版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、English for E-Commerce,Unit 4 Online Payment,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, October 10, 2020,Word study,Saturday, Octobe
2、r 10, 2020,Word study,Saturday, October 10, 2020,Text,Requirements for Electronic Commerce Security In general, the basic requirements for electronic commerce security include privacy, integrity, authenticity (真实性)and non-repudiation.(不可否认性).,Saturday, October 10, 2020,Text,Privacy When a message is
3、 sent electronically, the sender and the receiver may desire that the message is not revealed to others. The most effective technique for privacy is encryption(加密). For much of history, encryption algorithms (算法)were symmetrical (对称的), which means that the same key was used to both encrypt(加密) and d
4、ecrypt (解密) a message. The difficulty is how to have the sender and the receiver who will probably never meet agree on a key that cannot be known by anyone else.,Saturday, October 10, 2020,Text,For this reason, a new type of algorithm, called public key encryption, was invented. Public key encryptio
5、n, also known as asymmetrical (不对称的) encryption, utilizes a pair of keyspublic key and private key. The public key (公钥)is available to anyone who wants to send an encrypted message to the holder of the private key. The only way to decrypt the message is with the private key. In this way messages can
6、 be sent without agreeing on the keys in advance.,Saturday, October 10, 2020,Text,Integrity A message that has not been altered in any way, either intentionally or unintentionally, is said to have maintained its integrity. An effective way called “Hashing” (散列法,哈希算法) can be used to ensure message in
7、tegrity. The Hash value of a message is computed using Hashing algorithm and content of the message.,Saturday, October 10, 2020,Text,The Hash value (Hash值)is sent along with the message,when message is received, another Hash value is calculated by the receiver using the same Hashing algorithm (算法).
8、The two Hash values(received and calculated) are compared and a match will indicate that the message received is the same as the sent one.,Saturday, October 10, 2020,Text,Authenticity When an electronic message is received, the identity of the sender needs to be verified in order to determine whethe
9、r the sender is who he claims to be. One of the most effective authentication (鉴定)measures is digital certificate. A digital certificate is a data file and is issued by a trusted third party called CA . There are a number of types of digital certificates, each with its own level of trustworthiness(可
10、信任) and area of application.,Saturday, October 10, 2020,Text,Non-repudiation For business transactions, unilateral (单方的)repudiation(否认) of a transaction by either party is unacceptable and may result in legal action. Companies engaged in electronic commerce are often vulnerable (易受攻击的)to non-repudia
11、tion risks. An effective way to enable non-repudiation is digital signature. A digital signature is actually a digest of message that is encrypted and then sent along with the message.,Saturday, October 10, 2020,Text,When you use a private key to encrypt a digest of message, you create a digital sig
12、nature. Then you have no way to deny you ever sent a particular message. The Internet brings people incredible convenience and opportunities, but at the same time it brings risks as well. The heavy lessons of Internet crime draw peoples great attention to improve the situation of electronic commerce
13、 security.,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Saturday, October 10, 2020,Exercises,Vocabulary: Match each of the
14、following words to the phrase or definition that is most closely related.,Saturday, October 10, 2020,Exercises,Translate the following phrases into English. (1) a pair of keyspublic key and private key 一对密钥,即公钥和私钥 (2) 发送加密信息 send an encrypted message (3) agree on the keys in advance 事先约定密钥 (4)ensure
15、 message integrity 保证信息完整性,Saturday, October 10, 2020,Exercises,(5) 与发出的信息一致 the same as the sent message (6) 颁发数字证书的CA机构的名称 the name of the CA that issued the digital certificate (7)数字证书的有效期 the validity period of the digital certificate,Saturday, October 10, 2020,Exercises,(8) 用私钥对信息摘要进行加密 use a p
16、rivate key to encrypt a digest of message (9)互联网犯罪的沉痛教训 heavy lessons of Internet crime (10) 提升电子商务安全状况 improve the situation of electronic commerce security,Saturday, October 10, 2020,Exercises,2. Translate the following sentences into Chinese. (1) The difficulty is how to have the sender and the r
17、eceiver who will probably never meet agree on a key that cannot be known by anyone else. 信息的发送者和接受者很可能一直不会见面, 这样他们约定密钥而不让第三方知道就有困难。,Saturday, October 10, 2020,Exercises,(2)A message that has not been altered in any way, either intentionally or unintentionally, is said to have maintained its integrit
18、y. 如果信息没有被有意或无意地以任何方式篡改,我们就说信息保持了完整性。,Saturday, October 10, 2020,Exercises,(3)When an electronic message is received, the identity of the sender needs to be verified in order to determine whether the sender is who he claims to be. 当收到电子信息时,需要对发送者的身份进行核实以保证发送者就是他所声称的人。,Saturday, October 10, 2020,Exer
19、cises,(4)For business transactions, unilateral repudiation of a transaction by either party is unacceptable and may result in legal action. 在商务活动中,任何一方否认交易都是不可接受的,可能会导致法律纠纷。,Saturday, October 10, 2020,Read and practice the following dialog in pairs.,A: Hi, Jerry, I just read an article about electronic commerce security. May I ask you some questions? B: Sure, go ahead. A: What are the basic requirements for electronic co
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年暑期工劳动合同标准文本集3篇
- 番禺2025版租赁市场房源代理服务合同
- 2024结款协议合同范本
- 二零二四年国际货物销售合同:FOB条款与运输2篇
- 二零二五版高校毕业生就业指导与职业规划服务合同6篇
- 二零二五版电影剧本改编与制作投资合同范本3篇
- 2024物联网应用项目建设的合同标的
- 年度健腹椅竞争策略分析报告
- 年度全自动板框污泥脱水机产业分析报告
- 2025年度教育领域临时工招聘及教学质量合同4篇
- 第7课《中华民族一家亲》(第一课时)(说课稿)2024-2025学年统编版道德与法治五年级上册
- 2024年医销售药销售工作总结
- 急诊科十大护理课件
- 山东省济宁市2023-2024学年高一上学期1月期末物理试题(解析版)
- GB/T 44888-2024政务服务大厅智能化建设指南
- 2025年上半年河南郑州荥阳市招聘第二批政务辅助人员211人笔试重点基础提升(共500题)附带答案详解
- 山东省济南市历城区2024-2025学年七年级上学期期末数学模拟试题(无答案)
- 国家重点风景名胜区登山健身步道建设项目可行性研究报告
- 投资计划书模板计划方案
- 《接触网施工》课件 3.4.2 隧道内腕臂安装
- 2024-2025学年九年级语文上学期第三次月考模拟卷(统编版)
评论
0/150
提交评论