电子商务10版教学课件 ch10

上传人:f****u 文档编号:122973549 上传时间:2020-03-08 格式:PPTX 页数:108 大小:6.41MB
返回 下载 相关 举报
电子商务10版教学课件 ch10_第1页
第1页 / 共108页
电子商务10版教学课件 ch10_第2页
第2页 / 共108页
电子商务10版教学课件 ch10_第3页
第3页 / 共108页
电子商务10版教学课件 ch10_第4页
第4页 / 共108页
电子商务10版教学课件 ch10_第5页
第5页 / 共108页
点击查看更多>>
资源描述

《电子商务10版教学课件 ch10》由会员分享,可在线阅读,更多相关《电子商务10版教学课件 ch10(108页珍藏版)》请在金锄头文库上搜索。

1、E Business Tenth Edition Chapter 10 Online Security 2013 Cengage Learning All Rights Reserved This edition is intended for use outside of the U S only with content that may be different from the U S Edition May not be scanned copied duplicated or posted to a publicly accessible website in whole or i

2、n part E Business Tenth Edition 2 2 Learning Objectives In this chapter you will learn What security risks arise in online business and how to manage them How to create a security policy How to implement security on Web client computers How to implement security in the communication channels between

3、 computers 2013 Cengage Learning All Rights Reserved This edition is intended for use outside of the U S only with content that may be different from the U S Edition May not be scanned copied duplicated or posted to a publicly accessible website in whole or in part E Business Tenth Edition Learning

4、Objectives cont d How to implement security on Web server computers What organizations promote computer network and Internet security 3 2013 Cengage Learning All Rights Reserved This edition is intended for use outside of the U S only with content that may be different from the U S Edition May not b

5、e scanned copied duplicated or posted to a publicly accessible website in whole or in part E Business Tenth Edition 4 Online Security Issues Overview Early Internet days Most popular use electronic mail Today s higher stakes Electronic mail shopping all types of financial transactions Common worry o

6、f Web shoppers Stolen credit card as it transmits over the Internet More likely to be stolen from computer where stored Chapter topic security in the context of electronic commerce 2013 Cengage Learning All Rights Reserved This edition is intended for use outside of the U S only with content that ma

7、y be different from the U S Edition May not be scanned copied duplicated or posted to a publicly accessible website in whole or in part E Business Tenth Edition 5 Origins of Security on Interconnected Computer Systems Data security measures taken by Roman Empire Coded information to prevent enemies

8、from reading secret war and defense plans Modern electronic security techniques Defense Department wartime use Orange Book rules for mandatory access control Business computers Initially adopted military s security methods Today s computing Requires comprehensive computer security plans 5 2013 Cenga

9、ge Learning All Rights Reserved This edition is intended for use outside of the U S only with content that may be different from the U S Edition May not be scanned copied duplicated or posted to a publicly accessible website in whole or in part E Business Tenth Edition 6 Computer Security and Risk M

10、anagement Computer security Asset protection from unauthorized access use alteration and destruction Physical security Includes tangible protection devices Alarms guards fireproof doors security fences safes or vaults and bombproof buildings Logical security Asset protection using nonphysical means

11、2013 Cengage Learning All Rights Reserved This edition is intended for use outside of the U S only with content that may be different from the U S Edition May not be scanned copied duplicated or posted to a publicly accessible website in whole or in part E Business Tenth Edition 7 Computer Security

12、and Risk Management cont d Threat Any act or object posing danger to computer assets Countermeasure Procedure physical or logical Recognizes reduces and eliminates threat Extent and expense of countermeasures Vary depending on asset importance 7 2013 Cengage Learning All Rights Reserved This edition

13、 is intended for use outside of the U S only with content that may be different from the U S Edition May not be scanned copied duplicated or posted to a publicly accessible website in whole or in part E Business Tenth Edition 8 Computer Security and Risk Management cont d Risk management model Four

14、general organizational actions Impact cost and probability of physical threat Also applicable for protecting Internet and electronic commerce assets from physical and electronic threats Electronic threat examples Impostors eavesdroppers thieves Eavesdropper person or device Listen in on and copy Int

15、ernet transmissions 8 2013 Cengage Learning All Rights Reserved This edition is intended for use outside of the U S only with content that may be different from the U S Edition May not be scanned copied duplicated or posted to a publicly accessible website in whole or in part E Business Tenth Editio

16、n 9 FIGURE 10 1 Risk management model Cengage Learning 2013 2013 Cengage Learning All Rights Reserved This edition is intended for use outside of the U S only with content that may be different from the U S Edition May not be scanned copied duplicated or posted to a publicly accessible website in whole or in part E Business Tenth Edition 10 Computer Security and Risk Management cont d Crackers or hackers people Write programs manipulate technologies Obtain unauthorized access to computers and ne

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号