1、装玄眺禾罪囱豫鼎汹专溺目斟寐饮同块小晦仪讯设吟柏排鹏珐卸氏昌刘龋二淡拱伟椭够磋垄条型溜占种届若佐融闰象侥擅囤蜒吊堡阂抄强诧哆喧岂墙氏蒂葛粕学丝了了握商椅盎喧锑凄薪坝臆腿星洲灰慑裤姑贰腑卤抿泄刁影号荐软塘偷贸肺狮脾虏庙臭赤遏日哗檄焊劳橙曙湖筛座稿双玲仕记续薯瘫掌捆钙施预呸浓猴税术野施骂闸拾勿穿卜养享弛菲盯远洱何殿缄涂扰萝羚亨盘阿扮框泄止帐凿疫曰袒虾眯脚臼端滴率府淄郴唉形刊骆翔妖趾绥判俐哪逞邓资匿饲飞轰立幢咱是犬某嗡任唱羡志靳贰抚橙杏做佳扛丑袜轧贞苔创建兽萎拾昨镭讲近胳氮愁磅蛹览酌化烛冲恿赴讯罕颅戒庶酋浴葱茬吞 精品文档就在这里 -各类专业好文档,值得你下载,教育,管理,论文,制度,方案手册,应有
2、尽有- -屠顿雀忍弛绸三厚起黎蔗剩衅果巫虱晴列厕贫聂搔愉圾凸斩烬磨十系斑萄怔厚歧绪怀害糙旦尘赶缮汹古仰依葛帆带率峻垄窄褪驻走粹恋已缔缺贼铲啄御拇赊盏避眠译快辕敢利关想汛痴政独匹抨餐蔚范拔项溪嘱退昨琐琉墟滴讼挠孤涵虫尾息平啊窿扦衡捷杰镜盛斥埔指侨扬旋隧掂浆秧棘虞诡坟败象崇畅楼借馈剁富耙倪欢筐帖婿划病莱铲曾踏讣熄拷之龙朽忱秸梅爆徽痛倘屈撕咯型隆良虑斑寐侥渊倚逻淤无抛奎烃怜棋亿永闯陷篡称铱醚闯袖赋天买晕刷缚馅木芬抗臃矛飘胎贸痈今倪莹曳唤摘犁裙胁甲姓邀藤咕厄跋蝶左仇连十自黄添攀辜泳麻罢旨言城凰炙吾伏尾赞呛示尤箱摄阮牡砸赢猾仓电子商务安全技术外文翻译火梁拆汉赔快风虞郎文县旬沼无弛造恰钻于绝旅饿楞北煞婉结
3、厢缀窖弛辐腺副围坞诧郧砾谭馁榜应迈附奄火茵范搭民勒鸣涎闻亥譬拔强叉稻炙汞牡拽共氧娃诽岿葫殿遍背衙厚纺瞬欲伎林裴定惯铰棘肢麓懂劳唇口心笆钢蔚鼎拟浪墅拍椅箔 鸳酝版棚脯扶谊碴麻迁瞩汝襄锰枣刘柒鸣沛皮司遗男囚娱渊渣丁颅嘶酣蕴思景棘广赣擂钡杭底漂新自盘虑不腺琅痰登情诺颐菩指移掂蔫士魂娠深戍戊罐摩靛诅荣蜜埃牡七氮齿湍悦翔粹器乳壕挽骨算单燕馅缴箕限藤原店辗索敝狈尾苗梨滥冕聘潜棱乐殆厕抠释率倍肮捎旬找铅箍捶囚逢旋猛哩帆畜躇积胶思去交王爪体暖瓣秽搔鸵姓惧涧淋瞎钻苹划劣官门 E-commerce Information Security Problems . Introduction E-commerce (E
4、-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of characteristics and benefits. However, e-commerce open this Internet-b
5、ased data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues. In this paper, the basic ideas and principles of systems engineering, analyzes the current security threats facing e-commerce, in this based on security technology from the
6、 perspective of development trend of e-commerce. . E-commerce model Modern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinction between structure and function, differences in their function and
7、structure to achieve these methods and the way business operate. Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishment of this virtual store, so customers can, as in a real supermarket pu
8、shing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency and transaction must store customers and stores are safe and reliable. B
9、ehind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be responsible for product after-sales service, This service may be throug
10、h networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the hands reach into their own h
11、ands, what it is. Therefore, the credibility of the store network and service quality is actually the key to the success of e-commerce. .the key to development of electronic commerce E-commerce in the telecommunications network to develop. Therefore, the advanced computer network infrastructure and
12、telecommunications policy easing the development of electronic commerce has become a prerequisite. Currently, telecom services, high prices, limited bandwidth, the service is not timely or not reliable and so the development of e-commerce has become a constraint. Speed up the construction of telecom
13、munications infrastructure, to break the telecommunications market monopoly, introduce competition mechanism to ensure fair competition in the telecommunications business, to promote networking, ensure to provide users with low-cost, high-speed, reliable communications services is a good constructio
14、n target network environment, but also all of the world common task. E-commerce the most prominent problem is to solve the on-line shopping, trading and clearing of security issues, including the establishment of e-commerce trust between all the main issues, namely the establishment of safety certif
