ImageVerifierCode 换一换
格式:DOCX , 页数:18 ,大小:34.80KB ,
资源ID:8121551      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/8121551.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(电子商务的安全The security of EB中英对译.docx)为本站会员(b****6)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

电子商务的安全The security of EB中英对译.docx

1、电子商务的安全The security of EB中英对译The security of EBSomething worried in EB applicationAt the same time that internet brings people endless convenience and opportunities ,it also brings risks to them .since EB is conducted on internet or WWW, and internet and web are such open systems ,so when data must

2、be electronically processed, transmitted and stored in some mode some risks occurred .the risks associated with internet and EB applications may occur in many instances different ways ,for example ,data may be stolen ,corrupted ,misused altered or falsely generated ,compute system or website may be

3、attacked and make render systems unable to operate properly ,hardware or the users ,or they may lose money or their businesses come to ruin .Lets look at the Figure about perpetration made by outside intruders as reported in a l996 survey for fortune 1000 firms in America:Activity performed by outsi

4、de intruders Probing /scanning of system 14.6%Compromised e-mail /documents 12.6%Introduced virus 10.6% Compromised trade secrets 9.8% Download data 8.1%Mainpulated data integrity 6.8%Installed a sniffer 6.6%Denied use of services 6.3% Trojan logons 5.8%Stole password files 5.6%IP spoofing 4.8% Hara

5、ssed personal 4.5%Other (specified) 3.0%Publicized intrusion 0.5% Stole /diverted money 0.3%Form the figure you can see that the cost of damages or lost brought by Internet attackers are very serious, more important thing is, these attacking may heavily influence your business, even ruin your busine

6、ss.Why are so many unhappy things happened? There are two reasons .One reasons is that Internet is a new generation itself .it is developing very fast.Its attractive perspective ,multifunctional service and exponential growth rate of web sites opened on it attract more and more companies and private

7、 users to join in just like to join a gold rush .But in many aspects ,such as the information technologies ,the protocols ,the languages ,the standards ,polices and laws ,which are the premise of Internet operations ,are far From integrity .John .R .Patruck the vice president of the IBM ,Internet te

8、chnologist ,described the growing information superhighway as a real highway under construction .He said :”all the lanes have not yet been paved ,there are a few exit ramps that do not go anywhere ,and you will encounter occasional accidents “.The other reason is that people are so eager to join Int

9、ernet and EB applications that they havent enough time to fully think over the details that may involve in , so they cant be ready at any time to deal the Internet perpetrators a head-on blows , for they havent enough knowledge and experiences about the risks they may encounter ,even they dont know

10、how to detect the attempts of these perpetrators ,so ,they havent an adequate control over these perpetrations .The heavy lessons of Internet perpetration draw peoples attention to improving the situation of Internet and EB security, for they expect to conduct their electronic business in a secure c

11、ircumstance. Generally, the basic requirement for EB security can be conclude like this:1. To secure the privacy of electronic transaction This means all the electronic data are protected from unauthorized disclosure .there are many kinds of transaction data .The first category of them is public dat

12、a ,such as advertisements and product lists ,this kind of data can be ready by any person ,but should be properly protected from being unauthorized disturbed or altered .The second category is copyright data that are not secret ,but can only be read or used after the fee is paid . In order to make p

13、rofit from copyright data, the security control must be stressed. The third category is secret data ,these datas names are not secret ,but the contents are secret ,such as consumer a counts or personal files .The last category is confidential data .the existence and contents of this kind of data are

14、 all secret .Nobody should know the existence and content of the data except the authorized persons .The assessing and intend to asses to these confidential data should be monitored strictly and recorded in time manner .so ,we should take different methods to secure different kinds of data .The anot

15、her meaning of privacy is that the electronic transactions and their contents should and could not be known by any person except the trading partners, currently ,the security techniques. used for secure the privacy are encryption ,firewall and passwords .2. To secure the integrity of electronic tran

