电子商务英语课件6.ppt
《电子商务英语课件6.ppt》由会员分享,可在线阅读,更多相关《电子商务英语课件6.ppt(79页珍藏版)》请在课桌文档上搜索。
1、Unit 6 Security Issues of Electronic Commerce,学习指导:本章将介绍:电子商务中互联网的安全问题电子商务中客户机的安全电子商务中计算机网络通信信道的安全,6.1 the Internet Security of Electronic Commerce6.1.1 Network and Electronic Commerce,In the early days of the Internet,one of its most popular uses was electronic mail.Despite e-mail s popularity,peop
2、le have often worried that a business rival might intercept e-mail message for competitive again.,Another fear was that employees non-business correspondence might be read by their supervisors,with negative repercussions.These were significant and realistic concerns.,Today,the stakes are much higher
3、.The consequences of a competitor having unauthorized access to messages and digital intelligence are now far more serious than in the past Electronic commerce,in particular,makes security a concern for all users.,A typical worry of Web shoppers is that their credit card numbers might be exposed to
4、millions of people as the information travels across the Internet.,Recent surveys show that more than 80 percent of all Internet users have at least some concern about the security of their credit card numbers in electronic commerce transactions.This echoes the fear shoppers have expressed for many
5、years about credit card purchases over the phone.,6.1.2 Computer Security Classifications,Computer security is generally classified into three categories:secrecy,integrity,and necessity(also known as denial of service).,Secrecy refers to protecting against unauthorized data disclosure and ensuring t
6、he authenticity of the data source.Integrity refers to preventing unauthorized data modification.Necessity refers to preventing data delays or denials.,Secrecy is the best known of the computer security categories.Every month,newspapers report on break-ins to government computers or theft and use of
7、 stolen credit card numbers that are used to order goods and services.,Integrity threats are reported less frequently and,thus,may be less familiar to the public.,For example,an integrity violation occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwar
8、ded to its original destination.In this type of integrity violation,which is called a man-in-the-middle exploit,the contents of the e-mail are often changed in a way that negates the messages original meaning.,Necessity violations take several forms,and they occur relatively frequently.Delaying a me
9、ssage or completely destroying it can invite grave consequences.Suppose that a message sent at 10:00 a.m.to an online stockbroker includes an order to purchase 1000 shares of IBM at market price.,If the stockbroker does not receive the message(because an attacker delays it)until 2:30 p.m.and IBMs st
10、ock price has increased by$3,the buyer loses$3000.,6.1.3 Security Management,Computer security is the protection of assets from unauthorized access,use,alteration,or destruction.Any act or object that poses a danger to computer assets is known as a threat.,The risk management model applies to protec
11、ting Internet and electronic commerce assets from both physical and electronic threats.Examples of the latter include impostors,eavesdroppers,and thieves.An eavesdropper,in this context,is a person or device that can listen in on and copy Internet transmissions.,People who write programs or manipula
12、te technologies to obtain unauthorized access to computers and networks are called crackers or hackers.,To implement a good security scheme,organizations must identify risks,determine how to protect threatened assets,and calculate how much to spend on protecting those assets.,In this chapter,the pri
13、mary focus in risk management protection is on the central issues of identifying the threats and determining the ways to protect assets from those threats,rather than on the protection costs or value of assets.,6.2 Security for Client Computers,Client computers,usually PCs,must be protected from thr
14、eats that originate in software and data that are downloaded to the client computer from the Internet.In this section,you will learn that active content delivered over the Internet in dynamic Web pages can be harmful.,Another threat to client computers can arise when a malevolent server site masquer
15、ades as a legitimate Web site.Users and their client computers can be duped into revealing information to those Web sites.,This section explains these threats,describes how they work,and outlines some protection mechanisms that can prevent or reduce the threats they pose to client computers.,6.2.1 C
16、ookie,Cookies are some small text files that Web servers place on Web client computers to identify returning visitors.Cookies also allow Web servers to maintain continuing open sessions with Web clients.An open session is necessary to do a number of things that are important in online business activ
17、ity.,For example,shopping and payment processing software both need an open session to work properly.Early in the history of the Web,cookies were devised as a way to maintain an open session despite the stateless nature of Internet connections.,Thus,cookies were invented to solve the stateless conne
18、ction problem by saving information about a web user from one set of server-client message exchanges to another.,6.2.2 Active Content,Until the debut of executable Web content,Web pages could do little more than display content and provide links to related pages with additional information.The wides
19、pread use of active content has changed the situation.,Active content refers to programs that are embedded transparently in Web pages and that cause action to occur.For example,active content can display moving graphics,download and play audio,or implement Web-based spreadsheet programs.,Active cont
20、ent is used in electronic commerce to place items into a shopping cart and compute a total invoice amount,including sales tax,handling,and shipping costs.,Developers use active content because it extends the functionality of HTML and moves some data processing chores from the busy server machine to
21、the users client computer.,Unfortunately,because active content elements are programs that run on the client computer,active content can damage the client computer.Thus,active content can pose a threat to the security of client computers.,Active content is provided in several forms.,The best-known a
22、ctive content forms are cookies,Java applets,JavaScript,VBScript,and ActiveX controls.Other ways to provide Web active content include graphics,Web browser plug-ins,and e-mail attachments.,6.2.3 Java Applets,Java is a programming language developed by Sun Microsystems that is used widely in Web page
23、s to provide active content.The Web server sends the Java applets along with Web pages requested by the Web client.,In most cases,the Java applets operation will be visible to the site visitor;however,it is possible for a Java applet to perform functions that would not be noticed by the site visitor
24、.The client computer then runs the programs within its Web browser.,Java adds functionality to business applications and can handle transactions and a wide variety of actions on the client computer.That relieves an otherwise busy server-side program from handling thousands of transactions simultaneo
25、usly.Once downloaded,embedded Java code can run on a clients computer,which means that security violations can occur.,To counter this possibility,a security model called the Java sandbox has been developed.The Java sandbox confines Java applet actions to a set of rules defined by the security model.
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 电子商务 英语 课件
链接地址:https://www.desk33.com/p-259222.html