E commerce security imminentPosted by: admin | Posted on: February 28, 2017
is currently the global average every 20 seconds a Intemet computer invasion event, Internet firewall on the network over 1/3 was broken, some large sites, famous banks, enterprises and institutions are not spared. Foreign survey report pointed out that nearly 80% of the charge of information, information security officials and other senior technical management personnel to report their business has suffered a loss because of the leak, of which more than 25% of the enterprises are affected by the loss of more than $250 thousand. As for the loss of infected virus is countless. Thus, the problem of network security has come to the point that can not be ignored. The risk of hackers and virus makers not only in their own system of unbridled attacks, intrusion and destruction as well as a variety of information theft, tampering, more dangerous is that they also spread all kinds of attacks to steal information technology, with teaching experience, and actively provide a variety of software hackers, wantonly prepare all kinds of virus software, a the world is not random, dogged manner, the problem of network security complex. Since the beginning of the Internet design, the main consideration is the interconnection and information sharing between different computer systems and network platforms, without considering how to ensure system security and information security. So, in Inter-ne. To carry out e-commerce, we must first solve the problem of security. E-commerce security
all the problems are mostly due to hackers and virus manufacturers, mainly in the two aspects of system security and information security.
1 system security issues
system security problems mainly in the system being destroyed, leaching, infected viruses, which most people are impossible to guard against hacker attacks. The following example shows that hackers rampant. In 1996, a hacker into the United States Air Force website, the U.S. Air Force "into a picture of the eye and in the bloodshed, which said:" welcome to the truth, you can understand all the government corruption scandals here, they don’t want to know what you know ". In 1998, a hacker broke into the India nuclear experimental control center, which had just carried out a nuclear test, and controlled its computer system". According to reports, two Jiangsu hackers have invaded the bank computer system theft of $260 thousand.
2 information security issues
information security is the core issue in the open network environment, the network of electronic transactions, mainly for the information is eavesdropping, tampering, denial, loss, forgery, reproduction, asymmetry, etc.. The most common way to steal information, and information theft is usually achieved by capturing passwords
forged login interface (Shell scripts) attack method. Start an executable program in the attack on the host, display a fake login interface, when the user interface on the key people in this fake login information (username, password), the program will send the information to user input > main attacker