英语论文
原创论文
留学生作业
英语论文格式
免费论文
essay
英国硕士论文
英国毕业论文
英语论文
留学生论文
澳大利亚论文
新西兰论文
澳洲Report
澳洲留学生论文
美国留学论文
Dissertation
美国硕博论文
essay case
Eassy
Term paper
英语毕业论文
英文论文
课程作业
德语论文
德语专业论文
德语本科论文
德国留学论文
Assignment
日语论文
韩语论文
法语论文
俄语论文

电子商务中的信息安全问题

时间:2022-08-27 来源:未知 编辑:梦想论文 阅读:
With the rapid development of Internet and information technology, e-commerce has become an important factor affecting people's work and life. It not only improves people's work efficiency but also greatly facilitates people's life. The emergence of e-commerce not only brings a broader development prospect to the development of the Internet, but also provides a new direction for global product sales. However, it should be recognized that e-commerce also has obvious defects. E-commerce is based on the network, and all the information in the transaction process needs to be transmitted through the network. Therefore, if the information security problem is not solved, there will be great hidden dangers in e-commerce. This paper mainly introduces the basic meaning of e-commerce, information security factors and countermeasures.
 
(1) basic overview of e-commerce
 
In English, electronic business is often used to express e-commerce, which shows the mode, direction and characteristics of e-commerce. The United Nations international trade has given a definition of e-commerce, that is, e-commerce is a network-based business activity, such as using web technology and e-mail to enable suppliers and customers to share unstructured or structured business information, and then complete transactions in business activities and consumption activities.
 
1.1 rise and development of e-commerce
 
(1) The rise of e-commerce
 
E-commerce is a new type of transaction activity formed under the development of electronic data processing technology. With the development of Internet technology, electronic data can be transferred from magnetic tape and floppy disk to the network to improve the speed of transaction and increase the scope and frequency of transaction. Banks can use electronic funds transfer technology to complete transactions with enterprises and institutions, which is the predecessor of e-commerce. After that, with the support of electronic funds transfer, network communication and other technologies, e-commerce began to develop and became an important tool that affected people's lives.
 
(2) Development of e-commerce
 
E-commerce is a transaction based on computer technology and network technology. It is a development process from traditional commerce to e-commerce. According to the development characteristics of e-commerce, it can be divided into the following stages: first, the primary stage of e-commerce. E-commerce in the primary stage is the integration of e-mail information transmission mode and web technology under the premise of traditional commerce. It is characterized by traditional commerce and e-commerce. At this time, the advantages of e-commerce have not been truly reflected. Second, the practical stage of e-commerce. At this stage, the overall framework of e-commerce has emerged. With the help of network technology, the electronic technology problems in e-commerce operation have been preliminarily overcome. At this time, the form of e-commerce dominated and tradition supplemented was formed. However, some traditional businesses could not be replaced by e-commerce for the time being. That is to say, at this stage, although e-commerce still has some characteristics of traditional commerce, it has begun to give play to its advantages in the transaction process, and those enterprises using e-commerce have begun to gain advantages that their peers do not have. Third, the mature stage of e-commerce. With the research and development, e-commerce has begun to mature, and a mature supply chain system has been formed among enterprises, suppliers and customers, which is the external advantage of the enterprise. Within the enterprise, the improvement of communication frequency and quality between the headquarters and subsidiaries will help improve the internal management level and enhance the core competitiveness of the enterprise. At this time, e-commerce has become an important factor affecting the operation and development of most enterprises, and the development of enterprises has entered a new stage.
 
1.2 connotation of e-commerce
 
From the above analysis, it can be seen that e-commerce mainly includes three characteristics: first, information technology is the premise of the emergence and development of e-commerce. The optimization of information technology has steadily improved the development level of e-commerce, so information technology is the core of e-commerce; Second, systematization is the basis of e-commerce activities. The development of E-commerce makes suppliers, operators and customers form a system, creating a favorable external environment for e-commerce activities.
 
