版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
電子商務(wù)信息安全中英文對(duì)照外文翻譯文獻(xiàn)電子商務(wù)信息安全中英文對(duì)照外文翻譯文獻(xiàn)(文檔含英文原文和中文翻譯)原文:E-commerceInformationSecurityProblemsⅠ.IntroductionE-commerce(E-Business)isinopennetworks,includingbetweenenterprises(B2B),businessandconsumers(B2C)commercialtransactions,comparedwiththetraditionalbusinessmodel,e-commercewithefficient,convenient,coveredwiderangeofcharacteristicsandbenefits.However,e-commerceopenthisInternet-baseddataexchangeisgreatitssecurityvulnerabilities,securityisacoree-commercedevelopmentconstraintsandkeyissues.Inthispaper,thebasicideasandprinciplesofsystemsengineering,analyzesthecurrentsecuritythreatsfacinge-commerce,inthisbasedonsecuritytechnologyfromtheperspectiveofdevelopmenttrendofe-commerce.Ⅱ.E-commercemodelModerne-commercetechnologyhasfocusedontheestablishmentandoperationofthenetworkofstores.Networkinthedepartmentstoresandrealstoresnodistinctionbetweenstructureandfunction,differencesintheirfunctionandstructuretoachievethesemethodsandthewaybusinessoperate.WebstorefromthefrontviewisaspecialkindofWEBserver.WEBsiteofmodernmultimediasupportandagoodinteractivefeatureasthebasisfortheestablishmentofthisvirtualstore,socustomerscan,asinarealsupermarketpushingashoppingcarttoselectgoods,andfinallyinthecheckoutcheckout.Theseonlinestoresalsoconstitutethethreepillarsofsoftware:catalog,shoppingcartandcustomercheckout.Customersuseanelectroniccurrencyandtransactionmuststorecustomersandstoresaresafeandreliable.Behindthestoreinthenetwork,enterprisesmustfirsthaveaproductstoragewarehouseandadministration;secondnetworktosellproductsbymailorotherdeliverychannelstocustomershands;Third,enterprisesshouldalsoberesponsibleforproductafter-salesservice,Thisservicemaybethroughnetworks,maynot.InternettransactionsareusuallyafirstPaythebillandgettinggoodsshopping.Forcustomers,convenienceisthatthegoodspurchasedwillbedirectlydeliveredtotheirhome,buthardtofeelassuredthatthegoodscannotbeconfirmeduntilthehandsreachintotheirownhands,whatitis.Therefore,thecredibilityofthestorenetworkandservicequalityisactuallythekeytothesuccessofe-commerce.Ⅲ.thekeytodevelopmentofelectroniccommerceE-commerceinthetelecommunicationsnetworktodevelop.Therefore,theadvancedcomputernetworkinfrastructureandtelecommunicationspolicyeasingthedevelopmentofelectroniccommercehasbecomeaprerequisite.Currently,telecomservices,highprices,limitedbandwidth,theserviceisnottimelyornotreliableandsothedevelopmentofe-commercehasbecomeaconstraint.Speeduptheconstructionoftelecommunicationsinfrastructure,tobreakthetelecommunicationsmarketmonopoly,introducecompetitionmechanismtoensurefaircompetitioninthetelecommunicationsbusiness,topromotenetworking,ensuretoprovideuserswithlow-cost,high-speed,reliablecommunicationsservicesisagoodconstructiontargetnetworkenvironment,butalsoalloftheworldcommontask.E-commercethemostprominentproblemistosolvetheon-lineshopping,tradingandclearingofsecurityissues,includingtheestablishmentofe-commercetrustbetweenallthemainissues,namelytheestablishmentofsafetycertificationsystem(CA)issues;choosesafetystandards(suchasSET,SSL,PKI,etc.)problems;usingencryptionanddecryptionmethodandencryptionstrengthproblems.Establishmentofsecurityauthenticationsystemwhichisthekey.Onlinetradingandtraditionalfacetofaceorwrittentransactionsindifferentways,itistransmittedthroughthenetworkbusinessinformationandtradeactivities.Thesecurityofonlinetransactionsmeans:Validity:thevalidityofthecontracttoensureonlinetransactions,topreventsystemfailure,computerviruses,hackerattacks.Confidentiality:thecontentofthetransaction,bothtransactionsaccount,thepasswordisnotrecognizedbyothersandstealing.Integrity:topreventtheformationofunilateraltransactioninformationandmodify.Therefore,thee-commercesecuritysystemshouldinclude:secureandreliablecommunicationsnetworktoensurereliabledatatransmissionintegrity,preventviruses,hackers;electronicsignaturesandotherauthenticationsystems;completedataencryptionsystemandsoon.Ⅳ.e-commercesecurityissuesfacingAse-commercenetworkisthecomputer-based,itinevitablyfacesanumberofsecurityissues.(1)InformationleakPerformanceine-commercefortheleakageofbusinesssecrets,includingtwoaspects:thepartiesaredealingtransactionsbythirdpartiestostealthecontents;transactiontotheotherpartytoprovidedocumentsusedillegalusebythirdparties.(2)AlteredE-commerceinformationforbusinessperformanceintheauthenticityandintegrityissues.Electronictransactioninformationinthenetworktransmissionprocessmaybeotherstoillegallymodify,deleteorre-changed,sothatinformationaboutitsauthenticityandintegrity.(3)IdentificationWithoutidentification,third-partytransactionsislikelytofaketheidentityofpartiestoadealbreaker,damagethereputationofbeingcounterfeitorstolenbyonepartytothetransactionfakeresultsandsoon,foridentification,thetransactionbetweenthetwosidescanpreventsuspicionsituation.(4)ComputervirusesComputervirusappeared10years,avarietyofnewvirusanditsvariantsrapidlyincreasing,theemergenceoftheInternetforthespreadofthevirushasprovidedthebestmedium.Manynewvirusesdirectlyusingthenetworkasitstransmission,aswellasmanyvirusesspreadfasterthroughdriednetworks,frequentlycausingbillionsofdollarsineconomiclosses.(5)HackerWiththespreadofavarietyofapplicationtools,hackershavebeenpopular,andarenotinthepast;non-computerexpertcannotbeahacker.HavekickedYahoo'smafiaboydidnotreceiveanyspecialtraining,onlyafewattackstotheuserstodownloadsoftwareandlearnhowtousetheInternetonabigdry.Ⅴ.e-commercesecurityandsafetyfactorsEnterpriseapplicationsecurityisthemostworriedaboute-commerce,andhowtoprotectthesecurityofe-commerceactivities,willremainthecoreofe-commerceresearch.Asasecuree-commercesystem,wemustfirsthaveasafe,reliablecommunicationnetwork,toensurethattransactioninformationsecureandrapidtransmission;seconddatabaseservertoensureabsolutesecurityagainsthackersbreakintonetworkstostealinformation.E-commercesecuritytechnologiesincludeencryption,authenticationtechnologyande-commercesecurityprotocols,firewalltechnology.