资源描述:
《关于金融计算机犯罪分析和防范(译文)》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、Abstract:Withtherapiddevelopmentofcomputertechnology,Internet,securityhasbecomeafinancialinformationsystemlife.Thispaperdescribesacommoncomputernetworksecuritythreats,financialcharacteristicsofcomputercrime,computerleakchannels,andproposemeasurestopreve
2、ntfinancialcrime,inordertobetterpreventtheoccurreneeoffinancialcomputercrimes・PaperKeywords:financialinformation;informationsecurity;computercrimeWiththeaccelerationoffinancialinformation,financialinformationsystemsgraduallyexpandthescale,theamountoffin
3、ancialinformationassetsalsoincreaseddramatically,andhowalotofinformat!onontheeffectivemanagementofassets,sothatdifferentlevelsofinformationassetscanbedifferentlevelsofsecurityprotection,willbethefinancialinformationsystemsecuritymanagementchallengefacin
4、gthesametime,theaccelerationoffinancialinformation,isboundtomakepublicfinancialinformationsystemsandInternetconnectivityathomeandabroad,thenallkindsofattacksfromthepublicInternet,thefinancialinformationsystemwillavailabilityofhugethreatsandabuse:Acomput
5、ernetworksecuritythreatsandmanifestationsComputernetworkwiththecompositionofthediversityofbroaddistributionterminal,networkopennessandconnectivityandotherfeatures,whichmakesthenetworkvulnerabletohackers,malwareandvirusattacks(A)commoncomputernetworksecu
6、ritythreats1.Informationdisclosure:thatinformationisdisclosedtounauthorizedentities・Itunderminesthesystem'sconfidentiality・Canleadtoinformationdisclosurethreatsnetworkmonitoring,trafficanalysis,electromagnetic,radiointercepts,personnelintentionallyoruni
7、ntentionally,themedia,cleanup,exploits,authorizedinvasionofrelaxation,physicalintrusion,virus,patientshorses,backdoors,roguesoftware,networkfishingfish:2.Integrityofthedamage.Canexploit,physicalabuse,licerisingviolations,viruses,trojans,vulnerability,et
8、c・Manis.3・Denialofserviceattacks:theinformationorresourcesyoucanlegallyaccess,butwasillegallyrefusedordelayedtime-sensitiveoperations:4.Networkabuse:abuseoflegitimatenetworkusersjusttointroduceunnecessarysecuritythreats,including