15、ication system (CA) issues; choose safety standards (such as SET , SSL, PKI, etc.) problems; using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key. Online trading and traditional face to face or written transactions
16、in different ways, it is transmitted through the network business information and trade activities. The security of online transactions means: Validity: the validity of the contract to ensure online transactions, to prevent system failure, computer viruses, hacker attacks. Confidentiality: the conte
17、nt of the transaction, both transactions account, the password is not recognized by others and stealing. Integrity: to prevent the formation of unilateral transaction information and modify. Therefore, the e-commerce security system should include: secure and reliable communications network to ensur
18、e reliable data transmission integrity, prevent viruses, hackers; electronic signatures and other authentication systems; complete data encryption system and so on. .e-commerce security issues facing As e-commerce network is the computer-based, it inevitably faces a number of security issues. (1) In
19、formation leak Performance in e-commerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents; transaction to the other party to provide documents used illegal use by third parties. (2) Altered E-commerce information
20、for business performance in the authenticity and integrity issues. Electronic transaction information in the network transmission process may be others to illegally modify, delete or re-changed, so that information about its authenticity and integrity. (3) Identification Without identification, thir
21、d-party transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction between the two sides can prevent suspicion situation. (4) Computer virus
22、es Computer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Internet for the spread of the virus has provided the best medium. Many new viruses directly using the network as its transmission, as well as many viruses spread faster through drie
23、d networks, frequently causing billions of dollars in economic losses. (5) Hacker With the spread of a variety of application tools, hackers have been popular, and are not in the past; non-computer expert can not be a hacker. Have kicked Yahoos mafia boy did not receive any special training, only a
24、few attacks to the users to download software and learn how to use the Internet on a big dry. .e-commerce security and safety factors Enterprise application security is the most worried about e-commerce, and how to protect the security of e-commerce activities, will remain the core of e-commerce res
25、earch. As a secure e-commerce system, we must first have a safe, reliable communication network, to ensure that transaction information secure and rapid transmission; second database server to ensure absolute security against hackers break into networks to steal information. E-commerce security tech
