggle to balance security with speed, which is why some may disable VPN usage when performance lags, exposing themselves to cyber threats.

  • Compatibility and Configuration Problems

VPNs can present compatibility issues with certain applications, networks, or devices. Some services, especially banking apps or streaming platforms, block VPN traffic, making it frustrating for users. Businesses face configuration challenges, as VPN setup requires correct firewall rules, authentication systems, and routing to function properly. Misconfigured VPNs may inadvertently expose sensitive data instead of securing it. Additionally, different VPN protocols may not be supported on all operating systems or devices, limiting flexibility. For enterprises, ensuring seamless VPN integration across diverse hardware and employee devices can be complex. Without proper IT support and monitoring, VPN mismanagement can reduce security effectiveness and create operational inefficiencies.

  • Security Limitations and Vulnerabilities

Although VPNs are designed for security, they are not foolproof. Weak protocols like PPTP or outdated encryption methods can expose users to attacks such as data interception or brute-force decryption. VPN servers themselves may become targets for hackers, who can exploit misconfigurations to steal data. In shared VPN services, IP leaks or DNS leaks may occur, unintentionally revealing the user’s real location and identity. Free or unreliable VPN providers may log user activity, creating risks of data misuse. For organizations, relying solely on VPNs without additional layers of cybersecurity, such as firewalls and intrusion detection systems, leaves networks vulnerable to sophisticated cyber threats.

  • Cost and Resource Management

Maintaining a secure and reliable VPN infrastructure can be costly, especially for large organizations. Businesses often require multiple high-capacity servers worldwide, constant software updates, and dedicated IT staff for monitoring and troubleshooting. Enterprise VPNs also need robust authentication systems, licenses, and compliance with data protection regulations, which further increase expenses. For small businesses, these costs can be overwhelming. Additionally, scaling VPN services for a growing workforce may demand additional investment in servers and bandwidth. Even for individual users, premium VPN subscriptions can be costly compared to free services, which may compromise on privacy. Balancing affordability and security remains a major challenge.

Applications of VPN in Business and Personal Use

  • Business Applications of VPN

In business environments, VPNs play a vital role in ensuring secure remote access for employees working from different locations. By encrypting communication, VPNs allow staff to safely connect to company servers and applications, protecting sensitive information from cyberattacks. They help organizations maintain data confidentiality, especially when transferring financial records, customer details, or intellectual property. VPNs also enable businesses to create secure inter-branch connections without investing in expensive private networks. Furthermore, VPNs help companies comply with regulatory requirements for data protection and maintain privacy during online transactions. In today’s era of remote work and cloud computing, VPNs have become essential tools for productivity, collaboration, and cybersecurity in corporate operations.

  • Personal Applications of VPN

For individuals, VPNs provide privacy, anonymity, and security while browsing the internet. By masking the user’s IP address, VPNs prevent websites, advertisers, or malicious actors from tracking online activities. They also help bypass geo-restrictions, allowing users to access content such as streaming platforms, social media, or news sites that may be blocked in certain countries. VPNs protect personal data, such as banking credentials or login details, especially when using public Wi-Fi networks at airports, cafes, or hotels. Moreover, they safeguard users against hackers, phishing attempts, and identity theft. For people living under internet censorship, VPNs serve as a vital tool to access unrestricted information securely and privately.

Policies & Procedures of Network Protection

The Ministry of Electronics and Information Technology in May 2018 notified the Information Technology (Information Security Practices and Procedures for Protected System) Rules, 2018, (hereinafter referred to as “the Rules“).

In the wake of global-level sensitization to the threat of data/ information misuse and cyber terrorism, these Rules were long awaited. The Rules prescribe a detailed infrastructure of what is defined therein as a ‘Protected System’ for implementation of security practices and protective measures required to be taken towards highly sensitive data or data collection centre.

What is a Protected System?

According to the Rules a Protected System is any computer, computer system or computer network of any Organization as notified under Section 70 of the Information Technology Act, 2000, in the official gazette by the appropriate Government.

Information Security Steering Committee

The Rules define an ‘Information Security Steering Committee’ to mean ‘the committee comprising higher management officials of an organization, responsible for continuously improving and strengthening the cyber security posture of the Protected System and also plan, develop, review remedial actions to mitigate and recover from malicious cyber incidents.’

As per Rule 3 of the Rules, every organization having ‘Protected System’ shall constitute an Information Security Steering Committee under the chairmanship of CEO/ MD or Secretary of the organization.

