《电子商务英语》(英文版)Chapter 11 E-Commerce Security

Chapter 11 E-Commerce Security
Chapter 11 E-Commerce Security

Learning objectives Document the trends in computer and network security attacks 2. Describe the common security practices of businesses of all sizes 3. Understand the basic elements of Ec security 4. Explain the basic types of network security attacks 5. Describe common mistakes that organizations make in managing security 6. Discuss some of the major technologies for securing EC communications 7. Detail some of the major technologies for securing EC networks components Electronic Commerc Prentice Hall 2006
Electronic Commerce Prentice Hall © 2006 2 Learning Objectives 1. Document the trends in computer and network security attacks. 2. Describe the common security practices of businesses of all sizes. 3. Understand the basic elements of EC security. 4. Explain the basic types of network security attacks. 5. Describe common mistakes that organizations make in managing security. 6. Discuss some of the major technologies for securing EC communications. 7. Detail some of the major technologies for securing EC networks components

The Continuing Need for E-Commerce Security Computer Security Institute (CsI) Nonprofit organization located in San Francisco, California, that is dedicated to serving and training information, computer, and network security professionals Computer Emergency Response Team(CERT) Group of three teams at Carnegie Mellon University that monitor the incidence of cyber attacks analyze vulnerabilities, and provide guidance on protecting against attacks Electronic Commerce Prentice Hall 2006
Electronic Commerce Prentice Hall © 2006 3 The Continuing Need for E-Commerce Security Computer Security Institute (CSI) Nonprofit organization located in San Francisco, California, that is dedicated to serving and training information, computer, and network security professionals Computer Emergency Response Team (CERT) Group of three teams at Carnegie Mellon University that monitor the incidence of cyber attacks, analyze vulnerabilities, and provide guidance on protecting against attacks

Security Is Everyone's Business The dHs (Department of Homeland Security) strategy includes five national priorities 1. A national cyberspace security response system 2. A national cyberspace security threat and vulnerability reduction program 3. A national cyberspace security awareness and training program Securing governments cyberspace 5. National security and international security cooperation Electronic Commerce Prentice Hall 2006
Electronic Commerce Prentice Hall © 2006 4 Security Is Everyone’s Business • The DHS (Department of Homeland Security) strategy includes five national priorities: 1. A national cyberspace security response system 2. A national cyberspace security threat and vulnerability reduction program 3. A national cyberspace security awareness and training program 4. Securing governments’ cyberspace 5. National security and international security cooperation

Security Is Everyone's Business Accomplishing these priorities requires concerted effort at five levels Level 1-The Home User/Small Business evel 2-Large enterprises evel 3--Critical Sectors/Infrastructure Level 4-National lssues and vulnerabilities Leve|5— Global Electronic Commerc Prentice Hall 2006 5
Electronic Commerce Prentice Hall © 2006 5 Security Is Everyone’s Business • Accomplishing these priorities requires concerted effort at five levels: – Level 1—The Home User/Small Business – Level 2—Large Enterprises – Level 3—Critical Sectors/Infrastructure – Level 4—National Issues and Vulnerabilities – Level 5—Global

Security Is Everyone's Business National cyber Security Division(NCSD) A division of the department of Homeland Security charged with implementing U.S cyberspace security strategy Electronic Commerc Prentice Hall 2006
Electronic Commerce Prentice Hall © 2006 6 Security Is Everyone’s Business National Cyber Security Division (NCSD) A division of the Department of Homeland Security charged with implementing U.S. cyberspace security strategy

Basic security Issues What kinds of security questions arise? From the users perspective How can the user be sure that the web server is owned and operated by a legitimate company? How does the user know that the Web page and form do not contain some malicious or dangerous code or content How does the user know that the owner of the Web site will not distribute the information the user provides to some other party? Electronic Commerc Prentice Hall 2006
Electronic Commerce Prentice Hall © 2006 7 Basic Security Issues • What kinds of security questions arise? – From the user’s perspective: • How can the user be sure that the Web server is owned and operated by a legitimate company? • How does the user know that the Web page and form do not contain some malicious or dangerous code or content? • How does the user know that the owner of the Web site will not distribute the information the user provides to some other party?

Basic security Issues What kinds of security questions arise? From the companys perspective How does the company know the user will not attempt to break into the Web server or alter the pages and content at the site? How does the company know that the user will not try to disrupt the server so that it is not available to others? Electronic Commerc Prentice Hall 2006
Electronic Commerce Prentice Hall © 2006 8 Basic Security Issues • What kinds of security questions arise? – From the company’s perspective: • How does the company know the user will not attempt to break into the Web server or alter the pages and content at the site? • How does the company know that the user will not try to disrupt the server so that it is not available to others?

Basic security Issues What kinds of security questions arise? From both parties' perspectives How do both parties know that the network connection is free from eavesdropping by a third party "listening on the line? How do they know that the information sent back and-forth between the server and the users browser has not been altered? Electronic Commerc Prentice Hall 2006
Electronic Commerce Prentice Hall © 2006 9 Basic Security Issues • What kinds of security questions arise? – From both parties’ perspectives: • How do both parties know that the network connection is free from eavesdropping by a third party “listening” on the line? • How do they know that the information sent backand-forth between the server and the user’s browser has not been altered?

