电子商务英语 第二版 unit5

上传人:w****i 文档编号:92358017 上传时间:2019-07-09 格式:DOC 页数:14 大小:142.50KB
返回 下载 相关 举报
电子商务英语 第二版 unit5_第1页
第1页 / 共14页
电子商务英语 第二版 unit5_第2页
第2页 / 共14页
电子商务英语 第二版 unit5_第3页
第3页 / 共14页
电子商务英语 第二版 unit5_第4页
第4页 / 共14页
电子商务英语 第二版 unit5_第5页
第5页 / 共14页
点击查看更多>>
资源描述

《电子商务英语 第二版 unit5》由会员分享,可在线阅读,更多相关《电子商务英语 第二版 unit5(14页珍藏版)》请在金锄头文库上搜索。

1、Unit5 Security Issues of Electronic Commerce学习指导:本章将介绍:电子商务中互联网的安全问题电子商务中客户机的安全电子商务中计算机网络通信信道的安全5.1 the Internet Security of Electronic Commerce5.1.1 Network and Electronic CommerceIn the early days of the Internet, one of its most popular uses was electronic mail. Despite e-mails popularity, people

2、 have often worried that a business rival might intercept e-mail message for competitive again. Another fear was that employees non-business correspondence might be read by their supervisors, with negative repercussions. These were significant and realistic concerns.Today, the stakes are much higher

3、. The consequences of a competitor having unauthorized access to messages and digital intelligence are now far more serious than in the past. Electronic Commerce, in particular, makes security a concern for all users. A typical worry of Web shoppers is that their credit card numbers might be exposed

4、 to millions of people as the information travels across the Internet. Recent surveys show that more than 80 percent of all Internet users have at least some concern about the security of their credit card numbers in electronic commerce transactions. This echoes the fear shoppers have expressed for

5、many years about credit card purchases over the phone.5.1.2 Computer Security ClassificationsComputer security is the protection of assets front unauthorized access, use alteration, or destruction. There are two general types of security: physical and logical. Physical security includes tangible pro

6、tection devices, such as alarms, guards, fireproof doors, security fences or vaults, and bombproof buildings. Protection of assets using nonphysical means is called logical security. Any act or object that poses a danger to computer assets is known as a threat.Computer security is generally consider

7、ed to include three main elements: secrecy, integrity, and necessity (also known as denial of service). Secrecy refers to protecting against unauthorized date disclosure and ensuring the authenticity of the data source. Integrity refers to preventing unauthorized data modification. Necessity refers

8、to preventing data delays or denials (removal).Secrecy is the best known of the computer security elements. Every month, newspapers report on break-ins to government computers or theft of stolen credit card numbers that are used to artier goods and services. Integrity threats are reported less frequ

9、ently and, thus, may he less familiar to the public. For example, an integrity violation occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination. In this type of integrity violation, which is called a man-in-the-middle exp

10、loit, the contents of the e-mail are often changed in a way that negates the messages original meaning. Necessity violations take several forms, and they occur relatively frequently. Delaying a message or completely destroying it can have grave consequences. Suppose that a massage sent at 10:00 am.

11、to an online stockbroker includes an order to purchase 1000 shares of IBM at market price. If the stockbroker does not receive the message (because an attacker delays it) until 2:30 pm. and IBMs stock price has increased by $3, the buyer loses $3000.5.1.3 Managing RiskComputer security is the protec

12、tion of assets from unauthorized access, use, alteration, or destruction. Any act or object that poses a danger to computer assets is known as a threat.The same sort of risk management model applies to protecting Internet and electronic commerce assets from both physical and electronic threats. Exam

13、ples of the latter include impostors, eavesdroppers,and thieves. An eavesdroppers, is a person or device that can copy Internet transmissions. People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called crackers or hackers.To implement a go

14、od security scheme, organizations must identify risks, determine how to protect threatened assets, and calculate how much to spend to protect those assets. The primary focus in risk management protection is on the central issues of identifying the threats and determining the ways to protect assets f

15、rom those threats, rather than on the protection costs or value of assets.5.2 Electronic Commerce SecurityElectronic commerce is vulnerable to a wide range of security threats. Attacks against electronic commerce systems can disclose or manipulate proprietary Information. The three general assets th

16、at companies engaging in electronic commerce must protect are client computers, computer communication channels, and Web servers. Key security provisions in each of these parts of the Web client-Internet-Web server linkage are secrecy, integrity, and available service. Threats to electronic commerce can occur anywhere in the commerce chain. 5.2.1 Security for Client Computers Client computers, usually PCs, must be protected from threats that

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号