The composition of the Committee is required to include the IT Head or equivalent; Chief Information Security Officer (“CISO”); Financial Advisor or equivalent; Representative of National Critical Information Infrastructure Protection Centre (“NCIIPC”); any other expert(s) to be nominated by the organization.

Roles and Responsibilities of the Information Security Steering Committee

The Rules prescribe the vital roles and responsibilities of the Information Security Steering Committee the significant ones of which are as follows:

  • To approve all the Information Security Policies of the ‘Protected System’ any significant changes in network configuration impacting the “Protected System” or any significant change in application of the “Protected System”.
  • To establish mechanism for timely communication of cyber incident(s) related to “Protected System” to Information Security Steering Committee. A detailed definition as to what comprises of a cyber incident is mentioned in the Rules as an adverse incident that may result in impairing the confidentiality, integrity, or availability of electronic information, systems, services or networks resulting in unauthorised access, denial of service or disruption, unauthorised use of a computer resource, changes to data or information without authorization or threaten interests of public at large.
  • To establish mechanism for sharing of results of all information security audits and compliance of “Protected System” to Information Security Steering Committee.
  • To assess validation of “Protected System” after every two years.

The Rules prescribe certain mandatory practices and infrastructural compliances to be followed by any organization having a Protected System.

Nomination of Chief Information Security Officer (CISO):

A “Chief Information Security Officer” means a designated employee of Senior management, directly reporting to MD/ CEO etc. of the organisation, having knowledge of information security and related issues. The CISO is responsible for cyber security efforts and initiatives including planning, developing, maintaining, reviewing and implementation of Information Security Policies.

Every organization designated as a “Protected System” is required to nominate a CISO whose roles and responsibilities have been enumerated in “Guidelines for Protection of Critical Information Infrastructure” and “Roles and Responsibilities of Chief Information Security Officers (CISOs) of Critical Sectors in India” released by NCIIPC.

Some of the CISO’s main responsibilities include establishing ISMS, documenting network architecture, ensuring stability, resilience and scalability of the systems, conducting Vulnerability/Threat/Risk (V/T/R) Analysis for the cyber security architecture, Establishing and developing a Cyber Crisis Management Plan, conducting internal and external Information Security audits and documenting process for IT Security Service Level Agreements (SLAs) while entering into agreements with service providers etc.

Cyber Security Operation Center (“C-SOCs”) and Network Operation Center (“NOCs”)

Organizations with Protected Systems have to establish a C-SCO and NOCs with the aim of implementing preventive, detective and corrective controls to secure against advanced and emerging cyber threats, threats of unauthorized access and ensure continuity in network availability.

The Rules also prescribe in detail the roles and responsibilities of CISO of the “Protected System(s)” towards NCIIPC.

International Trade Laws Objectives Set 2

  1. The exchange of goods and services are known as …………………………
  • Domestic Trade
  • International Trade
  • Trade
  • None of these.

 

  1. Which of the following is not considered as factors of production?
  • Land
  • Labour
  • Money
  • Capital

 

  1. Trade between two countries is known as ………….
  • External
  • Internal
  • Inter-regional
  • None of Above

 

  1. International Trade is most likely to generate short-term unemployment in:
  • Industries in which there are neither imports nor exports
  • Import-competing industries
  • Industries that sell to domestic and foreign buyers.
  • Industries that sell to only foreign buyers

 

  1. Free traders maintain that an open economy is advantageous in that it provides all the following except:
  • Increased competition for world producers
  • A wider selection of products for consumers
  • Relatively high wage levels for all domestic workers
  • The utilization of the most efficient production methods

 

  1. Which of the following is not a benefit of international trade?
  • Lower domestic prices
  • Development of more efficient methods and new products
  • A greater range of consumption choices
  • High wage levels for all domestic workers

 

  1. Which is not an advantage of international trade:
  • Export of surplus production
  • Import of defence material
  • Dependence on foreign countries
  • Availability of cheap raw material

 

  1. Trade between two countries can be useful if cost ratios of goods are …………..
  • Equal
  • Different
  • Undetermined
  • Decreasing

 

  1. Foreign trade creates among countries ………………
  • Conflicts
  • Cooperation
  • Hatred
  • Both a. and b.

 

  1. All are advantages of foreign trade except ………….
  • People get foreign exchange
  • Cheaper goods
  • Nations compete
  • Optimum utilization of countries’ resources

 

Q.2. Fill in the blanks.

