Zhang et al., 2023 - Google Patents
Controlling Network Risk in E-commerceZhang et al., 2023
- Document ID
- 4167196794187008548
- Author
- Zhang R
- Fang L
- He X
- Wei C
- Publication year
- Publication venue
- The Whole Process of E-commerce Security Management System: Design and Implementation
External Links
Snippet
No network security, no e-commerce security. This chapter analyzes the security risks faced by the e-commerce network and how to identify the e-commerce network security risks, then analyzes the e-commerce network security risk assessment content and assessment …
- 230000001276 controlling effect 0 title description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Borky et al. | Protecting information with cybersecurity | |
Lin et al. | At the nexus of cybersecurity and public policy: Some basic concepts and issues | |
Shaffi | Strengthening data security and privacy compliance at organizations: A Strategic Approach to CCPA and beyond | |
Priyadarshini | Introduction on cybersecurity | |
Mukherjee | Overview of the Importance of Corporate Security in business | |
Shukla et al. | Security analysis of the cyber crime | |
Rawal et al. | Cybersecurity and identity access management | |
Jariwala | The Cyber Security Roadmap A Comprehensive Guide to Cyber Threats, Cyber Laws, and Cyber Security Training for a Safer Digital World | |
Salau et al. | Towards a Threat Model and Security Analysis for Data Cooperatives. | |
Belmabrouk | Cyber criminals and data privacy measures | |
Joshi et al. | Security for E-governance | |
Rawal et al. | The basics of hacking and penetration testing | |
Firmansyah | Cybersecurity Fundamentals | |
Kangwa | Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation. | |
Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
Mack | Cyber security | |
Rai et al. | Cyber Security | |
Zhang et al. | Controlling Network Risk in E-commerce | |
Yakubdjanovna et al. | Analysis of Information Security Problems in Electronic Management with Possible Solutions | |
Feagin | The value of cyber security in small business | |
Rawal et al. | Cybersecurity for Beginners | |
Bayya | Building Robust Fintech Reporting Systems Using JPA with Embedded SQL for Real-Time Data Accuracy and Consistency | |
Ali et al. | Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence | |
Rahmawati | Advanced Traffic Shaping and Filtering Mechanisms to Combat Phishing Attacks in Integrated E-Commerce Cloud Environments | |
Bolhari | Electronic-supply chain information security: a framework for information |