Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
TASK 1 / TASK 2
REPORT
ON
ENTREPRENEURSHIP (UCX-249)
At
Submitted By
UID – 19BCS1005
CLASS – CSE-1(A)
PRE-PHASE
Assignment-1
ENTREPRENEURIAL
REPORT
PRABHKIRAN SINGH
1. ENTREPRENEUR STORY
Prabhkiran Singh and Siddharth Munot are the founders of this highly famous E-
commerce startup known as Bewakoof.Com.
Both of them are civil graduates from IIT Bombay and always wanted to go on an
entrepreneurial journey. But after graduating from IIT Bombay, each of them started out
their careers one at a time.
Prabhkiran commenced with his Lassi mission outdoor his college and named it khadke
gLASSI. Unfortunately, this didn’t go that properly and as a result led to shut down
quickly. At the identical time, Siddharth started operating with an academic startup.
Much later, these outstanding minds decided to begin their personal commercial
enterprise of T-Shirt printing.
It so took place that each founders of Bewakoof Prabhkiran Singh & Siddharth Munot
were sitting outdoor their campus drilling a few thoughts to start their task. And this led
them to strike this T-blouse printing concept. So the concept again then turned into to
design something that would bring the humor element to college students.
This led to both of them researching the present day young people traits, way of life.
Following this, they began designing charges for their printing T-Shirt mission thus. And
that’s how this cool logo came into life. Back in 2010, whilst Prabhkiran Singh &
Siddharth Munot were attempting to find some area call for their newly started printing
T-Shirts commercial enterprise, they got here across the idea of taking Bewakoof.Com.
And it so took place that the month of April turned into about to start and April Fool’s day
became simply nearby. Also, the call is humorous, witty, and without problems
resonating with the youngsters, they went in advance and bought the area. The internet
site become released in 2012 even though. The target market for this website had been
the university college students for whom Bewakoof started developing humorous t-shirts
depicting numerous eventualities of their lives.
2.VENTURE DETAILS
Their story Launched on April 1, 2012, with the aid of IITians Prabhkiran Singh and
Siddharth Munot, Bewakoof.Com has trusted quirky, funny, out-of-the-container
messaging on its merchandise to hook up with its customers. Before starting out
collectively, Siddharth labored with an schooling startup, while Prabhkiran ran a
commercial enterprise promoting sparkling flavoured lassi via take-away joints named
‘KhadkegLASSI’. Bewakoof.Com became started with an investment of Rs 30,000, and
they received seed investment after six months in operations. They also raised
institutional angel investment couple of months in the past from Snapdeal founders
Kunal Bahl and Rohit Bansal, and Former IDFC Securities MD, Nikhil Vora. Talking
approximately their decision to name their undertaking Bewakoof, Siddharth says, “We
simply got fortunate with it. During our college days we had a hobby of purchasing
unique domain names which we could promote at premium in destiny. Bewakoof.Com
turned into offered years earlier than the logo changed into released. When we had
been launching our life-style brand we understood that a amazing emblem call and
domain is important -- some thing quick and smooth to recollect. The dots related well
and Bewakoof.Com became the perfect preference. It’s a superb increase for
advertising as well – it’s catchy and exceptional. Once we get people’s interest with our
brand name, they keep in mind it for the rest of their lives.”
What they do Bewakoof.Com sells apparels and cell telephone covers. It claims to be
doing transactions well worth Rs 1.Five crore per month, with t-shirts being their nice
sellers. Their ‘Ghanta’ series of t-shirts for college students with messages like ‘Ghanta
Engineering/Ghanta MBA’ etc had been their exceptional promoting products. A
considerable bite of its client base comprises of college students and children in the age
organization of sixteen-34 years. Prabhkiran Singh When requested why they have
limited themselves to best apparels whilst maximum e-trade web sites have a horizontal
supplying, Prabhkiran says both are distinctive enterprise models having its very own
strengths and weaknesses. “In our play, we've high margins and a totally high consumer
loyalty because of our differentiated and precise products,” he says. All products that
Bewakoof sells on its web site is designed and synthetic by them, they are no longer a
marketplace like Flipkart and Snapdeal, and so on. Until someday back, Bewakoof.Com
also retailed its products via offline shops in Mumbai. However, they've discontinued
their offline thrust and nowadays promote stuff online-simplest. Metros and tier-2 towns
are great markets for Bewakoof. Cities like Pune, Bangalore, and Kota, in which there is
a large congregation of younger population for have a look at/work, also contribute
properly to their income. They are also very famous in the North-East with Assam
constantly being considered one of their top-appearing states.
3.CHALLENGES FACED
Ever wondered how hard it might be to begin your personal organization? According to
Prabhkiran Singh, it may be as easy (or as tough) as a deep-sea dive. The
Bewakoof.Com cofounder (who has been diving in view that he changed into 22)
believes that diving into the sea is lots like diving into the startup global. It calls for
careful making plans.
