没有合适的资源?快使用搜索试试~ 我知道了~
电子商务安全技术相关研究结课论文-毕业论文.doc
0 下载量 127 浏览量
2023-06-30
03:03:31
上传
评论
收藏 612KB DOC 举报
温馨提示
试读
35页
电子商务安全技术相关研究结课论文-毕业论文.doc
资源推荐
资源详情
资源评论
结 课 论 文
电子商务安全技术相关研究
E-commerce security technology research
摘 要
随着计算机时代的发展,基于网络和多媒体技术的电子商务逐渐成为人们进行商务
活动的新模式。所谓电子商务是指政府、企业和个人利用现代电子计算机与网络技术实
现交换和行政管理的全过程;它是一种基于互联网,以交易双方为主体,以银行电子支
付和结算为手段,以客户数据为依托的全新电子商务模式。本质是建立一种全社会的
“网络计算环境”或“数字神经系统”,以实现信息资源在国民经济和大众生活中的全
方位应用。
信息技术和计算机网络的迅猛发展使电子商务得到了极大的推广,然而由于互联网
的开放性,电子商务的安全性问题也越来越多,当前,电子商务中网络安全问题产生的
主要原因有:黑客袭击、软件漏洞、网络缺陷和技术管理欠缺等,其中的关键问题是电
子商务企业本身的安全管理问题。本文就电子商务的现状、安全隐患进行了简单的分析;
就电子商务的安全技术进行了重点研究和介绍。
关键词:电子商务现状;安全问题;安全技术
电子商务安全技术相关研究
–I–
Abstract
With the development of the computer age, electronic commerce based on network and
multimedia technology gradually become a new mode of business activities have been
conducted. E-commerce refers to the government, enterprises and individuals using modern
computer and network technology exchange and the whole process of administrative
management; It is a kind of based on the Internet, in order to trade both parties as the main
body, by means of bank electronic payment and settlement, based on the customer data of the
new e-commerce model. Essence is a kind of the whole society to establish the network
computing environment "or" digital nerve system ", in order to realize the information
resources in the national economy and the comprehensive application of public life.
The rapid development of information technology and computer network make
e-commerce got a great promotion, however, due to the openness of the Internet, electronic
commerce security problem also more and more, at present, the main reason for the network
security problems in e-commerce are: hacker attacks, software bugs, defects and network
management and technology, etc., which is the key problem of e-commerce enterprise safety
management itself. In this paper, the present situation of electronic commerce, security hidden
danger has carried on the simple analysis; As to the study on the security technology of
electronic commerce and the introduction.
Key words: electronic commerce present situation; Security issues; Security technology
电子商务安全技术相关研究
–II–
目 录
摘 要 .............................................................................................................................I
Abstract ..............................................................................................................................II
一、绪论.............................................................................................................................1
(一)研究背景、意义.....................................................................................................1
1.研究背景..................................................................................................................1
2.研究意义..................................................................................................................1
(二)国内外电子商务安全研究现状.............................................................................2
1.国际电子商务安全研究现状..................................................................................2
2.我国电子商务安全研究现状..................................................................................2
(三)研究方法,途径.....................................................................................................3
1.相关资料、文献的收集..........................................................................................3
2.数据分析、归纳和案例分析..................................................................................3
二、电子商务安全概述.....................................................................................................4
(一)电子商务安全的内容.............................................................................................4
(二)电子商务安全隐患.................................................................................................4
1.内部人员滥用计算机资源......................................................................................4
2.外部攻击..................................................................................................................5
3.交易抵赖..................................................................................................................5
4.病毒或恶意代码......................................................................................................5
5.新鲜的截获或窃取..................................................................................................5
6.信息的篡改..............................................................................................................5
7.信息假冒..................................................................................................................5
(三)电子商务安全要素.................................................................................................6
1.数据的私有性和安全性..........................................................................................6
2.数据的完整性..........................................................................................................6
3.通讯、交易和存取要求的合法性..........................................................................6
4.不可抵赖性..............................................................................................................6
5.审查能力..................................................................................................................6
6.可控性......................................................................................................................7
电子商务安全技术相关研究
–III–
7.认证性......................................................................................................................7
8.不可拒绝性..............................................................................................................7
9.匿名性......................................................................................................................7
10.原子性....................................................................................................................7
三、电子商务安全问题案例分析.....................................................................................8
(一)案例一:电子签名法首次用于庭审.....................................................................8
1.案例内容..................................................................................................................8
2.分析、得出结论......................................................................................................9
(二)案例二:淘宝“错价门”引发争议...................................................................10
1.案例内容................................................................................................................10
2.分析、得出结论....................................................................................................10
(三)结论.......................................................................................................................11
四、电子商务的安全技术机制.......................................................................................12
(一)加密技术...............................................................................................................12
1.加密技术的定义....................................................................................................12
2.对称密钥加密体制................................................................................................12
3. 非对称密钥加密体制..........................................................................................13
(二)数字签名技术.......................................................................................................14
1.数字签名技术........................................................................................................14
2.数字摘要................................................................................................................15
3.摘要函数................................................................................................................15
4.数字时间戳技术....................................................................................................15
(三)数字证书技术.......................................................................................................16
1.数字证书的定义....................................................................................................16
2.数字证书的作用....................................................................................................16
3.数字证书的原理....................................................................................................17
4.数字证书的申请流程............................................................................................17
5.身份认证与数字认证............................................................................................17
(四)认证中心...............................................................................................................18
1.CA(Certificate Authority)中心的定义.............................................................18
剩余34页未读,继续阅读
资源评论
Mmnnnbb123
- 粉丝: 697
- 资源: 8万+
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功