电子商务安全翻译Word下载.docx

上传人:b****6 文档编号:17186052 上传时间:2022-11-28 格式:DOCX 页数:7 大小:22.48KB
下载 相关 举报
电子商务安全翻译Word下载.docx_第1页
第1页 / 共7页
电子商务安全翻译Word下载.docx_第2页
第2页 / 共7页
电子商务安全翻译Word下载.docx_第3页
第3页 / 共7页
电子商务安全翻译Word下载.docx_第4页
第4页 / 共7页
电子商务安全翻译Word下载.docx_第5页
第5页 / 共7页
点击查看更多>>
下载资源
资源描述

电子商务安全翻译Word下载.docx

《电子商务安全翻译Word下载.docx》由会员分享,可在线阅读,更多相关《电子商务安全翻译Word下载.docx(7页珍藏版)》请在冰豆网上搜索。

电子商务安全翻译Word下载.docx

So,howtoensurethate-commercesecurity?

1E-businessSecurityIssues

E-businessisapowerfultoolforbusinesstransformationthatallowscompaniestoenhancetheirsupply-chainoperation,reachnewmarkets,andimproveservicesforcustomersaswellasforsuppliersandemployees.However,implementingthee-businessapplicationsthatprovidethesebenefitsmaybeimpossiblewithoutacoherent,consistentapproachtoe-businesssecurity.Traditionalnetworksecurityhasfocusedsolelyonkeepingintrudersoutusingtoolssuchasfirewalls.Thisisnolongeradequate.E-businessmeanslettingbusinesspartnersandcustomersintothenetwork,essentiallythroughthefirewall,butinaselectiveandcontrolledway,sothattheyaccessonlytheapplicationstheyneed.Todate,organizationshavecontrolledandmanagedaccesstoresourcesbybuildingauthorizationandauthenticationintoeache-businessapplication.

Thispiecemealapproachistime-consumingerror-prone,andexpensivetobuildandmaintain.Emergingtechnologyprovidesanewrole-basedaccesscontrolinfrastructureforalloftheenterprise’se-businessapplications.ForExample:

E-businessshoppingcartsoftwareslikeGoECartequippedwithlatestsecurityfeaturesaaremakingonlineshoppingexperiencesafeandsecure.Withthisinfrastructure,developersnolongerneedtocodesecurityfeaturesintoeachapplication.Thiscangreatlyspeedupandsimplifythedeploymentofnewapplications,cutmaintenancecosts,andgiveorganizationsaconsistentsecuritypolicy.Thisnewaccesscontrolinfrastructurealsoletsorganizationsimplementconsistentprivacypoliciesandensuresthatauthorizedpeoplearedeniedaccesstosensitivebusinessinformationsources.Inaddition,acentralizedsecuritysolutionlendsgreaterflexibilitytosupportingnewtechnologiessuchasmobileInternetdevices,whichareexpectedtoproliferateoverthenextfewyears.Besidescontrollingaccess,organizationsalsoneedtomonitorsecurityeventsacrosstheenterprisesothatsuspiciousactivitiescanbequicklypinpointed.Thisisbecomingcriticalasenterprisenetworksgrowrapidlyincomplexityandstrategicimportance.Newmonitoringtechnologyletsorganizationsconsolidatedatafromalltheirdisparatesecuritysensors—firewalls,anti-virussoftware,hostsystems,androuters—andprovidesacoordinatedsingleimageofpotentialintrusionsforeffectiveincidentresponse.

2ApproachtoE-businessSecurity

Oncetheorganizationhasdefinedaclearlistofsecurityrequirements,itcanbegintoidentifytechnologythatmeetsitsneeds.Bycombiningauthenticationandauthorizationwithmonitoringtechnologyacomprehensivee-businesssecuritysolutioncanbebuilt.First,authenticationandauthorizationtechnologyisusedtocontrolaccesstoe-businessapplications.Thistechnologyisvaluableforanyorganizationbuildinge-businessapplications.Businessesshouldevaluatethetechnology’scapabilitiesinmultipleareas:

•Coreauthenticationandauthorizationfunctions,includingsinglesignon

•Theabilitytosetpoliciesforsecurity

•Supportforexistingenterprisesoftware

•Manageability

•Scalabilityandreliability

•Privacy

•Softwarequality

Second,monitoringtechnologyminimizesthebusinessriskassociatedwithpotentialnetworkintrusions.Thistechnologyisparticularlyusefulfororganizationswithlarge,complexnetworks.Keyfeaturestoconsiderarethetechnology’sabilitytocorrelateinformationfromawiderangeofdatasources;

itsabilitytoautomateresponsestoroutineproblems;

anditsmanageability.

2.1AuthenticationandAuthorizationTechnology:

Todate,Webapplicationdevelopershavegenerallycodedsecuritylogicintoeachoftheirapplications.Eachapplicationhadtomaintainitsownaccesscontrollistofusers,resourcesandtherightsgrantedtoeachuser.Asthee-businessenvironmentgrows,thisapproachrapidlybecomesproblematicforseveralreasons:

•Itisexpensivebecauseoftheneedtoreplicatedevelopmentandmaintenanceworkacrossmultiplesystems.

