Traditional Culture Encyclopedia - Traditional stories - With case studies to illustrate the entire e-commerce transaction process what security problems exist, what are the outstanding performance?
With case studies to illustrate the entire e-commerce transaction process what security problems exist, what are the outstanding performance?
(a) computer network security threats
E-commerce contains "three streams": information flow, capital flow, logistics, "three streams" in the core of the information flow is the most important, e-commerce is precisely through the flow of information for the completion of the flow of capital and logistics. The most important difference between e-commerce and traditional business is that the computer network is used to transmit information and promote the completion of information flow. The security of computer network will definitely affect the "information flow" of e-commerce, and will definitely affect the development of e-commerce. There are the following security threats to computer networks:
1. Hacking
Hacking refers to the hacker's illegal access to the network, illegal use of network resources. With the development of the Internet, hacker attacks are also frequent and indefensible, hackers use any loopholes and defects on the Internet to modify web pages, illegal access to the host, steal information and other related harmful activities. 2003, the U.S. Department of Defense's "Pentagon" alone was subjected to 2.3 million attempts to attack its network. From here we can see that hacker attacks have become an important security threat to computer networks in e-commerce.
2. Attacks by computer viruses
Virus is a program that can destroy the normal operation of a computer system and is infectious. With the development of the Internet, viruses use the Internet, making the spread of viruses greatly accelerated, it invades the network, destroying resources, has become another important security threat to computer networks in e-commerce.
3. Denial of Service Attack
Denial of Service Attack (DoS) is a destructive attack, it is a user to use some means to intentionally take up a large number of network resources, so that the system does not have the remaining resources to provide services to other users of the attack. Currently representative means of denial of service attacks include SYNflood, ICMPflood, UDPflood, etc. With the development of the Internet, denial-of-service attacks have become an important threat in network security.
(2) Business transaction security threats
The traditional business activities on the Internet, due to the characteristics of the Internet itself, there are many security threats to the e-commerce has brought the security problem. Internet originated from the demand for computer resources **** enjoyment, has a good openness, but it is precisely because of its openness, make it produce more serious problems. The Internet has the following security risks:
1. Openness
Openness and resource ****sharing is the Internet's biggest feature, but its problems can not be ignored. It is this openness that brings security threats to e-commerce.
2. Lack of security mechanisms of the transmission protocol
TCP / IP protocol is built under the trusted environment, the lack of appropriate security mechanisms, this address-based protocol itself will leak the password, there is no consideration of the security issue; TCP / IP protocol is completely open, its remote access features so that many attackers do not have to be present to the scene will be able to get, the connection of the hosts based on the principle of mutual trust and other such properties make the network more insecure.
3. Vulnerabilities in software systems
With the increasing scale of software systems, security vulnerabilities or "backdoors" in the system are inevitable. Such as cookie programs, JAVA applications, Internet Explorer and other software and programs may bring security threats to our e-commerce.
4. Electronic information
The inherent weakness of electronic information is the lack of credibility, whether the electronic information is correct and complete is very difficult to identify by the information itself, and in the Internet delivery of electronic information, there is difficulty in confirming that the sender of the information and whether the information is correctly delivered to the recipient of the problem.
(C) Computer Network Security Threats and Business Transaction Security Threats to E-Commerce Security Problems
1. Information Leakage
In e-commerce is manifested as the leakage of business secrets, and the above computer network security threats and Internet security hazards may make information leakage in e-commerce, which mainly includes two aspects: (1) The content of the transaction party to carry out the transaction is stolen by a third party. (2) the transaction of a party to provide the other party to use the document third-party illegal use.
2. Tampering
It is because of the above computer network security threats and Internet security risks, electronic transaction information in the process of transmission on the network, may be illegally modified, deleted or replayed by others (refers to the use of the information can only be used once by the use of information for many times), so that the information has lost the authenticity and integrity.
3. Identification
It is because the two parties in an e-commerce transaction to complete the transaction through the network, the two sides do not meet each other, do not know each other, the security threat of the computer network and the security risks of the Internet, but also may make e-commerce transactions in the transaction of the identity of the transaction of the body to fake the problem.
