Hacking attack
Hacking attack refers to hackers illegally entering the network and illegally using network resources. With the development of Internet, hacker attacks often occur, which is hard to prevent. Hackers use any loopholes and defects on the Internet to modify web pages, illegally enter the host, steal information and other related harmful activities.
The attack of computer virus
A virus is an infectious program that can destroy the normal operation of a computer system. With the development of Internet, viruses use the Internet, which greatly speeds up the spread of viruses. It invades the network and destroys resources, which has become another important security threat to computer networks in e-commerce.
Denial of service attack
Denial of service attack (DoS) is a destructive attack. It is an attack that users deliberately occupy a large number of network resources by some means, leaving the system with no remaining resources to provide services for other users. At present, representative denial-of-service attacks include SYNflood, ICMPflood, UDPflood and so on. With the development of Internet, denial of service attack has become an important threat to network security.
make public
Openness and resource sharing are the biggest characteristics of the Internet, but its problems can not be ignored. It is this openness that poses a security threat to e-commerce.
A transport protocol lacking security mechanism
TCP/IP protocol is established in a trusted environment and lacks corresponding security mechanism. This address-based protocol itself will reveal passwords, regardless of security issues. TCP/IP protocol is completely open, its remote access function enables many attackers to succeed without going to the scene, and the connected hosts are based on the principle of mutual trust, which makes the network more insecure.
Vulnerability of software system
With the increasing scale of software system, security vulnerabilities or "back doors" in the system are inevitable. Such as cookie programs, JAVA applications, ie browsers, etc., may bring security threats to our e-commerce.
electronic message
The inherent weakness of electronic information is the lack of credibility, and it is difficult to identify whether electronic information is correct or complete by the information itself. In addition, when sending electronic information on the Internet, it is difficult to confirm the sender of the information and whether the information is correctly sent to the receiver.
information disclosure
In e-commerce, it is manifested in the disclosure of business secrets. The above-mentioned computer network security threats and Internet security risks may cause information leakage in e-commerce, mainly including two aspects: (1) The content of one party's transaction is stolen by a third party. (2) The documents provided by one party to the other party are illegally used by a third party.
distort
It is precisely because of the above-mentioned computer network security threats and Internet security risks that electronic transaction information may be illegally modified, deleted or replayed by others in the process of network transmission (meaning that information that can only be used once is used many times), which makes the information lose its authenticity and integrity.
identify
It is precisely because the two sides of e-commerce transactions complete the transaction through the network, and they do not meet or know each other. The security threats of computer networks and the hidden dangers of the Internet may also lead to identity forgery in e-commerce transactions.
Destruction of information
The computer network itself is easily destroyed by some malicious programs, such as computer viruses, Trojan horses, logic bombs and so on. , leading to the destruction of information in e-commerce during transmission.
Destroy the validity of information
In the process of e-commerce, electronic information is used to replace paper information. We must also ensure the validity of this information in time and our own information, and we must be able to confirm that this information is indeed sent by one party to the transaction. The security threats of computer networks and the hidden dangers of the Internet make it difficult for us to ensure the effectiveness of information in e-commerce.
Disclosure of personal privacy
Privacy is a matter of great concern to individuals involved in e-commerce. Individuals who participate in e-commerce must provide personal information. Computer network security threats and Internet security risks may lead to personal information disclosure and damage personal privacy.