资源描述:
《关于金融计算机犯罪分析和防范(译文)new》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、Abstract:Withtherapiddevelopmentofcomputertechnology,Internet,securityhasbecomeafinancialinformationsystemlife.Thispaperdescribesacommoncomputernetworksecuritythreats,financialcharacteristicsofcomputercrime,computerleakchannels,andproposemeasurestopreve
2、ntfinancialcrime,inordertobetterpreventtheoccurrenceoffinancialcomputercrimes.PaperKeywords:financialinformation;informationsecurity;computercrimeWiththeaccelerationoffinancialinformation,financialinformationsystemsgraduallyexpandthescale,theamountoffin
3、ancialinformationassetsalsoincreaseddramatically,andhowalotofinformationontheeffectivemanagementofassets,sothatdifferentlevelsofinformationassetscanbedifferentlevelsofsecurityprotection,willbethefinancialinformationsystemsecuritymanagementchallengefacin
4、gthesametime,theaccelerationoffinancialinformation,isboundtomakepublicfinancialinformationsystemsandInternetconnectivityathomeandabroad,thenallkindsofattacksfromthepublicInternet,thefinancialinformationsystemwillavailabilityofhugethreatsandabuse:Acomput
5、ernetworksecuritythreatsandmanifestationsComputernetworkwiththecompositionofthediversityofbroaddistributionterminal,networkopennessandconnectivityandotherfeatures,whichmakesthenetworkvulnerabletohackers,malwareandvirusattacks(A)commoncomputernetworksecu
6、ritythreats1.Informationdisclosure:thatinformationisdisclosedtounauthorizedentities.Itunderminesthesystem'sconfidentiality.Canleadtoinformationdisclosurethreatsnetworkmonitoring,trafficanalysis,electromagnetic,radiointercepts,personnelintentionallyoruni
7、ntentionally,themedia,cleanup,exploits,authorizedinvasionofrelaxation,physicalintrusion,virus,patientshorses,backdoors,roguesoftware,networkfishingfish:2.Integrityofthedamage.Canexploit,physicalabuse,licensingviolations,viruses,trojans,vulnerability,etc
8、.Manis.3.Denialofserviceattacks:theinformationorresourcesyoucanlegallyaccess,butwasillegallyrefusedordelayedtime-sensitiveoperations:4.Networkabuse:abuseoflegitimatenetworkusersjusttointroduceunnecessarysecuritythreats,includingi