  1. International Trade means trade between …………………. (Provinces/ Countries/ Regions)
  2. Two countries can give from foreign trade if ………… are different. (Effect/ Tariff/ Cost)
  3. ………….. encourages trade between two countries. (Different tax system/Reduced tariffs/ National currencies)
  4. Drawback of protection system is ……… (Consumers have to pay higher prices/ Producers get higher profits/ Quality of goods may be affected/ All above)
  5. ………….. is a drawback of free trade. (Prices of local goods rise/ Govt. looses incomes from custom duties/National resources are underutilized)
  6. International trade is possible primarily through specialization in production of …… goods. (All/ One/ Few)
  7. A country that does not trade with other countries is called …… country. (Developed/ Closed/ Independent)
  8. Policy of Protection in trade ……… (Facilitates trade/ Protects foreign producers/ Protects local producers/ Protects exporters)
  9. The largest item of Indian import list is ……….. (Consumer goods/ Machinery/ Petroleum/ Computers)
  10. Trade between two states in an economy is known as …… (External/ Internal/None)

 

SET 2

Q.1. Multiple Choice Questions.

  1. Who among the following enunciated the concept of single factoral terms of trade?
  • Jacob Viner
  • G.S.Donens
  • Taussig
  • J.S.Mill

 

  1. ‘Infant industry argument’ in international trade is given in support of:
  • Granting Protection
  • Free trade
  • Encouragement to export oriented small and tiny industries
  • None of the above

 

  1. Terms of trade that relate to the Real Ratio of international exchange between commodities is called:
  • Real cost terms of trade
  • Commodity terms of trade
  • Income terms of trade
  • Utility terms of trade

 

  1. The main advantage in specialization results from:
  • Economies of large-scale production
  • The specializing country behaving as monopoly.
  • Smaller Production runs resulting in lower unit costs.
  • High wages paid to foreign workers.

 

  1. Net export equals ……
  • Export * Import
  • Export + Import
  • Export – Import
  • Exports of service only

 

  1. A tariff ………………….
  • Increase the volume of trade
  • Reduces the volume of trade
  • Has no effect on volume of trade
  • Both a. and c.

 

7. Terms of Trade of developing countries are generally unfavourable because …….

  • They export primary goods
  • They import value added goods
  • They export few goods
  • Both a. and b.

 

  1. Terms of Trade a country show ……………
  • Ratio of goods exported and imported
  • Ratio of import duties
  • Ratio of prices of exports and imports
  • Both a. and c.

 

  1. Terms of trade between two countries refer to a ratio of …..
  • Export prices to import prices
  • Currency values
  • Export to import
  • Balance of trade to Balance of payments

 

10. Rich countries have deficit in their balance of payments ……..

  • Sometimes
  • Never
  • Alternate years
  • Always

 

Q.2. Fill in the blanks.

  1. BOP means balance of Receipts and payments of …… (all banks/ State bank/ Foreign exchange by a country/ Government)
  2. Favourable trade means exports are ……. than imports. (More/ Less/ Neutral)
  3. Net barter terms of trade is also known as …. Terms of trade.(Commodity/ Income/Utility)
  4. ….. is not a factor affecting TOT. (Reciprocal demand/ Size of demand/ Price of demand)
  5. If tariff is higher, then the imports will …… (Increase/ Decrease/ Same as before)
  6. ……. has given the concept of reciprocal demand. (Mills/ Adam/ Ricardo)
  7. ……… is the curve, which expresses the total demand for one good (imports) in terms of the total supply of another good (exports). (Offer/ Official / Corporate)
  8. Balance of payment is prepared by an economy ……. (Yearly/ Monthly/ Weekly)
  9. …….. kinds of accounts are included in BOP. (2/ 3/4)
  10. …….is not a type of disequilibrium in BOP. (Cyclical/ Seasonal/ Frictional/ Disguised)

 

SET 3

Q.1. Multiple Choice Questions.

  1. The first classical theory of International Trade is given by …………………..
  • Keynes
  • Adam Smith
  • Friedman
  • Heckscher-Ohlin

 

  1. In classical theory of International Trade, the exchange of goods and services takes on the basis of ………….. system?
  • Barter
  • Money
  • Labour
  • capital

 

  1. If capital is available in large proportion and labour is less, then that economy is known as ……………..
  • Capital Intensive
  • Labour Intensive
  • Both a. and b
  • None of above

 

  1. In Heckscher Ohlin theory, what is assumed to be same across the countries?
  • Transportation cost
  • Technology
  • Labour
  • capital

 

  1. Opportunity cost is also known as ……………………
  • Next Best alternative
  • Transformation cost
  • Both a. and b
  • None of above.