(A),encryptiontechnologyToensurethesecurityofdataandtransactionstopreventfraud,toconfirmthetrueidentityoftransactionparties,e-commercetoadoptencryptiontechnology,encryptiontechnologyisthroughtheuseofcodeorpasswordtoprotectdatasecurity.Forencrypteddataiscalledplaintext,specificallythroughtheroleofaencryptionalgorithm,theconversionintociphertext,wewillexpressthischangeastheciphertextiscalledencryption,theciphertextbythedecryptionalgorithmtoformaclearroleintheoutputofthisaprocessknownasdecryption.Encryptionalgorithmknownasthekeyparametersused.Thelongerthekey,thekeyspaceislarge,traversethekeyspacethemoretimespent,thelesslikelycracked.Encryptiontechnologycanbedividedintotwocategories:symmetricencryptionandasymmetricencryption.SymmetricencryptiontothedataencryptionstandardDES(DataEncryptionStandard)algorithmisrepresented.AsymmetricencryptionisusuallyRSA(RivetsShamirAleman)algorithmisrepresented.(B),authenticationCommonlyusedsecurityauthenticationtechnologies:digitalsignatures,digitalcertificates,digitaltimestamp,CAsecurityauthenticationtechnology.(C),hackerprotectiontechnologyCurrently,hackershavebecomethebiggeste-commercesecuritythreats,thuspreventinghackingnetworksecuritytechnologyhasbecomethemaincontent,bygovernmentsandindustryarehighlyvalued.Hackingtechniquesincludebufferoverflowattacks,Trojans,portscans,IPfraud,networkmonitoring,passwordattacks,anddenialofserviceDosattacks.Atpresent,peoplehavemademanyeffectiveanti-hackertechnologies,includingfirewalls,intrusiondetection,andnetworksecurityevaluationtechniques.Ⅵ.thefuturesecurityofe-commerceIncreasinglyseveresecurityproblems,aregrowingthreattonationalandglobaleconomicsecurity,governmentshavebeenbasedoneffortsinthefollowingareas:(1)Strengthenthelegislation,refertotheadvancedcountrieshaveeffectivelegislation,innovative,e-commerceandimprovetheprotectionofthelawsagainstcyber-crimesecuritysystem.(2)Establishmentofrelevantinstitutions,totakepracticalmeasurestocombatcybercrime.Developmentofthelaw,theimplementingagenciesshouldalsobeusedforitsrelevantlaws,whichmustestablishanindependentoversightbody,suchastheexecutingagencytoimplementthelaw.(3)Increaseinvestmentinnetworksecuritytechnology;improvethelevelofnetworksecuritytechnology.E-commercesecuritylawistheprerequisiteandbasisfordevelopmentandsecuree-commercesecuritytechnologyisameansofprotection.Therearemanysecurityissuesaretechnicalreasons,itshouldincreasethetechnologyresources,andcontinuouslypushforwardthedevelopmentofoldtechnologiesanddevelopingnewsecuritytechnology.(4)ToencourageenterprisestoprotectthemselvesagainstInternetcrimeagainst.Toavoidattack,companiescannotholdthingstochance,mustattachgreatimportancetosystemvulnerabilities,intimetofindsecurityholestoinstalltheoperatingsystemandserverpatches,andnetworksecuritydetectionequipmentshouldbeusedregularlyscanthenetworkmonitoring,developasetofcompletesecurityprotectionsystemtoenableenterprisestoformasystemandcombinedwiththecomprehensiveprotectionsystem.