Font Size: a A A

The Study Of E-commerce Security Strategy

Posted on:2009-11-28Degree:MasterType:Thesis
Country:ChinaCandidate:T J GuanFull Text:PDF
GTID:2178360245969810Subject:Business Administration
Abstract/Summary:PDF Full Text Request
With the development of internet, electronic commerce has become a trend in all over the worldwide. Government departments in many countries attach great importance to the electronic commerce development. They take the information revolution with the hallmark of electronic commerce equally important with industrialization of the steam engine revolution for the same mark, and have introduced a relevant policies and initiatives. E-commerce is gaining wide application, it brings huge affection to the human society, and a series of its related research in this field has become the world's hot spots. Recently, the development of e-commerce and gradually slowed down the pace. Its security problems are one of the main reasons hindering development. Therefore, I choose to explore the subject of this study has important practical significance.The first chapter of this thesis introduces the research background, summed up security at home and abroad on e-commerce and the status of China's e-commerce security on the issue and the development trend at presence. Papers second chapter present brief overview of the content of the e-commerce security, put out brief overview proposed in e-commerce security: Confidentiality of information, the integrity of the information, Information authenticity, non-repudiation of information, the validity of information. This chapter described information security threats on e-commerce, and the e-commerce security technology mechanism. In this paper, the hierarchical model will be mapped to the corresponding level of safety measures in four aspects to the exposition, including the network layer, layer encryption technology, certification of the technology, protocol layer technology. Based upon the Discussion in the e-commerce system security mechanisms, this paper give out e-commerce system architecture. Papers in the third chapter describes security evaluation methods on e-commerce, e-commerce systems evaluation criteria both at home and abroad, designs e-commerce security assessment indicators, give out a the safety of e-commerce feasibility method -fuzzy comprehensive evaluation method. In the fourth chapter, it introduced e-commerce transactions payment system model, and designed a transaction-based model agreement SET. In the fifth chapter, the e-commerce information security certification is discussed. The final chapter some recommendations are given on e-commerce enterprise security management. The correct e-commerce security concepts presented at the end of papers, and further points out the efforts direction that to solve the problem of e-commerce security.
Keywords/Search Tags:E-Commerce, E-Commerce Security, Security Technology, Evaluation Method, Security Certification
PDF Full Text Request
Related items