(2) e-commerce information security factors, hidden dangers and main prevention technologies
 
2.1 e-commerce information security factors
 
In traditional transactions, the buyer and the seller can directly communicate face-to-face, so it can ensure a good security and trust relationship in the transaction process. However, in the process of e-commerce transactions, the buyer and the seller can only contact through the network, and the network on which e-commerce relies is virtual, dynamic and open, which will make e-commerce face more security risks. The following analyzes the security factors of e-commerce from several aspects.
 
(1) Information effectiveness and security
 
E-commerce transmits transaction information in the form of network, so the authenticity and effectiveness of trade all depend on the electronic network. E-commerce is a new type of trade mode. The authenticity of information not only affects the interests of the buyer and the seller, but also affects the business environment of e-commerce, and has a certain impact on the interests of customers, enterprises and countries.
 
(2) Confidentiality of information
 
E-commerce completes transactions through the network, so the buyer and the seller can break through the restrictions of time and region, and the transaction activities become more frequent without the restrictions of these factors. However, if there is an accident or intentional fraud in data input, it is easy to cause the information difference between the buyer and the seller and cause losses to both parties. In addition, information loss, repeated transmission and transmission error may occur during information transmission, which may also lead to different degrees of loss. Therefore, it is necessary to ensure the information security and reserve in the e-commerce system to ensure the orderly conduct of trade activities.
 
(3) Information reliability and undeniability
 
The reliability of e-commerce information refers to ensuring that users can use information and resources reasonably and that improper operations are rejected in time; Non repudiation means that e-commerce can establish an effective liability system with the support of information technology to prevent illegal acts of both parties. Although the buyer and the seller do not need face-to-face communication in the process of e-commerce transactions, these advantages of information technology can ensure the validity of contracts and documents and play a role in avoiding risks.

2.2 security risks of e-commerce information
 
(1) Hidden dangers of e-commerce information storage
 
Information reserve security refers to the threat faced by the transaction information of the buyer and the seller in the static storage state, mainly including internal and external aspects:
 
Internal security risks refer to enterprises deleting and modifying e-commerce information without authorization. External security risks refer to the deletion and modification of e-commerce information by external personnel through illegal means. The sources of potential risks include malicious invasion by competitors and harassment by hackers.
 
(2) Hidden dangers of e-commerce information transmission
 
The hidden danger of information transmission security refers to the hidden danger of logistics, funds and other related information flows during the dynamic transmission of e-commerce, mainly including network fraud, stealing of business secrets by competitors, false sending of information or wrong sending of information.
 
(3) Hidden dangers of information security of both parties in e-commerce transactions
 
The traditional business activities are face-to-face communication between the buyer and the seller, which makes it easier for both parties to obtain a sense of trust and security. However, in the process of e-commerce communication, the buyer and the seller can only grasp the flow of information, funds and other factors through the Internet, which leads to mistrust between the two sides. It mainly includes the following aspects:
 
① The seller's information security threat. Illegal elements impersonate legal users to tamper with the content of business information, affect normal trading activities, and damage the reputation of the seller and the interests of the buyer; Information espionage invades the network to obtain business information and steal business secrets; Malicious competitors impersonate buyers or attack servers to generate a large number of false orders to occupy system resources, and the seller mistakenly believes that after receiving a large number of orders, it will quickly prepare goods, causing goods hoarding and affecting capital flow.
 
② Information threats faced by the buyer. The main information threats faced by the Buyer include: the buyer's information is intercepted and embezzled, for example, the illegal elements embezzle the customer's information so that the customer cannot pay; Internal employees of the enterprise sell users' personal information to other operators, resulting in users receiving too much information; The seller is attacked by hackers, resulting in the loss of buyer information.
 
2.3 main security technologies of e-commerce
 
The information security of e-commerce is affected by security technology. The common security technologies are introduced below.
 