Basic security Issues authentication The process by which one entity verifies that another entity is who he, she, or it claims to be authorization The process that ensures that a person has the right to access certain resources auditing The process of collecting information about attempts to access particular resources, use particular privileges, or perform other security actions Electronic Commerc Prentice Hall 2006
Electronic Commerce Prentice Hall © 2006 10 Basic Security Issues authentication The process by which one entity verifies that another entity is who he, she, or it claims to be authorization The process that ensures that a person has the right to access certain resources auditing The process of collecting information about attempts to access particular resources, use particular privileges, or perform other security actions
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 《电子商务英语》(英文版)Chapter 10 E-Auctions.ppt
- 《电子商务英语》(英文版)Chapter 9 Mobile Commerce and Pervasive Computing.ppt
- 《电子商务英语》(英文版)Chapter 8 Innovative EC Systems:From E-Government and E-Learning to C2C.ppt
- 《电子商务英语》(英文版)Chapter 7 E-Supply Chains, Collaborative Commerce, Intrabusiness EC, and Corporate Portals.ppt
- 《电子商务英语》(英文版)Chapter 6 Public B2B Exchanges and Support Services.ppt
- 《电子商务英语》(英文版)Chapter 5 B2B E-Commerce:Selling and Buying in Private E-Markets.ppt
- 《电子商务英语》(英文版)Chapter 4 Consumer Behavior, Market Research, and Advertisement.ppt
- 《电子商务英语》(英文版)Chapter 3 Retailing in Electronic Commerce:Products and Services.ppt
- 《电子商务英语》(英文版)Chapter 2 E-Marketplaces:Structures, Mechanisms, Economics, and Impacts.ppt
- 《电子商务英语》(英文版)Chapter 1 Overview of Electronic Commerce.ppt
- 《管理定律》(英文版)The Little SAS Book.pdf
- 《管理学原理模拟试题》试题一(附答案).doc
- 《投资基金管理》模拟试题一(附答案).doc
- 中国人民大学信息学院:《运筹学》课程教学资源(PPT课件讲稿)动态规划.ppt
- 中国人民大学信息学院:《运筹学》课程教学资源(作业习题)习题作业及案例答案.doc
- 中国人民大学信息学院:《运筹学》课程教学资源(PPT课件讲稿)第九章 整数规划.ppt
- 中国人民大学信息学院:《运筹学》课程教学资源(PPT课件讲稿)第八章 用PERT&CPM进行项目管理.ppt
- 中国人民大学信息学院:《运筹学》课程教学资源(PPT课件讲稿)第七章 网络最优化问题.ppt
- 中国人民大学信息学院:《运筹学》课程教学资源(PPT课件讲稿)第六章 运输问题和指派问题.ppt
- 中国人民大学信息学院:《运筹学》课程教学资源(PPT课件讲稿)第五章 线性规划的What-If分析.ppt
- 《电子商务英语》(英文版)Chapter 12 Electronic Payment Systems.ppt
- 《电子商务英语》(英文版)Chapter 13 Order Fulfillment, eCRM, and Other Support Services.ppt
- 《电子商务英语》(英文版)Chapter 14 E-Commerce Strategy and Global EC.ppt
- 《电子商务英语》(英文版)Chapter 15 Economics and Justification of Electronic Commerce.ppt
- 《电子商务英语》(英文版)Chapter 16 Launching a Successful Online Business and EC Project.ppt
- 《电子商务英语》(英文版)Chapter 17 Legal, Ethical, and Social Impacts of EC.ppt
- 《电子商务英语》(英文版)Chapter 18 Building EC Applications and Infrastructure.ppt
- 《助理人力资源管理师》国家职业资格三级考试(试题及答案)2006年5月助理人力资源管理师试题及答案.doc
- 《助理人力资源管理师》国家职业资格三级考试(试题及答案)2005年5月助理人力资源管理师试题及答案.doc
- 《助理人力资源管理师》国家职业资格三级考试(试题及答案)2005年11月助理人力资源管理师试题及答案.doc
- 《助理人力资源管理师》国家职业资格三级考试(试题及答案)2003年11月助理人力资源管理师试题及答案.doc
- 《助理人力资源管理师》国家职业资格三级考试(试题及答案)2004年6月助理人力资源管理师试题及答案.doc
- 《助理人力资源管理师》国家职业资格三级考试(试题及答案)2003年6月助理人力资源管理师试题及答案.doc
- 《助理人力资源管理师》国家职业资格三级考试(试题及答案)2003年8月助理人力资源管理师试题及答案.doc
- 《助理人力资源管理师》国家职业资格三级考试(试题及答案)2004年11月助理人力资源管理师试题及答案.doc
- 北京林业大学经济管理学院:《项目管理》讲义PPT课件(共十二章)(夏自谦).ppt
- 中国人民大学商学院:《管理会计学》课程教学资源(PPT课件讲稿)第一章 管理会计概论(主讲:孙茂竹).ppt
- 中国人民大学商学院:《管理会计学》课程教学资源(PPT课件讲稿)第二章 变动成本法.ppt
- 中国人民大学商学院:《管理会计学》课程教学资源(PPT课件讲稿)第三章 本量利分析.ppt
- 中国人民大学商学院:《管理会计学》课程教学资源(PPT课件讲稿)第四章 经营预测.ppt