- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Unit5 Security Issues of Electronic Commerce
学习指导:
本章将介绍:
·电子商务中互联网的安全问题
电子商务中客户机的安全
电子商务中计算机网络通信信道的安全5.1 the Internet Security of Electronic Commerce
5.1.1 Network and Electronic Commerce
In the early days of the Internet, one of its most popular uses was electronic mail. Despite e-mail’s popularity, people have often worried that a business rival might intercept e-mail message for competitive again. Another fear was that employees’ non-business correspondence might be read by their supervisors, with negative repercussions. These were significant and realistic concerns.
Today, the stakes are much higher. The consequences of a competitor having unauthorized access to messages and digital intelligence are now far more serious than in the past. Electronic Commerce, in particular, makes security a concern for all users. A typical worry of Web shoppers is that their credit card numbers might be exposed to millions of people as the information travels across the Internet. Recent surveys show that more than 80 percent of all Internet users have at least some concern about the security of their credit card numbers in electronic commerce transactions. This echoes the fear shoppers have expressed for many years about credit card purchases over the phone.
5.1.2 Computer Security Classifications
Computer security is the protection of assets front unauthorized access, use alteration, or destruction. There are two general types of security: physical and logical. Physical security includes tangible protection devices, such as alarms, guards, fireproof doors, security fences or vaults, and bombproof buildings. Protection of assets using nonphysical means is called logical security. Any act or object that poses a danger to computer assets is known as a threat.
Computer security is generally considered to include three main elements: secrecy, integrity, and necessity (also known as denial of service). Secrecy refers to protecting against unauthorized date disclosure and ensuring the
您可能关注的文档
最近下载
- 海信日立空调工程安装操作标准.pdf VIP
- 2021-2027全球及中国红外探测器芯片行业研究及十四五规划分析报告.docx VIP
- 2025-2026学年小学美术二年级上册(2024)岭南版(2024)教学设计合集.docx
- 02s404防水套管图集.docx VIP
- NASA认知负荷评估量表(TLX).docx VIP
- 20以内加减法练习题(a4).pdf VIP
- 光纤通信考试题及答案.doc VIP
- 天津市南开区2024-2025学年九年级上学期期末语文试题(含答案).pdf VIP
- 2025年公路水运安全员证考试题库答案.docx
- (推荐!)《ISO 37001-2025反贿赂管理体系要求及使用指南》专业深度解读和应用培训指导材料之7:9绩效评价(2025A1).docx VIP
文档评论(0)