4. Information destruction
The computer network itself is susceptible to some malicious programs, such as computer viruses, Trojan horse programs, logic bombs, etc., resulting in e-commerce information in the transmission process is destroyed.
5. Destruction of the validity of the information
The transaction process in e-commerce is to electronic information instead of paper information, the information we must also ensure that it is the time of the validity of the information and its own validity, we must be able to confirm that the information is indeed issued by the transaction party, the threat of the security of the computer network and the security risks of the Internet, making it difficult to ensure the validity of the information in e-commerce. The validity of information in e-commerce.
6. Disclosure of privacy
Privacy is an issue of great concern to individuals involved in e-commerce. Individuals involved in e-commerce must provide personal information, and computer network security threats and Internet security risks may lead to the leakage of personal information, destroying personal privacy.
Two, the security requirements of e-commerce to edit this paragraph It is because of e-commerce in the process of carrying out a lot of security problems, we want to make e-commerce in a normal and orderly manner, it is necessary to ensure that e-commerce security, to solve the above security problems, to create a safe e-commerce environment, so such a safe e-commerce environment and what are the security requirements to be a solution for us to solve the security problems of e-commerce. E-commerce security issues to be addressed next:
(a) confidentiality of information
Transactions in the business information generally have confidentiality requirements, the content of the information can not be accessed by others, especially when it comes to a number of business secrets and payment and other sensitive information, the confidentiality of the information is more important.
(ii) the integrity of the information
The integrity of the information, including e-commerce information is not tampered with, not to be omitted.
(iii) Non-repudiation and non-repudiation of communication
After a piece of information in e-commerce activities has been sent or received, it should be ensured in a certain way that the parties to the information have sufficient evidence to prove that the operation of receiving or sending has taken place.
(d) Authentication of the identity of the parties to the transaction
To make an online transaction successful, those involved in the transaction should first be able to confirm the identity of the other party, and to determine whether the other party's true identity is the same as the other party's claim.
(E) the validity of the information
E-commerce in electronic form to replace paper, then how to ensure the validity of this electronic form of trade information is to carry out the premise of e-commerce.
(F) Protection of personal privacy
Whether or not personal privacy can be protected in e-commerce will inevitably affect the motivation of individual consumers to participate in e-commerce.
Three, e-commerce security countermeasures to edit this paragraph To create an e-commerce environment that meets the security requirements of e-commerce, it is correspondingly necessary to address two aspects of the security threat: one is the security threat of the computer network, and the other is the security threat to the business transaction, the security of e-commerce brought about by the security problem. We create a safe e-commerce environment countermeasures are:
(a) the use of e-commerce security technology
1. computer network security technology
e-commerce in the use of important tools computer networks, there are many security threats, the establishment of computer networks enough to carry out the basis of e-commerce, we want to ensure the security of e-commerce, first of all, to ensure the security of computer networks. To ensure the security of e-commerce, we must first ensure the security of the computer network.
(1) firewall technology
Firewall refers to the isolation of the local network and the outside world between a defense facility, is a general term for this type of preventive measures. It can restrict others to enter the internal network, filter out unsafe services and illegal users: allow part of the host of the internal network to be accessed by the external network, the other part of the protection; limit the internal network of users to the Internet access to special sites; to monitor the Internet security to provide convenience. Opponents of us to create a secure e-commerce environment is currently the safest way to utilize the dual firewall dual server approach.
(2) Intrusion Detection System (IDS)
Firewall is very good, but the firewall also has a lot of shortcomings, such as firewalls can not prevent attacks that do not pass through the firewall, firewalls can not prevent new network security issues. In order to make up for the shortcomings of the firewall, we can use intrusion detection systems to ensure the security of computer networks. Intrusion Detection (Intrusion Detection), as the name suggests, is the detection of intrusion behavior. It collects information and analyzes it through a number of key points in a computer network or computer system, from which it finds out whether there is a violation of security policies and signs of attack in the network or system. The combination of software and hardware for intrusion detection is the Intrusion Detection System (IDS).