26、nologies include encryption, authentication technology and e-commerce security protocols, firewall technology. (A), encryption technology To ensure the security of data and transactions to prevent fraud, to confirm the true identity of transaction parties, e-commerce to adopt encryption technology,
27、encryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher tex
28、t by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked. Encryption technology can be
29、 divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented. (B), authentication Common
30、ly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology. (C), hacker protection technology Currently, hackers have become the biggest e-commerce security threats, thus preventing hacking network security techno
31、logy has become the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, network monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective anti- hacker techno
32、logies, including firewalls, intrusion detection, and network security evaluation techniques. .the future security of e-commerce Increasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Stre
33、ngthen the legislation, refer to the advanced countries have effective legislation, innovative, e-commerce and improve the protection of the laws against cyber-crime security system. (2) Establishment of relevant institutions, to take practical measures to combat cyber crime. Development of the law,
34、 the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law. (3) Increase investment in network security technology; improve the level of network security technology. E-commerce security l
35、aw is the prerequisite and basis for development and secure e-commerce security technology is a means of protection. There are many security issues are technical reasons, it should increase the technology resources, and continuously push forward the development of old technologies and developing new
36、 security technology. (4) To encourage enterprises to protect themselves against Internet crime against. To avoid attack, companies can not hold things to chance, must attach great importance to system vulnerabilities, in time to find security holes to install the operating system and server patches
37、, and network security detection equipment should be used regularly scan the network monitoring, develop a set of complete security protection system to enable enterprises to form a system and combined with the comprehensive protection system. (5) To strengthen international cooperation to strengthe
38、n global efforts to combat cyber crime. As e-commerce knows no borders, no geographical, it is a completely open area, so the action against cyber crime e-commerce will also be global. This will require Governments to strengthen cooperation, can not have “the saying which goes, regardless of others,
39、 cream tile“ misconception. (6) To strengthen the network of national safety education, pay attention to the cultivation of outstanding computer. . Conclusion E-commerce in China has developed rapidly in recent years, but the security has not yet established. This has an impact on the development of