(5)Tostrengtheninternationalcooperationtostrengthenglobaleffortstocombatcybercrime.Ase-commerceknowsnoborders,nogeographical,itisacompletelyopenarea,sotheactionagainstcybercrimee-commercewillalsobeglobal.ThiswillrequireGovernmentstostrengthencooperation,cannothave"thesayingwhichgoes,regardlessofothers,creamtile"misconception.(6)Tostrengthenthenetworkofnationalsafetyeducation,payattentiontothecultivationofoutstandingcomputer.Ⅶ.ConclusionE-commerceinChinahasdevelopedrapidlyinrecentyears,butthesecurityhasnotyetestablished.Thishasanimpactonthedevelopmentofelectroniccommerceasabarrier.Tothisend,wemustacceleratetheconstructionofthee-commercesecuritysystems.Thiswillbeacomprehensive,systematicprojectinvolvingthewholesociety.Specifically,wewantlegalrecognitionofelectroniccommunicationsrecordsoftheeffectivenessoflegalprotectionforelectroniccommerce;weshouldstrengthentheresearchonelectronicsignatures,toprotecte-commercetechnology;weneedtobuilde-commerceauthenticationsystemassoonaspossible,toorganizeprotectionforelectroniccommerce.Moreover,fore-commercefeatureswithoutborders,weshouldalsostrengtheninternationalcooperation,sothate-commercetrulyplaysitsrole.Onlyinthisway,wecanadapttothetimesPromotingChina'seconomicdevelopment;alsotheonlywaywecanintheeconomicglobalizationtoday,toparticipateininternationalcompetition,andthusgainacompetitiveadvantage.Source:MichaelHecker,TharamS.Dillon,andElizabethChangIEEEInternetComputingprenticehallpublishing,2002電子商務(wù)中的信息安全問(wèn)題一、引言電子商務(wù)(E-Business)是發(fā)生在開(kāi)放網(wǎng)絡(luò)上的包括企業(yè)之間(B2B)、企業(yè)和消費(fèi)者之間(B2C)的商業(yè)交易,與傳統(tǒng)商務(wù)模式相比,電子商務(wù)具有高效、便捷、覆蓋范圍廣等特點(diǎn)和優(yōu)點(diǎn)。然而,電子商務(wù)這種基于Internet的開(kāi)放式的數(shù)據(jù)交換是的其安全具有很大的脆弱性,安全問(wèn)題是制約電子商務(wù)發(fā)展的一個(gè)核心和關(guān)鍵問(wèn)題。本文從系統(tǒng)工程的基本觀點(diǎn)和原理出發(fā),分析了目前電子商務(wù)面臨的各種安全威脅,在此基礎(chǔ)上,從安全技術(shù)角度,探討電子商務(wù)的發(fā)展趨勢(shì)和方向二、電子商務(wù)模式現(xiàn)代電子商務(wù)技術(shù)已經(jīng)集中于網(wǎng)絡(luò)商店的建立和運(yùn)作。網(wǎng)絡(luò)商店和真實(shí)商店在部門(mén)結(jié)構(gòu)和功能上沒(méi)有區(qū)別,不同點(diǎn)在于其實(shí)現(xiàn)這些功能和結(jié)構(gòu)的方法以及商務(wù)運(yùn)作的方式。網(wǎng)絡(luò)商店從前臺(tái)看是一種特殊的WEB服務(wù)器?,F(xiàn)代WEB網(wǎng)站的多媒體支持和良好的交互性功能成為建立這種虛擬商店的基礎(chǔ),使得顧客可以像在真實(shí)的超級(jí)市場(chǎng)一樣推著購(gòu)物車(chē)挑選商品,并最后在付款臺(tái)結(jié)賬。這也就構(gòu)成網(wǎng)上商店軟件的三大支柱:商品目錄、顧客購(gòu)物車(chē)和付款臺(tái)。顧客運(yùn)用某種電子貨幣和商店進(jìn)行交易必須對(duì)顧客和商店都是安全可靠的。而在網(wǎng)絡(luò)商店的背后,企業(yè)首先要具備商品的存儲(chǔ)倉(cāng)庫(kù)和管理機(jī)構(gòu);其次要將網(wǎng)絡(luò)上銷(xiāo)售的產(chǎn)品通過(guò)郵政或其他渠道投遞到顧客手里;第三,企業(yè)同樣要負(fù)責(zé)產(chǎn)品的售后服務(wù),這種服務(wù)可能是通過(guò)網(wǎng)絡(luò)的,也可能不是。網(wǎng)絡(luò)交易通常是一種先交錢(qián)后拿貨的購(gòu)物方式。對(duì)客戶(hù)而言,其方便處在于購(gòu)得的商品會(huì)直接投遞到自己家里,而難以放心的是在商品到達(dá)手中之前并不能確認(rèn)到自己手中的究竟是什么。因此網(wǎng)絡(luò)商店的信譽(yù)和服務(wù)質(zhì)量實(shí)際上是電子商務(wù)成功與否的關(guān)鍵。三、電子商務(wù)發(fā)展的關(guān)鍵環(huán)節(jié)電子商務(wù)是在電信網(wǎng)絡(luò)上發(fā)展起來(lái)的。因此,先進(jìn)的計(jì)算機(jī)網(wǎng)絡(luò)基礎(chǔ)設(shè)施和寬松的電信政策就成為發(fā)展電子商務(wù)的前提。