The intense and fulfilling college life is coming to an end. Graduation thesis is a form that every college student must pass. Graduation thesis is a planned way to test students' academic performance. How to write a graduation thesis? The following is my excellent graduation thesis on computer application. Welcome to read the collection.
abstract:
A remarkable feature of modern society is that information is generated, processed and transformed more and more frequently. As its hardware support, computers are infiltrating into every corner of society. This universal application has also brought a major and realistic problem-computer security. This paper mainly studies computer security technology and its application in e-commerce.
Paper Keywords:
Computer security technology; Application in e-commerce
1 computer security technology
Computer security technology is not only the security technology of computer information system, but also the protection technology to prevent external damage, attack and information theft and ensure the normal operation of computer system. I will discuss it from two angles: the research field of computer security technology, including aspects.
1. 1 There are two main research fields in computer security technology.
The first is computer anti-leakage technology. That is, the computer is shielded, filtered and grounded by radio technology to achieve the effect of leakage prevention.
The second is the security technology of computer information system. That is to say, by strengthening security management, improving and reforming the security configuration of the system, the computer information system can be prevented from being attacked by using computer network services, system configuration, operating system and system source code, so that the computer information system can run safely.
1.2 computer security technology includes several aspects.
Computer security technology includes two aspects: personal computer security technology and computer network security technology.
1.2. 1 personal computer security technology
The security technology of personal computer is an important matter that concerns every user who uses personal computer. It includes hardware security technology, operating system security technology, application software security technology and anti-virus technology. This paper mainly discusses hardware security technology and operating system security technology.
Hardware security technology refers to the interference of external strong electromagnetism on the computer, the electromagnetic influence on the external radiation when the computer is working, the response of the computer power supply to the voltage fluctuation of the power grid, the voltage and current adaptation range of the CPU and the motherboard, the hot plug protection when the serial port and the parallel port are connected, the insulation measures in the chassis, the response of the display screen to the surrounding electromagnetic interference, and the failure of the storage medium. At present, the hardware protection problem of this single machine is relatively simple in technology. Generally speaking, any enterprise that purchases, produces, manages and sells in strict accordance with IS9 1 standards can ensure that the above security problems are solved accordingly.
Operating system security technology refers to the common PC operating system security issues, including DOS and WINDOWS security issues. Because Win-DOWS system is well known to most people in daily life, here we take Win-Dows system as an example to analyze the security technology of operating system.
In terms of security technology, WINDOWS system adopts software encryption and virus prevention to ensure the security of the operating system. Software encryption consists of three parts: anti-tracking, fingerprint identification and encryption/decryption transformation of target program. The three parts cooperate with each other, and the purpose of anti-tracking is to protect fingerprint identification and decryption algorithms. Fingerprint identification determines the legitimacy of software, and encryption/decryption transformation is to avoid exposing the target program. The principle of virus prevention is that the file system of Windows depends on DOS, so the existing virus prevention software based on DOS is extended. This is an effective way to identify the windows executable file format (NE format). In the aspect of virus detection and removal, it is necessary to analyze the infection mode and feature identification of Win-Dows virus and expand the existing virus detection and antivirus software.
1.2.2 computer network security technology
Computer security, especially computer network security technology, has increasingly become a high-tech and industry that can seek higher economic benefits and has good market development prospects. Since the vulnerability of computer network was exposed and attacked, people have been studying the security technology of computer network in order to minimize the security vulnerabilities and risks within their power, so many security technologies and products have emerged.
(1) security kernel technology.
People began to consider security at the operating system level. Try to delete the part of the system kernel that may cause security problems from the kernel. Make the system more secure. For example, the so-laris operating system puts the static password in an implicit file, which makes the system more secure.
(2) Authentication technology of 2)Kerberos system.
Its security mechanism lies in first authenticating the requesting user and confirming whether it is a legitimate user. If it is a legitimate user, check whether the user has the right to access the service or host he requested. Kerberos system has been widely used in distributed computer environment, and its characteristics are: high security, high visibility and good scalability.
(3) Firewall technology.
A firewall is a component or a series of components used to restrict access between a protected network and the Internet or between other networks.
Firewall technology is a security technology that attracts much attention in computer networks at present. In the design and development of current firewall products, security kernel, proxy system, multi-level filtering, security server, authentication and encryption are the key points. Firewall technology is mainly composed of packet filtering, proxy server, SOCKS protocol, network anti-virus technology and so on, which can realize the functional effect of firewall.
2 its application in e-commerce
With the rapid development of network technology and information technology, e-commerce has been more and more widely used, but e-commerce is based on computer networks, and a large number of important identity information, accounting information and transaction information need to be transmitted online. In this case, the security of e-commerce is the key factor affecting its success or failure.
2. 1 meaning of e-commerce
E-commerce is to use computer technology, network technology and remote communication technology to realize the electronization, digitalization and networking of the whole business process. People are no longer face to face, looking at real goods and trading by paper documents, but trading through the internet, through the dazzling commodity information on the internet, perfect logistics distribution system, convenient and safe fund settlement system.
The whole transaction process can be divided into three stages: the first stage is the information exchange stage; The second stage is the stage of signing commodity contracts; The third stage is the stage of commodity handover and fund settlement according to the contract.
2.2 E-commerce security risks
2.2. 1 Intercept transmission information
Attackers can install receiving equipment through public telephone network, Internet or within the range of electromagnetic wave radiation. Interception of confidential information; Or by analyzing parameters such as information length, traffic, flow direction and communication frequency. Obtain useful information such as user account number and password.
2.2.2 Forged mail
Open a fake online shop. Sending emails to users, forging a large number of user emails, exhausting business resources and preventing legitimate users from accessing the network. The time-critical service can't get timely response.
2.2.3 Deny the existing transaction.
The publisher denies sending the message or content afterwards, and the receiver denies receiving the message or content afterwards; The buyer does not acknowledge that the order has been placed; The merchant refused to admit that he had sold defective products.
2.3 some computer security technologies in e-commerce transactions
In view of the above problems, identification technology, data encryption technology, digital signature technology and arson wall technology are widely used.
2.3. 1 identification technology
Carry out e-commerce through electronic network. The problem of identity recognition is also a problem that must be solved. On the one hand, only legal users can use network resources, so network resource management needs to identify the identity of users; On the other hand, under the traditional trading mode, both parties can negotiate face to face. It's easy to recognize each other. Transaction through electronic network. It is difficult to confirm each other's identity by ordinary electronic transmission of information without meeting each other. Therefore, the problem of identity recognition in e-commerce is particularly prominent.
2.3.2 Data encryption technology
Encryption technology is the main security measure in e-commerce. At present. Encryption technology is divided into two categories, namely symmetric encryption/symmetric key encryption/private key encryption and asymmetric encryption/public key encryption. At present, many institutions use the abbreviation of PKI, that is, public key system technology to build a complete encryption/signature system, which can solve the above problems more effectively and ensure the security of online transactions and information transmission in a real sense on the premise of making full use of the Internet to share resources.
2.3.3 Intelligent Firewall Technology
Technically, intelligent firewall uses intelligent methods such as statistics, memory, probability and decision-making to identify data and achieve the purpose of access control. The new method eliminates the calculation of sea position required for matching check, efficiently finds the eigenvalues of network behavior and directly controls access. The security of the new intelligent firewall itself has been greatly improved compared with the traditional firewall. Compared with the traditional firewall, it has made a qualitative leap in the aspects of authority minimization, system minimization, kernel security, security reinforcement, system optimization and network performance maximization.
;