After experimenting with flavours in his hostel room, Singh opened the first outlet of
Khadhke Glassi. For the primary 45 days, he offered lassi himself, due to the fact he
couldn’t have enough money body of workers. A Facebook page and phrase of mouth
made his first undertaking a fulfillment story and any other outlet changed into launched
soon. But the monsoon performed spoilsport. "I found humans didn’t drink lassi within
the monsoon, hence I had to shut the shops," says Singh, who then teamed up with
batchmate Siddharth Munot to release on line clothing store Bewakoof.Com. Initial
funding become the primary hurdle. Singh and Munot mortgaged their family property
and positioned loads at stake to set up the brand. A few months ago, Snapdeal
founders, Nikhil Vora and other influential angel buyers picked up stakes in Bewakoof.
Bewakoof began its adventure of miles from step one and have become one of the
leaders in the marketplace just in a small span of time. The competition are left behind
and the mission is gaining its reputation some of the target customers.
Asking to the co-founder Siddharth approximately the competitors, he said that during
their portfolio, they don’t have any competitor.
Rather there are some sites like Inkfruit, Teesort, who're in the identical enterprise and
they have early movers advantage. Bewakoof.Com has gathered its target customers
quite wisely. Now sites like Inkfruit, Teesort.Com are lagging a ways in the back of
Bewakoof in phrases of recognition. One factor Bewakoof will need to do is to attract
increasingly customers from the nearby local market manner offline clients
4.MARKETING STRATEGIES
Nothing can speak greater about the assignment apart from its stats and turnover.
Within a quick span, with an annual turnover of Rs10crores and month-to-month
transactions of well worth Rs1.5crore, Bewakoof.Com claims to be a worthwhile e-
commerce website online. “We are self-sustainable and developing 15-20% month-on-
month,” stated the co-founder Prabhkiran Singh. A document issued few months ago
showing stats of Bewakoof.Com is displayed beneath.
The organization used social platforms like Justdial and Facebook to sell their
merchandise in addition to internet site. The impact changed into in reality seen and in
much less than a few months, 75 thousand fans on Facebook had been engaged.
Other than the social media platform, the employer also arranges huge university
campaigns wherein students are asked to unfold Beewakoofy around their college
campus and the employer then gives a unfastened Tees to them.
For in addition promotion of their products, the corporation has additionally tied up with
many pinnacle brand e-commerce web sites to sell their merchandise which include
Snapdeal, Indiatimes Shopping and Seventymm.
Multiple payment method option also comes beneath their marketing approach.
Credit/debit card, net banking, cash/card on transport options are to be had to pay from.
COD has benefit over different charge strategies that it permits the customer to open
the field and take a look at the product before paying to the channel accomplice.
Marketing to force site visitors to their legitimate website is finished using the two most
popular Facebook pages 2 Min Aaya Yaar Raste Mei Hoon and bewakoof.Com.
The great power of the brand is their catchy and modern quotations printed on different
products. It draws the human beings inside the first appearance. Other than this, the
replacement coverage allows the clients effortlessly in shopping for any item.
Customers can pay the use of the approach COD with an advantage to test the product
earlier than paying to the channel associate.
Increasing Popularity
KNOWING
YOUR
FIELD
INFORMATION SECURITY
1.DESCRIPTION OF FIELD
Information security, now and again abbreviated to infosec, is a set of practices meant
to preserve information cozy from unauthorized get entry to or alterations, both while it
is being saved and whilst it is being transmitted from one gadget or physical area to
another. You may every now and then see it called facts safety. As knowledge has end
up one of the 21st century's maximum vital belongings, efforts to keep statistics cozy
have correspondingly come to be increasingly crucial.
Confidentiality is perhaps the detail of the triad that most right now involves thoughts
when you think about information security. Data is personal whilst simplest those those
who are legal to access it can do so; to make sure confidentiality, you need in order to
perceive who is making an attempt to access records and block tries by using the ones
with out authorization. Passwords, encryption, authentication, and defense against
penetration attacks are all techniques designed to make sure confidentiality.
Integrity approach retaining information in its accurate country and stopping it from
being improperly modified, both through twist of fate or maliciously. Many of the
strategies that make certain confidentiality may also shield statistics integrity—in spite of
everything, a hacker cannot alternate data they can't get entry to—but there are other
gear that help offer a defense of integrity in depth: checksums can help you verify
records integrity, as an instance, and model control software and frequent backups
allow you to repair information to a accurate nation if need be. Integrity also covers the
idea of non-repudiation: you need to be able to prove which you've maintained the
integrity of your facts, especially in legal contexts.
Availability is the mirror image of confidentiality: even as you want to make sure that
your statistics cannot be accessed with the aid of unauthorized customers, you
furthermore may want to make certain that it is able to be accessed by those who have
the proper permissions. Ensuring information availability manner matching community
and computing sources to the quantity of statistics access you count on and
implementing a very good backup coverage for disaster recovery purposes.
In an ideal global, your information have to constantly be kept private, in its correct
state, and to be had; in practice, of route, you frequently need to make picks about
which records protection concepts to emphasize, and that requires assessing your
facts.
