Current location - Quotes Website - Personality signature - In the whole operation process of e-commerce, there are several typical security problems. What are they?
In the whole operation process of e-commerce, there are several typical security problems. What are they?
In the whole operation process of e-commerce, the main security issues are as follows:

Hacking attack

Hacking attack refers to hackers illegally entering the network and illegally using network resources. With the development of Internet, hacker attacks often occur, which is hard to prevent. Hackers use any loopholes and defects on the Internet to modify web pages, illegally enter the host, steal information and other related harmful activities.

The attack of computer virus

A virus is an infectious program that can destroy the normal operation of a computer system. With the development of Internet, viruses use the Internet, which greatly speeds up the spread of viruses. It invades the network and destroys resources, which has become another important security threat to computer networks in e-commerce.

Denial of service attack

Denial of service attack (DoS) is a destructive attack. It is an attack that users deliberately occupy a large number of network resources by some means, leaving the system with no remaining resources to provide services for other users. At present, representative denial-of-service attacks include SYNflood, ICMPflood, UDPflood and so on. With the development of Internet, denial of service attack has become an important threat to network security.

make public

Openness and resource sharing are the biggest characteristics of the Internet, but its problems can not be ignored. It is this openness that poses a security threat to e-commerce.

A transport protocol lacking security mechanism

TCP/IP protocol is established in a trusted environment and lacks corresponding security mechanism. This address-based protocol itself will reveal passwords, regardless of security issues. TCP/IP protocol is completely open, its remote access function enables many attackers to succeed without going to the scene, and the connected hosts are based on the principle of mutual trust, which makes the network more insecure.

Vulnerability of software system

With the increasing scale of software system, security vulnerabilities or "back doors" in the system are inevitable. Such as cookie programs, JAVA applications, ie browsers, etc., may bring security threats to our e-commerce.

electronic message

The inherent weakness of electronic information is the lack of credibility, and it is difficult to identify whether electronic information is correct or complete by the information itself. In addition, when sending electronic information on the Internet, it is difficult to confirm the sender of the information and whether the information is correctly sent to the receiver.

information disclosure

In e-commerce, it is manifested in the disclosure of business secrets. The above-mentioned computer network security threats and Internet security risks may cause information leakage in e-commerce, mainly including two aspects: (1) The content of one party's transaction is stolen by a third party. (2) The documents provided by one party to the other party are illegally used by a third party.

distort

It is precisely because of the above-mentioned computer network security threats and Internet security risks that electronic transaction information may be illegally modified, deleted or replayed by others in the process of network transmission (meaning that information that can only be used once is used many times), which makes the information lose its authenticity and integrity.

identify

It is precisely because the two sides of e-commerce transactions complete the transaction through the network, and they do not meet or know each other. The security threats of computer networks and the hidden dangers of the Internet may also lead to identity forgery in e-commerce transactions.

Destruction of information

The computer network itself is easily destroyed by some malicious programs, such as computer viruses, Trojan horses, logic bombs and so on. , leading to the destruction of information in e-commerce during transmission.

Destroy the validity of information

In the process of e-commerce, electronic information is used to replace paper information. We must also ensure the validity of this information in time and our own information, and we must be able to confirm that this information is indeed sent by one party to the transaction. The security threats of computer networks and the hidden dangers of the Internet make it difficult for us to ensure the effectiveness of information in e-commerce.

Disclosure of personal privacy

Privacy is a matter of great concern to individuals involved in e-commerce. Individuals who participate in e-commerce must provide personal information. Computer network security threats and Internet security risks may lead to personal information disclosure and damage personal privacy.