[go: up one dir, main page]

Zhang et al., 2023 - Google Patents

Controlling Network Risk in E-commerce

Zhang et al., 2023

Document ID
4167196794187008548
Author
Zhang R
Fang L
He X
Wei C
Publication year
Publication venue
The Whole Process of E-commerce Security Management System: Design and Implementation

External Links

Snippet

No network security, no e-commerce security. This chapter analyzes the security risks faced by the e-commerce network and how to identify the e-commerce network security risks, then analyzes the e-commerce network security risk assessment content and assessment …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Borky et al. Protecting information with cybersecurity
Lin et al. At the nexus of cybersecurity and public policy: Some basic concepts and issues
Shaffi Strengthening data security and privacy compliance at organizations: A Strategic Approach to CCPA and beyond
Priyadarshini Introduction on cybersecurity
Mukherjee Overview of the Importance of Corporate Security in business
Shukla et al. Security analysis of the cyber crime
Rawal et al. Cybersecurity and identity access management
Jariwala The Cyber Security Roadmap A Comprehensive Guide to Cyber Threats, Cyber Laws, and Cyber Security Training for a Safer Digital World
Salau et al. Towards a Threat Model and Security Analysis for Data Cooperatives.
Belmabrouk Cyber criminals and data privacy measures
Joshi et al. Security for E-governance
Rawal et al. The basics of hacking and penetration testing
Firmansyah Cybersecurity Fundamentals
Kangwa Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation.
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Mack Cyber security
Rai et al. Cyber Security
Zhang et al. Controlling Network Risk in E-commerce
Yakubdjanovna et al. Analysis of Information Security Problems in Electronic Management with Possible Solutions
Feagin The value of cyber security in small business
Rawal et al. Cybersecurity for Beginners
Bayya Building Robust Fintech Reporting Systems Using JPA with Embedded SQL for Real-Time Data Accuracy and Consistency
Ali et al. Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
Rahmawati Advanced Traffic Shaping and Filtering Mechanisms to Combat Phishing Attacks in Integrated E-Commerce Cloud Environments
Bolhari Electronic-supply chain information security: a framework for information