Current location - Quotes Website - Personality signature - What are the security requirements of e-commerce and what methods can be used to achieve them?
What are the security requirements of e-commerce and what methods can be used to achieve them?
what are the security requirements of e-commerce, and how to achieve them

1. Confidentiality

As a means of trade, e-commerce information directly represents the trade secrets of individuals, enterprises or countries. Traditional paper trade is to keep secrets by mailing sealed letters or transmitting commercial messages through reliable communication channels. E-commerce is based on an open network environment, and maintaining trade secrets is an important guarantee for the comprehensive popularization and application of e-commerce.

2. Integrity

E-commerce simplifies the trade process, reduces human intervention, and at the same time brings the problem of maintaining the integrity and unity of business information of all trading parties. Due to unexpected errors or fraudulent acts in data input, differences in information between trading parties may occur. In addition, the loss of information, duplication of information or the difference in the order of information transmission in the process of data transmission will also lead to the difference of information among trading parties. It is necessary to prevent the random generation, modification and deletion of information, prevent the loss and repetition of information in the process of data transmission and ensure the unity of information transmission order.

3. Reliability

In traditional paper-based trade, both trading parties identify their trading partners by handwritten signatures or seals on written files such as trading contracts, contracts or trade documents, so as to determine the reliability of contracts, contracts and documents and prevent repudiation. This is what people often say "in black and white". Under the paperless e-commerce mode, it is impossible to identify the traders by handwritten signatures and seals. Therefore, it is necessary to provide reliable identification for individuals, enterprises or countries involved in the transaction during the transmission of transaction information.

4. Effectiveness

Electronic commerce replaces paper, so how to ensure the effectiveness of this electronic form of trade information is the premise of developing electronic commerce.

5. Reliability

Traditional transactions are face-to-face, which makes it easier to ensure the trust relationship between the two parties and the security of the transaction process. However, transactions in e-commerce activities are conducted through the Internet, and buyers and sellers do not meet each other, thus lacking the sense of trust and security in traditional transactions.

A survey of 23, Internet users conducted by a survey organization of the University of Michigan in the United States shows that more than 6% people are reluctant to make online shopping because of the security problems of e-commerce. No individual, enterprise, commercial organization or bank will conduct business transactions through an insecure network, which will lead to the disclosure of confidential business information or personal privacy, thus leading to huge loss of interests.

According to the "Statistical Report on Internet Development in China" released by China Internet Network Information Center (CNNIC), in e-commerce, 52.26% of users are most concerned about the security and reliability of transactions. It can be seen that the network security and transaction security in e-commerce are the key to realize e-commerce. What are the security requirements for e-commerce

Because of the Internet, our world has become a global village. Therefore, it has become a trend to start a business at home through the Internet. Bill Gates, the richest man in the world, said as early as last century: In the 21st century, there will be either e-commerce or no business. Ma Yun, the godfather of China's entrepreneurship, once said: If you don't do e-commerce, you will definitely regret it after five years. It is also predicted that the pattern of e-commerce industry in China will change dramatically, a new Internet crowd "Internet merchants" will become the focus, and the Internet in China will be transformed from the era of "netizens" and "netizens" to the era of "Internet merchants". The group of "online merchants" is also changing the operation mode of enterprises in China, changing the competitive pattern of China economy, and will also change the consumption mode and life speed of human beings. What are the security requirements of e-commerce system?

hello!

I'm glad to solve the problem for you

Information confidentiality (with encryption requirements) The certainty of the trader's identity is undeniable (because of the ever-changing business situation, once the transaction is reached, it cannot be denied. Otherwise, it will inevitably harm the interests of one party. Irreversibility (the file of a transaction cannot be modified. If it can change the contents of the file, then the transaction itself is unreliable, and customers or businesses may suffer losses. Therefore, the electronic transaction files should also be unchangeable to ensure the seriousness and fairness of the transaction.)

If you don't understand, please ask.

If satisfied, please adopt it as the "best answer"

What are the security requirements of the e-commerce system that Er Ting hopes can help you?

information confidentiality (encryption required)

certainty of trader's identity

non-repudiation (due to the ever-changing business situation, once a transaction is reached, it cannot be denied. Otherwise, it will inevitably harm the interests of one party.

Irremodifiability (the file of a transaction cannot be modified. If it can change the contents of the file, then the transaction itself is unreliable, and customers or businesses may suffer losses. Therefore, the electronic transaction files should also be unchangeable to ensure the seriousness and fairness of the transaction.) What are the security requirements of e-commerce?

The security requirements of e-commerce generally include:

Stable operation: the system will not be crashed, if there is a computer downtime, it can be automatically switched, and if there is a line failure, there is a spare line.

Prevention from being attacked: active defense and quick repair in case of attack. Software system to avoid loopholes

data security: data are backed up regularly, including member data/trading data, to prevent being damaged/lost/stolen

financial security: to ensure the safety of current capital flow, trading accounts and related data

What are the requirements of e-commerce

The basic requirement is to build your own website, first of all, to build a platform based on Internet technology. It has the functions of transaction, settlement and logistics in-transit monitoring, fund-raising and off-site warranty printing, market inquiry and online auction, online secret room negotiation and contract generation, supply of goods and production capacity of steel production lines, and feedback research and development of special varieties and special needs. Then it is to establish or link logistics parks all over the main supply locations. It is also necessary to link and tie up the logistics distribution team. Only in this way is the real e-commerce platform. What are the security elements of e-commerce?

On the scientific road,

If we add emotional factors, then even though it is only a kind of love,

Pay equal wages normally from the standpoint of caring for compatriots

State law and dignity. Briefly describe the security elements of e-commerce

Computer network security, business transaction security, and security risks of e-commerce. What are the risks faced by customers? < p For example: customer's account number and password, credit card information, customer computer system and data, etc.

Risks faced by sellers

In e-commerce, there are three main risks faced by sellers, namely, fake customers, blocked services and data theft.

Risks faced by enterprises themselves

(1) Man-made disasters include computer viruses and man-made destruction of hardware devices.

(2) risks of intranet. According to statistics, 85% of the attacks on network systems come from hackers inside enterprises.

(3) risks when enterprises conduct business activities with other enterprises. When an enterprise conducts business cooperation or competition with other enterprises, other enterprises may steal the archives or materials of the enterprise by illegal means. Among them, the risks are: theft of data in transmission, theft of data and files on enterprise computers.

The implementation of e-commerce on the Internet is not standardized

There are irregularities in online taxation, contracts and insurance, and the imperfection of laws on the Internet, which restrict the development of e-commerce on the Internet.