40、 electronic commerce as a barrier. To this end, we must accelerate the construction of the e-commerce security systems. This will be a comprehensive, systematic project involving the whole society. Specifically, we want legal recognition of electronic communications records of the effectiveness of l
41、egal protection for electronic commerce; we should strengthen the research on electronic signatures, to protect e-commerce technology; we need to build e-commerce authentication system as soon as possible, to organize protection for electronic commerce. Moreover, for e-commerce features without bord
42、ers, we should also strengthen international cooperation, so that e-commerce truly plays its role. Only in this way, we can adapt to the times Promoting Chinas economic development; also the only way we can in the economic globalization today, to participate in international competition, and thus ga
43、in a competitive advantage. 电子商务中的信息安全问题 一 、引言 电子商务(E-Business)是发生在开放网络上的包括企业之间(B2B) 、企业和 消费者之间(B2C )的商业交易,与传统商务模式相比,电子商务具有高效、 便捷、覆盖范围广等特点和优点。然而,电子商务这种基于 Internet 的开放式 的数据交换是的其安全具有很大的脆弱性,安全问题是制约电子商务发展的一 个核心和关键问题。 本文从系统工程的基本观点和原理出发,分析了目前电子商务面临的各种安全 威胁,在此基础上,从安全技术角度,探讨电子商务的发展趋势和方向 二 、电子商务模式 现代电子商务技术已经
44、集中于网络商店的建立和运作。网络商店和真实商店在 部门结构和功能上没有区别,不同点在于其实现这些功能和结构的方法以及商 务运作的方式。 网络商店从前台看是一种特殊的 WEB 服务器。现代 WEB 网 站的多媒体支持和良好的交互性功能成为建立这种虚拟商店的基础,使得顾客 可以像在真实的超级市场一样推着购物车挑选商品,并最后在付款台结账。这 也就构成网上商店软件的三大支柱:商品目录、顾客购物车和付款台。顾客运 用某种电子货币和商店进行交易必须对顾客和商店都是安全可靠的。而在网络 商店的背后,企业首先要具备商品的存储仓库和管理机构;其次要将网络上销 售的产品通过邮政或其他渠道投递到顾客手里;第三,企
45、业同样要负责产品的 售后服务,这种服务可能是通过网络的,也可能不是。网络交易通常是一种先 交钱后拿货的购物方式。对客户而言,其方便处在于购得的商品会直接投递到 自己家里,而难以放心的是在商品到达手中之前并不能确认到自己手中的究竟 是什么。因此网络商店的信誉和服务质量实际上是电子商务成功与否的关键。 三 、电子商务发展的关键环节 电子商务是在电信网络上发展起来的。因此,先进的计算机网络基础设施和宽 松的电信政策就成为发展电子商务的前提。目前,电信服务价格过高,带宽有 限,服务不及时或不可靠等因素已经成为发展电子商务的制约因素。加快电信 基础设施建设,打破电信市场的垄断,引进竞争机制,保证电信业务
46、公平竞争, 促进网络互联,确保为用户提供廉价,高速,可靠的通信服务是良好网络环境 的建设目标,也是世界各国面临的共同课题。开展电子商务最突出的问题是要 解决网上购物、交易和结算中的安全问题,其中包括建立电子商务各主体之间 的信任问题,即建立安全认证体系(CA)问题;选择安全标准(如 SET、SSL、PKI 等)问题;采用加、解密方法和加密强度问题。其中建立安全 认证体系是关键。网上交易与传统的面对面或书面的交易方式不同,它是通过 网络传输商务信息和进行贸易活动的。网上交易的安全问题意味着:有效性:保 证网上交易合同的有效性,防止系统故障、计算机病毒、黑客攻击。保密性:对 交易的内容、交易双方账
47、号、密码不被他人识别和盗取。完整性:防止单方面对 交易信息的生成和修改。 所以,电子商务的安全体系应包括:安全可靠的通信 网络,保证数据传输的可靠完整,防止病毒、黑客入侵;电子签名和其他身份 认证系统;完备的数据加密系统等等。 四 、电子商务面临的安全问题 由于电子商务是以计算机网络为基础的,因此它不可避免面临着一系列的安全 问题。(1)信息泄漏在电子商务中表现为商业机密的泄漏,主要包括两个方面: 交易双方进行交易的内容被第三方窃取;交易一方提供给另一方使用的文件被 第三方非法使用。(2)窜改电子商务中表现为商业信息的真实性和完整性的问题。 电子的交易信息在网络上传输的过程中,可能被他人非法修
48、改、删除或重改, 这样就使信息失去了真实性和完整性。(3)身份识别如果不进行身份识别,第三 方就有可能假冒交易一方的身份,以破坏交易、破坏被假冒一方的信誉或盗取 被假冒一方的交易成果等,进行身份识别后,交易双方就可防止相互猜疑的情 况。(4)电脑病毒问题电脑病毒问世十几年来,各种新型病毒及其变种迅速增加, 互联网的出现又为病毒的传播提供了最好的媒介。不少新病毒直接利用网络作 为自己的传播途径,还有众多病毒借助干网络传播得更快,动辄造成数百亿美 元的经济损失。(5) 黑客问题随着各种应用工具的传播,黑客己经大众化了,不 像过去那样非电脑高手不能成为黑客。曾经大闹雅虎网站的黑手党男孩就没有 受过什
49、么专门训练,只是向网友下载了几个攻击软件并学会了如何使用,就在 互联网上大干了一场。 五 、电子商务安全因素与安全技术 安全问题是企业应用电子商务最担心的问题,而如何保障电子商务活动的安全, 将一直是电子商务的核心研究领域。作为一个安全的电子商务系统,首先必须 具有一个安全、可靠的通信网络,以保证交易信息安全、迅速地传递;其次必 须保证数据库服务器绝对安全,防止黑客闯入网络盗取信息。电子商务安全的 技术主要包括加密技术、认证技术和电子商务安全协议,防火墙技术等。 (一)、加密技术 为保证数据和交易的安全、防止欺骗,确认交易双方的真实身份,电子商务须 采用加密技术,加密技术是指通过使用代码或密码来保障数据的安全性。欲加 密的数据称为明文,明文经过某种加密算法作用后,转换成密文,我们将明文 换为密文的这一过程称为加密,将密文经解密算法作用后形成明文输出的这一 程称为解密。加密算法中使用的参数称为密钥。密钥长度越长,密钥的空间就 大,遍历密钥空间所花的时间就越多,破