目前,電信服務(wù)價(jià)格過(guò)高,帶寬有限,服務(wù)不及時(shí)或不可靠等因素已經(jīng)成為發(fā)展電子商務(wù)的制約因素。加快電信基礎(chǔ)設(shè)施建設(shè),打破電信市場(chǎng)的壟斷,引進(jìn)競(jìng)爭(zhēng)機(jī)制,保證電信業(yè)務(wù)公平競(jìng)爭(zhēng),促進(jìn)網(wǎng)絡(luò)互聯(lián),確保為用戶(hù)提供廉價(jià),高速,可靠的通信服務(wù)是良好網(wǎng)絡(luò)環(huán)境的建設(shè)目標(biāo),也是世界各國(guó)面臨的共同課題。開(kāi)展電子商務(wù)最突出的問(wèn)題是要解決網(wǎng)上購(gòu)物、交易和結(jié)算中的安全問(wèn)題,其中包括建立電子商務(wù)各主體之間的信任問(wèn)題,即建立安全認(rèn)證體系(CA)問(wèn)題;選擇安全標(biāo)準(zhǔn)(如SET、SSL、PKI等)問(wèn)題;采用加、解密方法和加密強(qiáng)度問(wèn)題。其中建立安全認(rèn)證體系是關(guān)鍵。網(wǎng)上交易與傳統(tǒng)的面對(duì)面或書(shū)面的交易方式不同,它是通過(guò)網(wǎng)絡(luò)傳輸商務(wù)信息和進(jìn)行貿(mào)易活動(dòng)的。網(wǎng)上交易的安全問(wèn)題意味著:有效性:保證網(wǎng)上交易合同的有效性,防止系統(tǒng)故障、計(jì)算機(jī)病毒、黑客攻擊。保密性:對(duì)交易的內(nèi)容、交易雙方賬號(hào)、密碼不被他人識(shí)別和盜取。完整性:防止單方面對(duì)交易信息的生成和修改。所以,電子商務(wù)的安全體系應(yīng)包括:安全可靠的通信網(wǎng)絡(luò),保證數(shù)據(jù)傳輸?shù)目煽客暾?,防止病毒、黑客入侵;電子簽名和其他身份認(rèn)證系統(tǒng);完備的數(shù)據(jù)加密系統(tǒng)等等。四、電子商務(wù)面臨的安全問(wèn)題由于電子商務(wù)是以計(jì)算機(jī)網(wǎng)絡(luò)為基礎(chǔ)的,因此它不可避免面臨著一系列的安全問(wèn)題。(1)信息泄漏在電子商務(wù)中表現(xiàn)為商業(yè)機(jī)密的泄漏,主要包括兩個(gè)方面:交易雙方進(jìn)行交易的內(nèi)容被第三方竊??;交易一方提供給另一方使用的文件被第三方非法使用。(2)竄改電子商務(wù)中表現(xiàn)為商業(yè)信息的真實(shí)性和完整性的問(wèn)題。電子的交易信息在網(wǎng)絡(luò)上傳輸?shù)倪^(guò)程中,可能被他人非法修改、刪除或重改,這樣就使信息失去了真實(shí)性和完整性。(3)身份識(shí)別如果不進(jìn)行身份識(shí)別,第三方就有可能假冒交易一方的身份,以破壞交易、破壞被假冒一方的信譽(yù)或盜取被假冒一方的交易成果等,進(jìn)行身份識(shí)別后,交易雙方就可防止相互猜疑的情況。(4)電腦病毒問(wèn)題電腦病毒問(wèn)世十幾年來(lái),各種新型病毒及其變種迅速增加,互聯(lián)網(wǎng)的出現(xiàn)又為病毒的傳播提供了最好的媒介。不少新病毒直接利用網(wǎng)絡(luò)作為自己的傳播途徑,還有眾多病毒借助干網(wǎng)絡(luò)傳播得更快,動(dòng)輒造成數(shù)百億美元的經(jīng)濟(jì)損失。(5)黑客問(wèn)題隨著各種應(yīng)用工具的傳播,黑客己經(jīng)大眾化了,不像過(guò)去那樣非電腦高手不能成為黑客。曾經(jīng)大鬧雅虎網(wǎng)站的黑手黨男孩就沒(méi)有受過(guò)什么專(zhuān)門(mén)訓(xùn)練,只是向網(wǎng)友下載了幾個(gè)攻擊軟件并學(xué)會(huì)了如何使用,就在互聯(lián)網(wǎng)上大干了一場(chǎng)。五、電子商務(wù)安全因素與安全技術(shù)安全問(wèn)題是企業(yè)應(yīng)用電子商務(wù)最擔(dān)心的問(wèn)題,而如何保障電子商務(wù)活動(dòng)的安全,將一直是電子商務(wù)的核心研究領(lǐng)域。作為一個(gè)安全的電子商務(wù)
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024-2030年中國(guó)地毯行業(yè)市場(chǎng)發(fā)展趨勢(shì)及投資需求預(yù)測(cè)報(bào)告
- 2024-2030年中國(guó)回程車(chē)輛行業(yè)供需狀況發(fā)展戰(zhàn)略規(guī)劃分析報(bào)告
- 2024-2030年中國(guó)售電公司行業(yè)未來(lái)發(fā)展創(chuàng)新調(diào)研規(guī)劃研究報(bào)告
- 2024年版權(quán)許可與內(nèi)容分發(fā)合同
- 湄洲灣職業(yè)技術(shù)學(xué)院《特殊學(xué)校教材教法》2023-2024學(xué)年第一學(xué)期期末試卷
- 2024年某科技公司與某游戲公司關(guān)于游戲開(kāi)發(fā)的合同
- 中國(guó)速滑“勞?!表n梅笑談冬奧
- 呂梁學(xué)院《信息界面設(shè)計(jì)》2023-2024學(xué)年第一學(xué)期期末試卷
- 2024年度結(jié)婚典禮拍攝合同
- 2024年標(biāo)志性樓頂LED燈光字安裝制作合作協(xié)議版B版
- 《維修車(chē)間管理》課件
- 北京市海淀區(qū)101中學(xué)2023年數(shù)學(xué)七年級(jí)第一學(xué)期期末經(jīng)典試題含解析
- 高處作業(yè)吊籃危險(xiǎn)源辨識(shí)及風(fēng)險(xiǎn)評(píng)價(jià)表
- 房地產(chǎn)開(kāi)發(fā)項(xiàng)目 水土保持方案
- 八年級(jí)歷史上冊(cè) 第一學(xué)期期末考試卷(人教福建版)
- 人教版高中必修一(教案)Unit-2-Travelling-Around-Discovering-U
- 項(xiàng)目電氣工程師總結(jié)
- 陳赫賈玲小品《歡喜密探》臺(tái)詞劇本
- 部編版語(yǔ)文九年級(jí)下冊(cè)-第三單元古詩(shī)文默寫(xiě)-理解性默寫(xiě)(排版-附答案)
- 醫(yī)院培訓(xùn)課件:《個(gè)人防護(hù)》
- 水工建筑物考試試題及答案
評(píng)論
0/150
提交評(píng)論