- 1、本文档共12页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
THE SECURITY OF ELECTRONIC BANKING(电子银行的安全)
THE SECURITY OF ELECTRONIC BANKING
Yi-Jen Yang
2403 Metzerott Rd.
Adelphi, MD. 20783
Abstract
The Internet has played a key role in changing how we interact with other people and how we do
business today. As a result of the Internet, electronic commerce has emerged, allowing businesses to
more effectively interact with their customers and other corporations inside and outside their industries.
One industry that is using this new communication channel to reach its customers is the banking industry.
The electronic banking system addresses several emerging trends: customers’ demand for anytime,
anywhere service, product time-to-market imperatives and increasingly complex back-office integration
challenges. The challenges that oppose electronic banking are the concerns of security and privacy of
information.
The current focus of security of information transfer is on the session layer protocols and the
flaws in end-to-end computing. A secure end-to-end transaction requires a secure protocol to
communicate over untrusted channels and a trusted code at both endpoints. The solution addresses the
use of secure protocols because trusted channels don’t really exist in most of the environment, especially
since we are dealing with linking to the average consumers.
The solutions to the security issues require the use of software-based systems or hardware-based
systems or a hybrid of the two. These software-based solutions involve the use of encryption algorithms,
private and public keys, and digital signatures to form software packets known as Secure Electronic
Transaction used by Mastercard and Pretty Good Privacy. Hardware-based solutions such as the
Smartcard and the MeChip provide better protection for the confidentiality of pe
您可能关注的文档
- THE Product Line SelfDrilling ScrewsMade In USA(产品线SelfDrilling ScrewsMade在美国).pdf
- The Process of Semi – Axles Quenching is (半轴淬火的过程).pdf
- The product of load deflection Christian Bauer(负荷挠曲Christian Bauer的产物).pdf
- The production of wood pellets Wood Energy(木球木材的生产能量).pdf
- The production of rigid polyurethane foam (硬质聚氨酯泡沫的生产).pdf
- The Productivity Baseline Hill International(国际生产力基线山).pdf
- THE PROGRESS OF HIMAC AND PARTICLE (HIMAC和粒子的进步).pdf
- The Project Management Office(项目管理办公室).pdf
- The Promise of Combining Inhibition of PI3K (结合抑制PI3K的承诺).pdf
- The Promise of Preschool AFT(学前船尾的承诺).pdf
- The selfcleaning filter for continuous filtration. (连续式过滤器过滤。).pdf
- THE SELECTIVE FUNCTIONAL MOVEMENT (选择性的功能性运动).pdf
- The Sensible Guide to Forex Verbundzentrale (明智的外汇Verbundzentrale指南).pdf
- The Seven Wastes Gemba Academy(七个废物玄叶光一郎学院).pdf
- The SETP Partners' Family Handbook(喂伙伴的家庭手册).doc
- The shared genius of Elon Musk and Steve Jobs(共享Elon Musk和史蒂夫·乔布斯的天才).pdf
- The Shape of Tomorrow's Supply Chains The (明天的供应链的形状).pdf
- THE SHOEMAKER AND THE ELVES K5 Learning(鞋匠和精灵K5学习).pdf
- The Short Course Airport Signs sweeney(短期课程机场sweeney迹象).pdf
- The Siberian Traps and the EndPermian mass (西伯利亚陷阱和EndPermian质量).pdf
文档评论(0)