




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、English for E-Commerce,Unit 4 Online Payment,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, Octobe
2、r 10, 2020,Word study,Saturday, October 10, 2020,Text,Requirements for Electronic Commerce Security In general, the basic requirements for electronic commerce security include privacy, integrity, authenticity (真实性)and non-repudiation.(不可否认性).,Saturday, October 10, 2020,Text,Privacy When a message is
3、 sent electronically, the sender and the receiver may desire that the message is not revealed to others. The most effective technique for privacy is encryption(加密). For much of history, encryption algorithms (算法)were symmetrical (对称的), which means that the same key was used to both encrypt(加密) and d
4、ecrypt (解密) a message. The difficulty is how to have the sender and the receiver who will probably never meet agree on a key that cannot be known by anyone else.,Saturday, October 10, 2020,Text,For this reason, a new type of algorithm, called public key encryption, was invented. Public key encryptio
5、n, also known as asymmetrical (不对称的) encryption, utilizes a pair of keyspublic key and private key. The public key (公钥)is available to anyone who wants to send an encrypted message to the holder of the private key. The only way to decrypt the message is with the private key. In this way messages can
6、 be sent without agreeing on the keys in advance.,Saturday, October 10, 2020,Text,Integrity A message that has not been altered in any way, either intentionally or unintentionally, is said to have maintained its integrity. An effective way called “Hashing” (散列法,哈希算法) can be used to ensure message in
7、tegrity. The Hash value of a message is computed using Hashing algorithm and content of the message.,Saturday, October 10, 2020,Text,The Hash value (Hash值)is sent along with the message,when message is received, another Hash value is calculated by the receiver using the same Hashing algorithm (算法).
8、The two Hash values(received and calculated) are compared and a match will indicate that the message received is the same as the sent one.,Saturday, October 10, 2020,Text,Authenticity When an electronic message is received, the identity of the sender needs to be verified in order to determine whethe
9、r the sender is who he claims to be. One of the most effective authentication (鉴定)measures is digital certificate. A digital certificate is a data file and is issued by a trusted third party called CA . There are a number of types of digital certificates, each with its own level of trustworthiness(可
10、信任) and area of application.,Saturday, October 10, 2020,Text,Non-repudiation For business transactions, unilateral (单方的)repudiation(否认) of a transaction by either party is unacceptable and may result in legal action. Companies engaged in electronic commerce are often vulnerable (易受攻击的)to non-repudia
11、tion risks. An effective way to enable non-repudiation is digital signature. A digital signature is actually a digest of message that is encrypted and then sent along with the message.,Saturday, October 10, 2020,Text,When you use a private key to encrypt a digest of message, you create a digital sig
12、nature. Then you have no way to deny you ever sent a particular message. The Internet brings people incredible convenience and opportunities, but at the same time it brings risks as well. The heavy lessons of Internet crime draw peoples great attention to improve the situation of electronic commerce
13、 security.,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Vocabulary: Match each of the
14、following words to the phrase or definition that is most closely related.,Saturday, October 10, 2020,Exercises,Translate the following phrases into English. (1) a pair of keyspublic key and private key 一对密钥,即公钥和私钥 (2) 发送加密信息 send an encrypted message (3) agree on the keys in advance 事先约定密钥 (4)ensure
15、 message integrity 保证信息完整性,Saturday, October 10, 2020,Exercises,(5) 与发出的信息一致 the same as the sent message (6) 颁发数字证书的CA机构的名称 the name of the CA that issued the digital certificate (7)数字证书的有效期 the validity period of the digital certificate,Saturday, October 10, 2020,Exercises,(8) 用私钥对信息摘要进行加密 use a p
16、rivate key to encrypt a digest of message (9)互联网犯罪的沉痛教训 heavy lessons of Internet crime (10) 提升电子商务安全状况 improve the situation of electronic commerce security,Saturday, October 10, 2020,Exercises,2. Translate the following sentences into Chinese. (1) The difficulty is how to have the sender and the r
17、eceiver who will probably never meet agree on a key that cannot be known by anyone else. 信息的发送者和接受者很可能一直不会见面, 这样他们约定密钥而不让第三方知道就有困难。,Saturday, October 10, 2020,Exercises,(2)A message that has not been altered in any way, either intentionally or unintentionally, is said to have maintained its integrit
18、y. 如果信息没有被有意或无意地以任何方式篡改,我们就说信息保持了完整性。,Saturday, October 10, 2020,Exercises,(3)When an electronic message is received, the identity of the sender needs to be verified in order to determine whether the sender is who he claims to be. 当收到电子信息时,需要对发送者的身份进行核实以保证发送者就是他所声称的人。,Saturday, October 10, 2020,Exer
19、cises,(4)For business transactions, unilateral repudiation of a transaction by either party is unacceptable and may result in legal action. 在商务活动中,任何一方否认交易都是不可接受的,可能会导致法律纠纷。,Saturday, October 10, 2020,Read and practice the following dialog in pairs.,A: Hi, Jerry, I just read an article about electronic commerce security. May I ask you some questions? B: Sure, go ahead. A: What are the basic requirements for electronic co
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 跨国公司经营与管理
- 农村综合开发项目及资金合作协议
- 采购主管职位说明书
- 企业级无线网络覆盖及维护服务协议
- 声与现代科技课件
- 年度业绩汇报与未来展望演讲致辞
- 绿色包装项目2024年投资合同
- 企业内部培训体系建设与人才培养策略设计
- 幼儿园心理健康教育故事解读
- 三农村宅基地管理方案
- 2024-2025学年天津市和平区天津一中高三综合测试英语试题试卷含解析
- 2024-2030年中国地铁广告行业市场现状供需分析及投资评估规划分析研究报告
- 高等职业学校人工智能技术应用专业实训教学条件建设标准
- 2024年水利安全员(B证)考试题库-上(单选题)
- 辐射防护试题库+答案
- DWI高信号常见疾病的鉴别诊断课件-2
- 酸碱滴定分析与讨论实验报告
- 2024医疗器械运输合同范本
- 血管内超声在冠状动脉疾病中应用的中国专家共识(全文)
- 教科版科学三年级下册第一单元《 物体的运动》测试卷含答案【完整版】
- (正式版)JTT 1495-2024 公路水运危险性较大工程安全专项施工方案审查规程
评论
0/150
提交评论