(3) Virtual Private Network (VPN) technology
Virtual Private Network (VPN) is a new network technology. As the name suggests, the virtual private network is not really a private network, it uses the unreliable public network as the medium of information transmission, through additional security tunnels, user authentication and access control and other technologies to achieve similar security functions with the private network, so as to realize the safe transmission of important information. By utilizing virtual private network technology, we can create a relatively secure network.
(4) virus prevention and control technology
E-commerce computer networks are constantly being harmed by virus attacks, in order to minimize the harm of computer viruses, we can start from the following aspects: First, attach great importance to computer viruses; Second, the installation of computer virus prevention and control software, and constantly update the virus database.
2. Business Transaction Security Technology
In order to create a secure e-commerce environment, we must ensure the security of traditional business activities on the Internet, we should establish a security system for e-commerce.
(1) Basic Encryption Technology
The process of performing some kind of transformation on plaintext data to make it into an unintelligible form is encryption, and this unintelligible form is called ciphertext. Decryption is the reverse process of encryption, whereby the ciphertext is restored to plaintext. Encryption of information using cryptography is the most commonly used means of security. In e-commerce, there are two types of modern encryption techniques that have gained wide application: symmetric encryption regime and asymmetric encryption regime. The basic encryption technology is the foundation of e-commerce security system, as well as the security authentication means and security protocols, the use of which can ensure the confidentiality of information in e-commerce.
(2) security authentication means
The use of basic encryption technology can only guarantee the confidentiality of information in e-commerce, in order to create a secure e-commerce environment, we must also ensure that e-commerce in the integrity of the information, non-repudiation, non-repudiation of the communication, the identity of all parties involved in the transaction, the authentication of the validity of the information, which has to be used to the basic encryption technology based on the development of the Security authentication means:
①Use of digital envelope technology to ensure the confidentiality of information in electronic commerce.
②The use of Hash function as the core of the digital digest technology to ensure the integrity of information in electronic commerce.
③The establishment of CA authentication system to the e-commerce transaction parties to issue digital certificates to ensure that e-commerce transactions in the identity of the parties to the authentication. In e-commerce, in order to make a large number of certification authorities CA (Certification Authority) with an open standard, so that the interconnection between the mutual authentication, to achieve secure CA management, which requires the establishment of public key infrastructure (Public Key Infrastructure, referred to as PKI).
④The use of digital time stamps to ensure the validity of information in e-commerce.
⑤ The use of digital signature technology to ensure the non-repudiation and non-repudiation of communications in e-commerce and the validity of information.
(3) security protocols
To ensure the security of the e-commerce environment, it is necessary to establish e-commerce security solutions with security authentication means and security protocols. At present, there are two security authentication protocols widely used in e-commerce, namely, Secure Sockets Layer (Secure Sockets Layer) protocol and Secure Electronic Transaction SET (Secure Electronic Transaction) protocol.
(B) the development of e-commerce security management system
e-commerce security management system is in the form of text on the security requirements of the provisions of these systems should include personnel management system, confidentiality system, tracking and auditing system, system maintenance system, data backup system, virus cleaning system on a regular basis.
(C) Strengthen the integrity of education, the establishment of a social integrity system
E-commerce in many security issues such as the transaction of the denial, denial, destruction of personal privacy, in the final analysis, is still the problem of human integrity, in order to promote the better development of e-commerce, to dispel the consumer security concerns about e-commerce, we should strengthen the integrity of education, the establishment of a social integrity system.
- Previous article:What is delicious in Fenggang?
- Next article:What are the customs and traditions of the Spring Festival in Hunan?
- Related articles
- Why can't the six-year version of the Monkey King be surpassed so far?
- Wanted to ask what Myanmar is a traditional
- What are the cots manufacturers of printing machines?
- What is a Haircut?
- What are the four development stages of e-commerce?
- How to make simple paper craft toys
- In 20 18, Huawei moved16,800 people to Dongguan, and the large-scale migration will last until 20 19.
- Arguments for protecting traditional culture
- How does my world switch between survival mode and creation mode?
- What are the six arts?