Current location - Quotes Website - Signature design - What are the security problems in the introduction of e-commerce in secondary vocational schools?
What are the security problems in the introduction of e-commerce in secondary vocational schools?
There are security problems in e-commerce.

(A) network information security

The security problem of 1. server. E-commerce server is the core of e-commerce, which has installed a large number of software and business information related to e-commerce. The database on the server contains some confidential data in the process of e-commerce activities. Therefore, servers are particularly vulnerable to security threats, and once security problems occur, the consequences are also very serious.

2. Network information security. Illegal users use improper methods in network transmission, illegally intercepting session data to obtain valid information of legal users, which eventually leads to the disclosure of some core business data of legal users, or the illegal users maliciously tamper with the intercepted network data, such as adding or deleting, which makes the information lose authenticity and integrity, leading to the legal users unable to conduct normal transactions, and some illegal users use the intercepted network data packets to send them again, maliciously attacking the other party's network software and hardware.

3. Virus problem in network security. The emergence of the Internet provides the best medium for the spread of computer viruses. Many new viruses directly use the Internet as their own route of transmission. Since the emergence of computer virus 10, various new viruses and their variants have increased rapidly. Many new viruses directly use the Internet as their own route of transmission, and many viruses spread faster with the help of the Internet. How to effectively prevent viruses in the field of e-commerce is also a very urgent problem.

(b) Electronic commerce transactions

1. Uncertainty of transaction identity. E-commerce is a wide range of business activities all over the world. In the open network environment, based on the browser/server application mode, all kinds of business activities are carried out without the buyers and sellers meeting, so as to realize online shopping of consumers, online transactions between merchants and online electronic payment, as well as various business activities, trading activities, financial activities and related comprehensive service activities. Based on this feature, attackers can steal the identity information of legitimate users through illegal means and trade with others by pretending to be legitimate users.

2. The security of the transaction agreement. The data of enterprises and users in the process of electronic transactions are transmitted in the form of data packets. It is easy for malicious attackers to intercept a data packet on e-commerce websites, or even modify and impersonate the data packet. TCP/IP protocol is established in a trusted environment and lacks corresponding security mechanism. This address-based protocol itself will reveal passwords, regardless of security issues. TCP/IP protocol is completely open, its remote access function enables many attackers to succeed without going to the scene, and the connected hosts are based on the principle of mutual trust, which makes the network more insecure.

Second, e-commerce information security countermeasures

(A) digital encryption technology

1. Digital signature. Digital signature is a combination of digital digest and public key algorithm. The original message can be authenticated by digital signature. Digital signature has two functions. First, it is difficult to deny your signature, thus confirming the fact that the document has been signed. Second, the signature is not easy to forge, thus confirming the authenticity of the document.

2. Digital coupons. Digital voucher is an electronic way to prove the user's identity and access to network resources. Digital certificates are very important for building trust between two parties who conduct online transactions. There are three types of digital vouchers: personal vouchers, enterprise (server) vouchers and software (developer) vouchers. Most certification centers provide the first two kinds of certificates.

3. Digital time stamp. Time is very important information in trading behavior. In electronic transactions, it is necessary to take security measures for the date and time information of transaction documents, and Digital Time Stamp Service (DTS) can provide security protection for the release time of electronic documents.

(B) Network security technology

1. firewall technology. The existing firewall technology includes two categories: packet filtering and proxy service technology. The simplest and most commonly used one is the packet filtering firewall, which checks the header of each received packet to determine whether the packet is sent to the destination. Because the firewall can selectively filter the incoming and outgoing data, it can effectively avoid intentional or unintentional attacks on it, thus ensuring the security of private private networks. Combining packet filtering firewall with proxy server is a very effective strategy to solve network security problems.

2. Virtual private network technology. The realization process of VPN uses security tunnel technology, information encryption technology, user authentication technology, access control technology and so on. VPN has the advantages of small investment, easy management and strong adaptability. VPN can help remote users, company branches, business partners and suppliers to establish a reliable and secure connection with the company intranet and ensure the safe transmission of data, thus achieving the purpose of completing electronic transactions on the public Internet or between company LANs.

(3) Antivirus measures

1. Virus prevention technology. Virus prevention technology monitors and judges whether there is a virus in the system by giving priority to the system memory where it resides, so as to prevent computer viruses from entering the computer system and destroying it.

2. Virus detection technology. Virus detection technology is a technology to determine the virus type by judging the characteristics of computer viruses.

3. Anti-virus technology. Anti-virus technology develops software with the functions of deleting virus programs and restoring original files by analyzing computer virus codes. The specific implementation method of anti-virus technology includes frequent scanning and monitoring of files and emails in servers and workstations in the network. Once the virus code matching the virus code base is found, the anti-virus program will take corresponding measures to prevent the virus from entering the network and spreading.

Source:/lxwm/0117250413.html.