




已阅读5页,还剩16页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
?CR4WFJ0JA1 ?5 InternetCk9;-kwvB4ZGJk%_%oGJ(kGJuV;04ZooxoR=WCJz4kcB+|*)yVkC-+yMikcU9k1;o4k|c|o%+JuonCU4LkA;Moy%oHk+UkyCho9)c_|k%?ck+cg%?yBokY+cU%?_RyoKKdBL 8?CR4WFJ0JA2AbstractWith universal access to the Internet, Internet-based electroniccommerce has emerged. And the tremendous development in recent yearshas become a new business model. It has great prospects for development,but the development of e-commerce platform - relying on the Internetwas full of huge, complex security risks. Attacked by hackers, virusepidemics, etc e-commerce are difficult to make a safe and smoothmanner; In addition, e-business enterprises blind to the internal securityproblems of e-businesses and the weak safety awareness. The seniorleadership of the e-commerce operations and inadequate attention tosafety management make e-commerce enterprises will inevitablyencounter this or that kind of risk. Therefore, the security issue hasbecome the core of e-commerce enterprises.E-commerce is on the management level, the transmission ofinformation technology has set higher requirements construction of asecurity system which seems to be particularly important. How to build asafe and convenient e-commerce environment, and provide adequateprotection of information, is a topic of great concern to consumers andbusinesses. This paper does some researchers and analyses of the riskmanagement about e-commerce security systems based on the currentdomestic situations and hopes that it can provide some valuablereferences to the risk management about e-commerce security systems.?CR4WFJ0JA3 Key Words E-commerce security; E-commerce security systems;Security risk management; Risk prevention system?CR4WFJ0JA4- 1 0 . 51.11J+evNL1*6,F . 51.2k?.D0 . 62 1J+ev,M0r . 62.11J+ev3+5, . 62.21J+evM0r?3P . 73 1J+evMd,NLLN6 . 93.1+ev3+5#,3P . 93.2j3P . 103.3)3P . 104 *1J+ev,NLLb933+ .114.1+ONLLb933+ .114.2F+ONLLb933+ . 124.3FNL1*61 01.11J+evNL1*6,F L-p0n,6553+5 Internet ,OFO+ev,+XWi+O#k?VL,vjf6|1yB(J65G-J8!,Y,7-V-O!L!-Lu444-o.D0jG-X8$65LN,.D0OKF!5:,F+|9M9A+ev,7-OhE$J,/nJGD+ev+X+ev+ev7-+ev+OQFO+ev,0ZG?(_Y+X IT_PE4*6vJ!+ev:6jTG6A1jvC1J+ev,W_+aA1j,W(_A1j55,W6|)A+ev3+5Md,NLLN,NL1*6F|F !QXi1J+ev,3+5M0r?3P,*.p:)1J+evMd,NLLNF|6!Q+ev1J,NL0COf,NL3PA,*.p:+ev1J+ONLLb933+F+ONLLb933+D#*4_+r#,MDG+X5,8Lb93,MD_1*6#?*A1yM5,8M63f*1V81J+evNL1*6)1 2 1J+ev,M0r2.11J+ev3+5,1J+ev3+5,W=_0Z0,%_+aA1jWT_A1j,W6|GLPE3R1y4*6,j3+5 1I1J+ev3+5_+aF|1+H 2003+evA1(x0W*(x/n1 76-80 N?CR4WFJ0JA7. 2-1 +ev3+5.2.21J+evM0r?3P1.9xWEC+e?4PFxAF/+e?,ChC,9xWI_0 EC, ECjChC,0/?,9xW6-$3+Z1JF-,4#Y, !?)55uLKIB+X0;KIB.&uL3+5E&KIBA1j+p+O,%X16fNLbAChCX.,&k.,&_9x,2.jWECjChC,0/!-$-pZ1JF-,vJjP5,4MChCG-_FJEF1,&FFJEM,FJ$PFF1vJEj,-, EC_*0X0ZEj0n,55):,T Internet _$j0n,55 ),5$vJj_ECM+X,G?L!?NLbM#,X1J+ev3+5 F| )A7NL6ADDZ7-=U3+555+LbALfH?CR4WFJ0JA8PEE0;M#03.WEC1FChCE0;Aj,N|j7-,8$ChC4,2!FPEE0;,RaG=FPF1,!Q2J,8$ChC4,=|C,ChC!_F|CpOK,ChCF0LNI_A ECNYF|,KXP5,4MChCChCFJEXC8|j,+OFa_hB$,4UX4F, EC?;FJE1=1F|ChC,H_=7-,!?XC,PEE0;jC,Z1JF-M,7A5.D-AA7C-(.A!,-OD-.A)a_!QCp0 ,-O!CAA_A0Z 0 ,D-F658+Xgj8&1y_V-O,E0;F0E0;jsApM0_)sA,ALfE0;F|,_A1j553+5=5jA,4G66.7-ijWW,?r),5F|A7-_7!Z4s,+Xg,#k,_07A-,)p+X,F|ADDZChC0)C|)8!=Y&VA+ev|j6A!6 12sC 10006?CR4WFJ0JA9|+OF!6lL 10s_B6AVA,C|j!?r3+5?97-C,+0G-=7-C4+O,C|j3 1J+evMd,NLLN6+evX*3W,v_+aX65,*3W5MFFJW0nWW1W+G-8+a(5+evPEE0;,XxY=C(_U7-G4/k+!F|.d1y#k55F?4B(d&M7+e.E41yM,63P!X*0+ev+X3+5&N6j0ZG?M635:+0kjk+F(*655k+WG6, Internet A9F|WAA55=0;4hM0?+XC4+Xg(s|3.3+5E&_7E&Ct=J0iMb.dM#=f51A 2004+evNL1*6fLGW*(x/n1 189-200N?CR4WFJ0JA109?F?3+5E&,-7_A1j3+5FkE:3+5,4*6PE%C3+51+,?r3+5E&6j3+555E&+XE&3.2j3P1.,Z90F_7+ev-(+XgFF65Z4sFJE4/_!Z90,+e9vJj2.,2i55k+65M4/_#!)PE,F|FD,2iPLF-,6w8#+XgFw!jP+Xgk?)?9wgF|M#CZFP+eF&1y5.C,CCC565VA.4F1E=A*,vl6+O03+G#LN55C44,55C41yLNUM0j+ev#L4 *1J+ev,NLLb933+ev1J,NL1*69LNLENLLb93FNL9/LNLENLOfLb93NLI_Of+ev1J,NL0COf!X)+evNL3PA,*.p:+ev1J+ONLLb933+F+ONLLb933+|+evF1*6,3+56|jG-_9y,|jD1V80;f,?rp9|j,+OG-9AA1*6,9xWAJ_r!Q=,NLLN3.NLLb931y41*6!&OHA-,1y4o1)1JANL6jG?NL08NL1JB1NL-(,Ii1J,LuM0?G&r.A0x1 2004+evNLLb930W*(x/n1 66-80N?CR4WFJ0JA124.*0kW*.pCLJ(Zjk Vince Steckler X 20048,ZA:X1J93$*0kW*.p,%DAk?J)1J4/-WFJEX1J93$,9xA1*6%?#N61+vJH+58C1C0F=w4,NL16,G?Lb44.2F+ONLLb933+F+ONLLb933+_7)+ev1JNLCLb93+X,-(#?+X(#q+e_1y/nJ3+,k+ev,#f*AX63-Lu+ev/j93#,;iA-,-f0G+X?93+ev#k,#F#?+evpMd,#?LNA-+ev0#,F+X93$5+e8fL551*6+eA+e1=,#Ao,jfWjf2j?I.As#Ci658#s,(#,-Lu1E-Lu1y1y1.*0+ev,+X3+)+evC#v51K&|#Ci651yJMY,+XLNL0N*00Z/nJ+X3+)/nJOx?*00/8!+X+X-(+X,1!Q?+XfFJEA58*6,F|jfF|7FJE-jAC49O9CX9G_CW!nF1CW(2.(#qGF13+,*A0_?F!0n2j!RE-F,(#q(1FJE1A-,(#qGF13+C_?G?(#q)LQ,)FF?(#q86|JCtlAA,!9_?X(#q1*6_FFWF0F1yMj(#q1*6,K+ev,_!+evCM0?#q(#qCtH#q,|+e_d?CR4WFJ0JA13*00ZUM,/nJ93$,+eCW1_3+50+evAAjm0505:51F!0-Fg,5:51=4.3Fk+1y6W)+ev+ev.ANj)+ev,)W9+ev,.A0M?F0!j4QQ+evCJ*A0M?F0!F+ev86|JCtlAA)A1A:f2.