•Itrequirestime-consumingdevelopmentwhenthereisoftencorporatepressuretogetonlineasquicklyaspossible.

•Maintenanceistime-consuminganderrorprone.

Oncetheapplicationsareonline,itisvitaltoensurethataccesscontrollistsarekeptuptodateandinstepacrossmultipleapplications,andtomakesurethatassecuritypolicieschange,thosechangesaresimultaneouslyreflectedacrossthewholee-businessenvironment.Eachofthesestepsisanopportunityforerror,inconsistencyordelay,andcanresultinsecurityloopholes.Analternativeapproachisnowpossible.Technologyisavailablethatprovidesasecurityinfrastructureforallofanenterprise’sWeb-basedapplications,eliminatingtheneedtocodeandmaintainsecuritylogicforeachapplication.Thisapproachhasbeenacceptedasastandardmethodfordevelopingmainframeapplicationsforyears,butthetechniqueisonlynowbeingextendedtoWebapplications.

Tobecapableofmanagingaccesstotheentireenvironment,thissoftwareshouldhandleabroadrangeoffunctions.

2.2AuthenticationandAuthorization:

Thefundamentalrequirementisfortechnologythathandlestheauthenticationandauthorizationofallusers(whetherinsideoroutsidetheenterprise)accessingalle-businessapplications.Alluserattemptstoaccessane-businesssystemarehandledbythesecurityinfrastructuretechnology,whichauthenticatestheuserandgrantstheappropriateaccesstotherequestedsystemorsystems.Manyauthenticationmethodsexist,rangingfromsimpleusernamesandpasswordstostrongermethodssuchastokensordigitalcertificates.Differenttypesofauthenticationmethodsmaysuitdifferentorganizations.Applicationsandaccessmethodstendtobecomelessconvenientforusersandbecomemoreexpensiveastheyincreaseinsecurity.Passwordsandusernamesencryptedontransmissionmaybeadequateforsomeresources,andmaybethemostpracticalapproachforaccessviamobiledevicesthathavelimitedcomputingpower.Foraccesstosensitivebusinessinformation,token-basedproductsordigitalcertificatesmaybemoreappropriate.Anadditionalfactoristhatorganizationsmayhavealreadyinstalledoneoftheseauthenticationtechnologiesandwanttoextenduseofthetechnologyfornewe-businessapplicationsaswell.Asolutionshouldbeabletosupportallofthesetechniques,whichimpliesthatitmustbeabletointerfacetotheleadingspecializedauthenticationtechnologies,suchasTokensfromRSA,orPKIsystemsfromEntrustorIBM.Amajoradvantageofasecurityinfrastructureisthatorganizationsshouldnothavetochangetheirapplicationlogicinordertochangeoraddnewauthenticationtechnologies.Further,theyshouldbeabletoimplementchangesatthesecurityinfrastructurelevelandhaveapplicationsevolvetransparently.

Inmanycases,centralizingsecurityintoaninfrastructureproducthastheadditionalsecuritybenefitthatofremovingtheneedtoholdauthorizationinformationinmultipleplaces,suchasapplicationserversanddesktops.Adoptingasecurityinfrastructurealsomeansitshouldnotbenecessarytochangethesecuritylogicinapplicationsinordertotakeadvantageofnewdevices—amajorconsiderationwhenorganizationsarelookingatsupportingaccessfromthousandsofhandheldwirelessdevicesduringthenextfewyears.Theinfrastructureshouldbeabletohandleaccessviawirelessnetworksandhandhelddevices,souserscanaccessapplicationswhetherathome,intheoffice,orontheroad.Thismeansthatitmustinterfacetothegatewaysthathandletrafficfromwirelessnetworks.

2.3SingleSign-On:

Arelatedandextremelyusefulbenefitinsometechnologyistheabilitytoprovidesinglesign-ontoallcorporateapplications.Whensecuritylogiciscodedintoeachapplication,thenumberofpasswordsandloginsthatusershavetorememberandentergrowsalongwiththenumberofe-businessapplications.Thisalsoimposesaconsiderablemanagementburden.Administratorshavetoadduserstoeachsystemtheywilluse,anddeletethemfromeachsystemiftheynolongerhaveaccess.Becausethesecurityinfrastructuremaintainsauthorizationinformationforeachuserandresource,itisabletoauthenticatetheuseronce,andthenseamlesslyprovideaccesstoeachsystemtheuserisauthorizedtouse.

2.4PolicySetting:

Aninfrastructureproductprovidesacentralpointforimplementingsecuritypolicyacrosstheorganization.Ideally,aproductwillallowtheestablishmentofsecuritypoliciesthatreflectthestructureoftheorganization,yetareflexibleenoughtofittheneedsofspecificgroupsorapplications.Thedefaultpolicyforemployeescouldbetoprovideaccesstohumanresourcesandothergeneralcorporateinformation.Specificneedsofdifferentgroupscanbemetsimplybycreatingnewgroupprofileswhereneeded.Forinstance,marketingpeoplemightgetaccesstothedefaultsystemsplusspecificsalesinformation.Thisapproachavoidstheneedtodefineandmaintainseparatesetsofaccessrightsforeachuser.

2.5SupportforexistingEnterpriseSoftware:

Thesolutionshouldintegrat

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试认证 > 财会金融考试

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1