> Identification:-
Identification occurs when a consumer (or any problem) claims or professes an
identity. This can be done with a username, a technique ID, a smart
card, or whatever else that may uniquely identify a subject. Security
structures use this identity while figuring out if a topic can get entry to an
object.
> Authentication:-
Authentication is the technique of proving an identity and it occurs when topics
provide suitable credentials to show their identity. For example, when a consumer
presents the perfect password with a username, the password proves that the
person is the proprietor of the username. In short, the authentication provides evidence
of a claimed identification.
There are numerous strategies of authentication that I’ll cowl in some other submit, but
inquick they may be:
● Something you already know, together with a password or PIN
● Something you have got, inclusive of a smartcard pancard, or RSA token
● Something you are, the use of biometrics
>Authorization:-
Once a user is identified and authenticated, they may be granted authorization based
totally on their established identification. It’s crucial to factor out that you can’t have
separate authorization without identity and authentication. In different words,if anyone
logs on with the same account you can furnish get entry to to assets for every body, or
block get right of entry to to resources for anybody. If all and sundry makes use of the
same account, you could’t differentiate between users. However, whilst customers have
been authenticated with special consumer money owed, they can be granted get right of
entry to to extraordinary assets based totally on their identity.
(iii).Backup
For any record, it's far vital to have at the least two copies saved in distinct places than
the original document, ie out of doors the enterprise surroundings.
The backup is capable of fast retrieve statistics misplaced by using coincidence, theft or
different fatalities that may appear.
It can be saved in tough copies, which include CDs, or within the cloud, an choice
extensively used by IT professionals.
Strengths:
Opportunities:
• options for cloud garage for statistics, preserving facts relaxed and backed up
off-site
Threats:
I regularly examine approximately people and control groups approximately the pros
and cons of unique security tasks. Those accountable for safety these days are
frequently inundated with information on the subject. They see all the hype around the
merchandise, examine the headlines of rising concerns and listen masses of predictions
about what is subsequent. It's not difficult to see why some just want to know what to do
now and what's going to have the most important impact.
Most companies I've seen have recognized and implemented a few of thecommon
technologies critical to any security program. They have a firewall, antivirus software
program, intrusion detection/safety, authentication technology and so forth. However,
what keeps to subject me is that those systems regularly move untested and
unmanaged and consequently create a fake sense of safety.
So whilst some companies would benefit from knowing what safety gadgets to enforce,
for lots, the most valuable hints are concerning approaches. In many situations,
businesses still fail to comprehend that a safety application is just the beginning. All too
often, tracking and assessment responsibilities are either left out, underfunded or just
no longer done well.
Security audits are one of the first-rate approaches to discover safety risks and validate
the safety gadgets already positioned into location. Additionally, they're a useful aid for
justifying security budgets. However, many businesses nowadays fail to carry out
everyday comprehensive audits of their internal and/or outside IT infrastructure. And
those who do perform audits often simply test the externally exposed devices or
handiest have excessive-degree audits completed to make sure the above stated
"common technologies" are being applied. Comprehensive audits, however, should very
well check for all acknowledged vulnerabilities of all structures, correlate the findings,
take a look at exploits, identify the true level of risk to the business and detail
remediation necessities. Audits nicely accomplished with all these strategies with the
aid of a reputable firm are in truth one of the maximum crucial projects you may adopt
these days.
One of the reasons why protection audits pinnacle my list is that they lay the
groundwork for figuring out what is wanted to comfortable the IT infrastructure. In
addition, they provide objective insight at the effectiveness of your typical protection
software. Such audits should be finished as a minimum once in keeping with 12 months
towards the inner environment and every six to 365 days against the outside
environment. This frequency is a counseled minimal, and lots of organizations rightfully
decide on to check certain components of a full audit more frequently.
>Some important roles of statistics security in one-of-a-kind fields are as follows:-
● Security policy: To provide control path and help for records safety in accordance
with commercial enterprise requirements and applicable laws and regulations.
● Asset management:
➢ Responsibility for assets: To obtain and preserve appropriate safety of
organizational property.
➢ Information category: To ensure that facts receives the appropriate level of
safety.
● Access control:
➢ Business requirement for get right of entry to manipulate: To manipulate get
admission to to data.
➢ User get admission to control: To ensure authorized consumer get entry to
and to save you unauthorized get entry to to data systems.
➢ User obligations: To prevent unauthorized person access, and compromise or
robbery of statistics and facts processing facilities.
➢ Network get admission to manipulate: To prevent unauthorized access to
networked offerings.
➢ Operating gadget get entry to manipulate: To prevent unauthorized get entry
to to running structures.
➢ Application and data get right of entry to manage: To save you unauthorized
access to information held in application structures.
➢ Mobile computing and teleworking: To ensure data protection while using
cellular computing and teleworking facilities.
● Compliance:
➢ Compliance with criminal necessities: To avoid breaches of any law,
statutory, regulatory or contractual obligations, and of any security necessities.
➢ Compliance with security regulations and standards, and technical
compliance: To make certain compliance of structures with organizational safety
guidelines and preferred
PLAGIARISM REPORT