电子商务安全导论-名词解释(Introduction to e-commerce security - term interpretation).docVIP

  • 6
  • 0
  • 约1.39万字
  • 约 12页
  • 2018-06-04 发布于江西
  • 举报

电子商务安全导论-名词解释(Introduction to e-commerce security - term interpretation).doc

电子商务安全导论-名词解释(Introduction to e-commerce security - term interpretation).doc

电子商务安全导论-名词解释(Introduction to e-commerce security - term interpretation) 1 e-commerce: as the name suggests, is based on the electronic business operation based on the use of technology to accelerate the expansion of people to enhance its business related to the change of the process 2, EDI: electronic data exchange is the first generation of electronic commerce technology, to achieve BTOB transactions 3, BTOB: e-commerce activities among enterprise organizations. 4, BTOC: e-commerce activities between business organizations and consumers. 5, intranet: refers to the internal network based on TCP/IP protocol, it through firewall or other security mechanisms to establish connection with intranet. The services provided on intranet are mainly oriented to the enterprise. 6, Extranet: refers to the enterprise domain network based on the TCP/IP protocol, it is a cooperative network. 7, confidential business data, business data confidentiality or secrecy refers to the process of information transmitted over the network or stored is not stolen by others will not be leaked or disclosed to unauthorized persons or organizations, or encrypted camouflage, the unauthorized persons cannot understand its content 8, mail bomb: an attacker sends a large amount of junk mail to the same mail box to plug the mailbox. 9, TCP hijacking: intrusion is one of the biggest threats to the server, the basic idea is to control a computer connected to the target network intrusion, and then disconnect from the Internet, make the network server to think that hackers are the actual client. 10, the memory state of the HTTP protocol: that is, the server forgets some interaction after sending the response to the client. Protocols such as TLENET are memory states, and they need to remember a lot of information, requests, and responses from both parties to the protocol. 11, plaintext: original, not disguised message called plaintext, also known as the source. Usually expressed in M. 12, ciphertext transfor

文档评论(0)

1亿VIP精品文档

相关文档