*0B3jfF?r1J44L|JJ7G8FJNLNA6D%,-O!583.NLH+6-*AH+6-=_X9Y,)2jjJMU-pG?+XX6NLLb93NLM|, RSA J3,z5-+e7A,(Q40Z6-44+X1J*.p55A0 j|J6- CSIACyber SecurityIndustry Alliance65-G-Lu5-,7448LbNL_1,7?93+ev1J+OLb933+,8F+OLb933+,|,(E0;F|ADDZ)LNi3+5AA,5AF+X;_?553+5,161.Lb&_Lb&_XG5FG5L$Lb93,3+5Aj_0/ALfjf+X.G=qAFGALqAFG=ALG= 1)Lb&_,k?FD95E%+X5*6=16*d/q 2003+ev_+X*6W*(x/n1 103-108N?CR4WFJ0JA15. 5-1 Lb&FkE55/j?.(1)5E%_5E%_X55r)59F9,FJE3+5xA,E%FkE#q!Z5i5,$p-,pp+X, TCP UDP1 TCPK.D(11y3P._VqA5FJE5E%,h_1+E%1#,AA5E%_FO)vA7-E%?I,AAX.-.3+E%?I1&WE%?I=rI1*6L(2)+X5_+X5_*0X55+Xr:,AE%J)(,55+X=AE%A7-O)56-(,z+X5)C,fp9EE*,FJA)5Ul,fLb9l,0;0(3)*6=_*6=+XX+Xr+X+Xr=,fF/*6=A551*6qB*F5(,+X0;F0Z+X,(7-5E%_+X5_FJE(,FkET_VqA(,5FJE,0T&%CLb&G55,5F|(1MbXF+XgM6F,A2._+eG,k?ChCiM0?X,Lf!+X-_6jT2)0 M)0 (1)0 C+XJX)0 #),G-+X-(|FJ,ChC7-O.C+XJXJLf!Z.MbFxjWWaFJE)0 #jFJEL0CF1?FGl)0 _X-pXFJ,ChCL$.J,LN!F0ChC9QZChC3+Fxa?5$QZC+XJ!J)0ChC)0 ?X,0ZLN_#HChCCFChC04jChCPF15),7 (DES)+a5-7p*_-#G+X,)0 ?0k?+XK&|J,+eCtHECV (EFT)NDES,JKj 569G DES_ DES,0/F/#+XTZ)0, 56J), EDIF|!Q66j0)00JFJ0C+XJFJF)J,+0G-j0JJFJEM?A06|F15ChC+bChC+b+X8!,0C+XJ),F|ChC+b7-+XC+XJ+a0J,+RSA1#_M)0 N0j:=,1#v_X,k?LN_1#,F1FOE!XLu,+XFJh=G+XF01#)GW,W, EDICF|)GW,+X0J1#FJh+X)0 #J,X)_,.D0*.p:F58-(AA_1=1,1e%?#N(1:;FX*69kLb930),A?A$#i:Q55-#Lb=+7-f6|jT_M#G-_jG65+e7A3+51*6f+1*66|9x,1*6fjUl-Q1J,NLLb93?AFfk?91.1*6f(1) Ul55:UK0,F9 (2):mCS+f (3) 1C_+evF*ICOCS+O9L0?sL?CR4WFJ0JA18I2.f(1),46945j0 (2) )I,1*6#?&$3.DDZA0mhf(1)DDZf?r1J*055C3+5jfA3+5F|,E0;(2) Af54h)3+5,h&)3+5u?,|jF?A(3) 0mhf_7v0K&|Y+X55O0mhJ+XE&B3L5BhTEj4+evJ4:U#k,8*6WW1yA+evC4.553+5,h5$f(1).&,h1*65$f5 Intranet55A7=gjFJ4D1y(2) E&,h1*65$f5_E&3+501y+XE&A50=jgjF0;F955COEE&F|.As/9sYLb!wjF?FvJChCF1,1y!of*,#?fF55(56AF(5|j1J90Z8,F:U)L+Xg,Y,A-oq6G?-+ev, 1998 118 18-k#-AXZ48441!QN,M!?JA:a+evLN0&B$+ev-pZChC?,AA=?G?/:UvGL,+X|?,)A-A1j55-Lu651*6|?F|!j)55,1*6,)+X55PM#=8,|jG45kL-p4#*3F_JEFO+ev6j#q,&j4-x4ZJGL0j#,N*3*.pAN_DC,+Xg)5:,FJ
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 农业营销合作合同范本
- 临时租住租房合同范本
- 游学代理合同范本
- 倾销混凝土砖合同范本
- 医学检验费合同范本
- 维修安装合同范本
- 2025银行发展面试题库及答案
- 取暖煤炉购销合同范本
- 2025年中国银行招聘考试试题及答案
- 2025年鼠疫防治相关知识考核试题及答案
- YY/T 0196-2005一次性使用心电电极
- YS/T 226.12-2009硒化学分析方法第12部分:硒量的测定硫代硫酸钠容量法
- GB/T 24218.3-2010纺织品非织造布试验方法第3部分:断裂强力和断裂伸长率的测定(条样法)
- 系统工程原理 - 国防科技大学信息系统与管理学院
- 华为IPD流程管理全部课件
- 当代世界社会主义现状课件
- 2021年唐山迁安市教师进城考试笔试试题及答案解析
- 《给排水科学与工程概论》全套教学课件
- 三菱变频器d700说明书
- 涉外导游英语口语实训教程整套课件完整版PPT教学教程最全电子讲义教案(最新)
- 新疆新昊诚保温材料有限公司年产万吨岩棉生产线项目可
评论
0/150
提交评论