16、sactions.This means to secure and verify the data elements and its contents captured in an electronic transaction base on the agreed elements , and maintain the integrity of the data elements in processing and storage procedures and do not be altered in any unauthorized fashion . But when a message

17、is sent electronically, how can the receiver ensure that the message received is exactly the same as the message transmitted by the sender, an effective means called hashing can be used to ensure message integrity. A hash of the message is computed using an algorithm and the message contents the has

18、h value is sent along with the message , when message is received ,another hash is calculated by the receiver using the same hashing algorithm .The two hash values are compared and a match can indicate that the message received is the same as the sent one .Hashing is similar to the use of check-sum

19、digits in accounting .Hashing is not encryption ,but it can be used in conjunction with encryption for adding security.3. Security assurance systems.when the user receives the message sent electronically by a sender ,both the user and sender s identity need to be conformed in order to verify whether

20、 the sender or receiver is he /she claims to be .generally ,their identities could be proved through checking their passwords ,digital signatures or digital certificates issued by the authorized third party .another thing need to assure is whether the transaction exists ,which is called “Non repudia

21、tion ”. This means to ensure that the sender cannot falsely deny sending and the receiver cannot falsely deny receiving that message .The security techniques used for proofing of origin ,receipt and contents are time stamps ,digital signatures ,bidirectional hashing and confirmation services .In con

22、clusion ,the EB security requirement is that the content and privacy of electronic transaction must be protected from being intercepted ,abused ,altered ,deleted or disturbed during the electronic data interchange processing ,transmitting and storing .An estimated data shows that the information sec

23、urity breaches are rising .Who are those Internet perpetrators ?The America President s commission on critical infrastructure protection , which was established by former president Clinton in July 1996,is charged with “recommending a national strategy for protecting and assuring critical infrastruct

24、ures from physical and cyber threats.” The commission defines a threat as :”Anyone with the capability ,technology ,opportunity and intent to do harm .Potential threats can be foreign or domestic , internal or external ,state sponsored or a single rogue element ,terrorists ,insiders ,disgruntled emp

25、loyees ,and hackers are all included in this profile .”These breaches are really a threat against Internet users .So many businesses and customers slow down the pace of adopting EB applications in all directions, and even some new or potential Internet users are reluctant to begin with any EB applic

26、ations unless they are ensured that their Internet and Web based transactions are safe secure and backed up by appropriate controls. Generally speaking, the complete Internet security system should include controls in these following aspects, and every one of them could be indispensable:To employ th

27、e technology for detecting and resisting the Internet perpetration such as fire walls and cryptography and authentication techniques and other new inventions in this field.To set up the risks control policies and supervisory methods for security system management, such as, who is in charge of mainta

28、ining and managing of security system? How do they conduct their routine works and how to evaluate their working results?To establish the relevant laws, policies and regulations by every country, government, professional institution and agency to restrain and punish those Internet perpetrations.Besi

29、des, another factor should also be taken into consideration ,that is ,although detecting and resisting all those known attacks is an important step in protecting a firm s assets and critical data ,the companies must evaluate the cost for doing that and the benefit got from doing that before they tak

30、e action.FirewallWhat is the firewall? Actually, firewall is a special world always used in construction field .It is a kind of walls that is made of fire-resistant material and built between buildings .When a fire breaks out on neighborhood building; it can retard the spread of the fire to other lo

31、cations. But the firewall used in Internet that provides similar controls is not a real wall .It is a component system of the computer hardware and software, which is used as the protection system of a certain network to prevent unauthorized users from accessing those networks. A typical firewall al

32、ways be “built ” on the gateway point ,where is the accessing point between Intranet and Internet ,or the accessing point between a database (subnet inside the Internet )and Intranet .It controls the information services provided by the certain subnet or database .For example ,some confidential databases can only be visited by the users who is specially authorized to do so .Of course , if the Intranet or host computer is totally isolated from network ,the firewall will be no use .But in many instances circumstances ,it is impossible for a company involved in electronic business to tot

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1