- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
电子商务安全导论-名词解释(Introduction to the Electronic Commerce Security Glossary)
电子商务安全导论-名词解释(Introduction to the Electronic Commerce Security Glossary)
1: as the name implies, e-commerce is based on Electronic Technology on the commercial operation, is the use of the technology to strengthen expansion changed its business process
2, EDI: electronic data interchange is the first generation of e-commerce technology, the realization of BTOB transactions
3, BTOB: electronic commerce enterprise inter agency.
4, BTOC: electronic business activities between enterprises and institutions and consumers.
5, intranet: refers to the internal network of enterprises based on the TCP/IP protocol, it establishes a connection through the firewall or other security mechanism and intranet. The intranet service is mainly oriented to inside the enterprise.
6, Extranet: refers to the TCP/IP protocol at the enterprise network based on domain, it is a kind of cooperative network.
7, confidential business data, business data confidentiality or secrecy refers to the process of information transmitted over the network or stored is not stolen by others will not be leaked or disclosed to unauthorized persons or organizations, or encrypted camouflage, the unauthorized persons cannot understand its content
8, mail bomb: the attacker is mail to the same email spam, to plug the mailbox.
9, TCP hijacking: intrusion is one of the biggest threats to the server, the basic idea is to control a computer connected to the target network intrusion, and then disconnect from the Internet, make the network server to think that hackers are the actual client.
10, the HTTP Protocol memoryless state: that is, the server to the client in response to send after missing interaction. TLENET protocol is the memory state, they need to remember a lot about the parties information, request and response.
11, clear: the original is not fake news, called plaintext, also known as the source. Usually expressed in M.
12, through a cipher key and encryption algorithm will be transformed into a pseudo plaint
您可能关注的文档
- 模具钳工常见问题解答100例(Die fitter FAQ 100 cases).doc
- 正则参考(Regular reference).doc
- 正则汇总(Regular summary).doc
- 正则表达式专题(Regular expression feature).doc
- 正则表达式中的特殊字符(Special characters in regular expressions).doc
- 正则表达式入门(Regular expressions).doc
- 正则表达式匹配规则(The regular expression matching rules).doc
- 正则表达式口诀及教程(The formula and regular expression tutorial).doc
- 正则表达式各种匹配(All kinds of regular expressions matching).doc
- 正则表达式大全(regular expression).doc
- 电子商务安全导论2(The introduction of e-commerce security 2).doc
- 电子商务的不足(Lack of e-commerce).doc
- 电子商务的优势(The advantages of e-commerce).doc
- 电子政务的应用与发展(The application and development of E-government).doc
- 电子标签的做法(The practice of electronic tags).doc
- 电子演示文稿选择题(Electronic presentation choice).doc
- 电子琴考级的曲目标准(Electronic piano grading standard track).doc
- 电工书籍(Electrical books).doc
- 电影院合理租金分析(Analysis of reasonable rent cinema).doc
- 电影音乐融入高校公共艺术教育的思考(Thinking of film music in public art education in Colleges and Universities).doc
文档评论(0)