Pirates: I am your father

Chapter 171 Untitled 8 (replacing the chapter, no need to read)



Abstract: With the rapid development of the Internet, e-commerce technology was born and developed rapidly, but the development of e-commerce is inseparable from the issue of network security.E-commerce network security includes e-commerce security threats, e-commerce security requirements, e-commerce security measures, e-commerce security technology and e-commerce security transaction protocols.

With the rapid development of the Internet, e-commerce has also ushered in earth-shaking changes.The Internet has penetrated into every corner of our lives, and e-commerce has also penetrated into our lives.We can buy daily necessities, electrical appliances and home furnishings in online malls, and we can even buy courses online.It can be said that in the past two decades, e-commerce has developed very rapidly from being involved by a few people to being involved in almost every household.

However, the rapid development of e-commerce benefits from the resource sharing, speed and convenience brought by the Internet. While the openness of the network improves people's work efficiency and quality of life, it will also inevitably bring a series of problems to e-commerce. security threats.At present, e-commerce security issues such as the sabotage activities of computer network hackers and the rapid spread of computer network viruses have become more and more prominent and have become important obstacles restricting the rapid development of e-commerce.

Security threats in e-commerce can be divided into computer network security threats and business transaction security threats.Computer network security threats refer to the potential exploitation of flaws in the network, resulting in the possibility of information leakage, system resource consumption, illegal access, resource theft, and system or information destruction.Network security threats come from many aspects and will continue to change with the advancement of information technology.Among them, computer network security threats include hardware security threats, software vulnerability threats, computer virus threats, network hacker attack threats, and imperfect security management threats, while business transaction security threats include credit threats, information security threats, and legal security threats.Every year, my country's e-commerce suffers from countless security threats. Taking the data from the previous year as an example,

Information confidentiality means that business information is not stolen by unauthorized users during transmission or storage.If information is leaked carelessly, it will cause heavy losses.Business information in transactions is subject to confidentiality requirements.If the credit card account number and user name are known, it may be stolen; if the ordering and payment information is known to competitors, business opportunities may be lost.

Information integrity refers to the consistency of commercial information during the transmission process, ensuring that the information has not been tampered with during the transmission process, and that there is no discrepancy between the information received by the receiving party and the information sent by the sender.If the information received is incomplete, you may be deceived by criminals, resulting in the leakage of your personal information or financial losses.

Since the realization of e-commerce requires the help of a virtual network platform, the two parties to the transaction do not need to meet each other on this platform. This brings uncertainty about the identity of both parties to the transaction. This uncertainty of identity greatly threatens the electronic commerce industry. For business security, intruders can take advantage of this uncertainty to pretend to be others and deceive legitimate users by issuing commands, accessing files, etc.

Non-repudiation means that neither the sender nor the recipient of commercial information can deny the information that has been sent or received.Unlike traditional transaction methods that use handwritten signatures and seals to identify trading parties, e-commerce transactions are completed through the Internet.How to determine the trading party to be traded is exactly the trading party expected for the transaction. This issue is the key to ensuring the smooth progress of e-commerce.Therefore, it is necessary to provide reliable identification for individuals, companies and countries involved in transactions during the transmission of transaction information.

System effectiveness refers to ensuring that business information is obtained in a timely manner and that services are not denied.The development of e-commerce requires us to confirm more economic matters.The validity of information ensures the interests of every participant in the transaction process.It is necessary to effectively and timely prevent and handle problems and failures in information technology and network processes to prevent the invasion of various viruses and the impact of technical failures on normal transactions.And ensure the validity of data during the transaction process.

Access control refers to preventing illegal access to various resources such as processes, communications, and information.Security managers are required to be able to control user permissions, allocate or terminate users' access, operation, access and other rights, so that the system refuses to provide information and services to unauthorized users.Ensuring information access control is generally achieved through identity authentication, firewall and other technologies.

A firewall is a combination of software and hardware devices that establishes a protective barrier at the interface between a trusted network and an untrusted network (such as between an internal network and an external network, between a private network and a public network).Firewalls ensure that network users access public networks with minimal risk, while also protecting private networks from external attacks.All connections between internal and external networks, private networks and public networks must pass through the protective layer, where various inspections, certifications and connections are performed.Only authorized communications can pass through this protection layer, thereby isolating the internal network from the external network, the private network and the public network in a certain sense. This can prevent illegal intrusions and illegal use of system resources, implement security management measures, and record all suspicious events. .

Encryption technology is the main security measure adopted in e-commerce, and traders can use it at the stage of information exchange as needed.The so-called encryption is to use mathematical methods to reorganize data, making it very difficult for anyone other than the legitimate recipient to restore the original "message" or understand the changed message.Encryption technology consists of two parts: key and cryptographic algorithm.The cryptographic algorithm uses a key to encrypt sensitive information, and then sends the encrypted data and key to the recipient. The recipient can use the same algorithm and the passed key to decrypt the data, thereby obtaining the sensitive information to ensure Confidentiality of network data.The use of i cryptography technology can meet the needs for e-commerce security and ensure the confidentiality, integrity, authenticity and non-repudiation of business transactions.

The issuance of digital certificates in e-commerce systems requires an authoritative and impartial third-party certification agency.Security authentication technologies mainly include digital digests, digital envelopes, digital signatures, digital timestamps, digital certificates, etc.

From the above discussion, we can know that there are many security threats in our e-commerce, and these threats affect or even harm our interests in all aspects.Therefore, we must strengthen our e-commerce security precautions and awareness.


Tip: You can use left, right, A and D keyboard keys to browse between chapters.