- 1、本文档共6页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
新时期计算机电子商务的安全策略分析()
新时期计算机电子商务的安全策略分析()
Computer electronic commerce involves various acts relating to goods and services, which covers a very wide, contains abundant information, if the safety performance of the electronic commerce information is not good, the emergence of information leakage situation of enterprises and individuals will have a huge impact. In view of this, it is of great significance to fully understand the importance of computer e-commerce information security, and to take effective measures to safeguard the security of e-commerce information.
1 、 security problems in computer E-commerce
Computer e-commerce is open to the public, e-commerce, information security related to the interests of the public. The electronic commerce needs to put the information security in the most important position, at present our country electronic commerce still has many problems.
1.1 security issues of information storage
Because the environment of e-commerce operation is developed, there will be hidden dangers in the process of information storage. First of all, inside there will be unsafe factors, internal customers have not been authorized, and any modification, deletion, call for information will affect the information storage security; secondly, there are also external threats to the security information storage. With the development of computer network technology, the external personnel, such as information, hackers, spy competitors can be on the computer network intrusion by illegal means, call the electronic commerce information, and carries on the random operation.
1.2 security issues of information transmission
The electronic commerce information will have security problems in the dynamic transmission process, information may be intercepted, tampered, encountered security problems in the process of transmission; the negative for having done transactions; the network hard disk is damaged; error occurs and so on software. Many factors in the transmission process will lead to th
您可能关注的文档
- 壁纸叫板乳胶漆(Wallpaper challenge latex paint).doc
- 声律启蒙(Sound of Enlightenment).doc
- 战场女武神3 兵种熟练度(Battlefield skills of 3 armed women).doc
- 战后德国贸易(Postwar German trade).doc
- 截句(four-line poem with the third line blank).doc
- 戴尔1520bios(戴尔1520bios).doc
- 房产专有名词(Real estate terminology).doc
- 房地产专业知识200问(上)(200 questions on real estate professional knowledge (Part I)).doc
- 戳脚门绝技(Stamp foot stunt).doc
- 房地产公司造价人员怎样进行成本控制(How does the Real Estate Company cost control).doc
- 新高考生物二轮复习讲练测第6讲 遗传的分子基础(检测) (原卷版).docx
- 新高考生物二轮复习讲练测第12讲 生物与环境(检测)(原卷版).docx
- 新高考生物二轮复习讲练测第3讲 酶和ATP(检测)(原卷版).docx
- 新高考生物二轮复习讲练测第9讲 神经调节与体液调节(检测)(原卷版).docx
- 新高考生物二轮复习讲练测第11讲 植物生命活动的调节(讲练)(原卷版).docx
- 新高考生物二轮复习讲练测第8讲 生物的变异、育种与进化(检测)(原卷版).docx
- 新高考生物二轮复习讲练测第5讲 细胞的分裂、分化、衰老和死亡(讲练)(原卷版).docx
- 新高考生物二轮复习讲练测第5讲 细胞的分裂、分化、衰老和死亡(检测)(原卷版).docx
- 新高考生物二轮复习讲练测第12讲 生物与环境(讲练)(原卷版).docx
- 新高考生物二轮复习讲练测第11讲 植物生命活动的调节(检测)(原卷版).docx
文档评论(0)