 

  1. Factor proportions theory is also known as the
  • comparative advantage theory
  • laissez faire theorem.
  • HeckscherOhlin theorem
  • product cycle model.

 

  1. Trade between two countries can be useful if cost ratios of goods are:
  • Equal
  • Different
  • Undetermined
  • Decreasing

 

  1. According to Hecksher and Ohlin basic cause of international trade is:
  • Difference in factor endowments
  • Difference in markets
  • Difference in political systems
  • Difference in ideology

 

  1. The theory explaining trade between two countries is called:
  • Comparative disadvantage theory
  • Comparative cost theory
  • Comparative trade theory
  • None of the above

 

  1. David Ricardo presented the theory of international trade called:
  • Theory of absolute advantage
  • Theory of comparative advantage
  • Theory of equal advantage.
  • Theory of total advantage

 

Q.2. True or False.

  1. Absolute advantage theory is given by Adam Smith.

True

  1. Ricardo has supplemented Absolute advantage theory.

 True

  1. Heckscher and Ohlin have given comparative cost advantage theory of International Trade.

False

  1. Multilateral trade means one country comes into trade with more than one country.

True

  1. Opportunity cost means unforgiving cost.

False

  1. Modern theory of International Trade is given by Ricardo.

False

  1. 2×2×2 model of International Trade is known by Heckscher Ohlin model.

True

  1. Transformation cost is also known as opportunity cost.

True

  1. Gravity model of trade was first used by Jan Tinbergen.

True

  1. Adam Smith advocated free trade and specialized.

True

 

Set 4

Multiple Choice Questions.

  1. GATT was made in the year ………………..
  • 1945
  • 1947
  • 1950
  • 1951

 

  1. The new world Trade organization WTO., which replaced the GATT came into effect from____
  • 1ST January 1991
  • 1st January 1995
  • 1st April 1994
  • 1st May 1995

 

  1. 5 banks of BRICS nations have agreed to establish credit lines in ….. currencies.
  • Legal
  • Plastic
  • Crypto currency
  • National

 

  1. Where was the 11th meeting of BRICS Trade Ministers held from 13 Nov 2019 – 14 Nov 2019?
  • Shanghai
  • Beijing
  • Tokyo
  • Brasilia

 

  1. What is the name of the SAARC satellite to be launched on May 5, 2017?
  • South Asia Satellite
  • South Asian Association Satellite
  • South East Asia satellite
  • SAARC satellite

 

  1. Full form of SAFTA is ……………………..
  • South Asia Free Trade Agreement
  • South Asia Foreign Trade Agreement
  • South Asia Framework Trade Agreement
  • Both a and b

6. Which of the following commitments has not been made by India to WTO?

  • Reduction in tariffs
  • Increase in quantitative restrictions
  • Increase in qualitative restrictions
  • Trade related Intellectual Property Rights

 

  1. The European Union was formally established on …..
  • November, 1993
  • April, 1995
  • January, 1997
  • May, 1996

 

8. SAARC was established in …..

  • 1980
  • 1985
  • 1990
  • 1995

 

  1. NAFTA came into effect in …..
  • 1990
  • 1994
  • 1998
  • 2004

10. The dominant member state of OPEC is ……………..

  • Iran
  • Iraq
  • Kuwait
  • Saudi Arabia

 

Q.2. Fill in the blanks.

  1. Headquarter of WTO is in ………….. Geneva/USA/Germany.
  2. Before WTO, ……………… was working instead of that. GATY/ GATR/ GATT.
  3. …………….. round negotiations initiated the establishment of WTO. Uruguay/ Urdun/ Urbuny .
  4. India had joined WTO in the year …………. (1995/ 1996/ 1997)
  5. In …………….. , SAARC was established. (1985/ 1986/ 1987)
  6. The first SAARC summit was organized at …….. (Dhaka/ Kathmandu/ Nepal)
  7. ……..is not a country in SAFTA. (India/ Nepal/ Pakistan/ USA)
  8. ……… countries are member of OECD. (34/ 35/ 36)
  9. ………… is not a country under OECD. (Norway/ Canada/ China)
  10. ………….. are the member states of European Union. (28/ 29/30)
error: Content is protected !!