(1) Encryption technology
 
Encryption technology refers to changing plaintext data into specific ciphertext data according to a specific password to prevent information leakage. The plaintext can be converted into ciphertext by encryption algorithm, and then converted into plaintext data when necessary. Key encryption technology can be divided into symmetric key and asymmetric key. The encryption methods and degrees of the two technologies are different. For example, symmetric key technology is characterized by small amount of computation and fast encryption speed, but key management is difficult, and information security will be affected if key leakage occurs. The core of asymmetric key encryption algorithm is one-way trapdoor function encryption with high encryption degree. In addition, link encryption technology and node encryption technology should be included, and specific encryption methods can be selected according to actual conditions.
 
(2) Firewall technology
 
Firewall technology is one of the most important security technologies in recent years. It can effectively strengthen the access between networks, prevent illegal elements from invading the internal network by illegal means, and thus ensure information security. Firewall technology has many advantages, such as filtering unsafe services and reducing the risk of hosts in the subnet; Information leakage caused by organizing attackers to attack the network system; Record and count the times of network use and the ways of being attacked, and predict the methods to avoid attacks in advance; Centralized management according to the internal network of the enterprise; Formulate network security policies, etc.
 
(3) countermeasures for strengthening e-commerce information security
 
3.1 the government shall strengthen the planning and guidance for the development of e-commerce
 
In the process of e-commerce development, the government must play a correct guiding role. For example, the government clarifies the role of each unit in the development of e-commerce, formulates the development plan of e-commerce, and then coordinates, organizes and guides the development of e-commerce. In addition, the government should also strengthen the supervision of e-commerce operation to avoid illegal events.
 
3.2 strengthen research on safety technology and formulation of business standards
 
To promote the better development of e-commerce, we must solve the security and reliability of information technology. Because of the time lag of the computer itself, virus infection and hacker attacks will affect the security of the computer, especially the business activities of e-commerce. Relevant departments should organize security technology research teams to focus on password technology and firewall technology to provide guarantee for the development of e-commerce. At the same time, we should always pay attention to the development level and problems of e-commerce, constantly optimize e-commerce technology, and create an environment for the development of e-commerce.
 
3.3 strengthen network infrastructure construction
 
E-commerce is a business activity based on information technology and network, so corresponding infrastructure construction must be done well, such as the development of information technology and the research and development of information transmission equipment. However, due to economic and technological constraints, China's network infrastructure construction is lagging behind. The quality of the completed network is low, and the user's use cost is high, which hinders the development of e-commerce. Therefore, how to improve the construction of infrastructure and change the lack of network communication development becomes the key. The state should support relevant enterprises to focus on infrastructure research and create favorable conditions for the development of e-commerce.
 
(4) conclusion
 
The information problem of e-commerce is the key factor affecting its development. Therefore, to develop e-commerce, we must solve the information security problem of e-commerce. However, such problems are not static, but constantly appear in the development of e-commerce. Although the e-commerce information security problem has been solved to a certain extent under the guidance of the government and the efforts of relevant enterprises, a reliable e-commerce security system has not yet been formed. It is still necessary to vigorously develop information security technology and optimize the e-commerce business environment.

2.2 security risks of e-commerce information
 
(1) Hidden dangers of e-commerce information storage
 
Information reserve security refers to the threat faced by the transaction information of the buyer and the seller in the static storage state, mainly including internal and external aspects:
 
Internal security risks refer to enterprises deleting and modifying e-commerce information without authorization. External security risks refer to the deletion and modification of e-commerce information by external personnel through illegal means. The sources of potential risks include malicious invasion by competitors and harassment by hackers.
 
(2) Hidden dangers of e-commerce information transmission
 
The hidden danger of information transmission security refers to the hidden danger of logistics, funds and other related information flows during the dynamic transmission of e-commerce, mainly including network fraud, stealing of business secrets by competitors, false sending of information or wrong sending of information.
 
(3) Hidden dangers of information security of both parties in e-commerce transactions
 
The traditional business activities are face-to-face communication between the buyer and the seller, which makes it easier for both parties to obtain a sense of trust and security. However, in the process of e-commerce communication, the buyer and the seller can only grasp the flow of information, funds and other factors through the Internet, which leads to mistrust between the two sides. It mainly includes the following aspects:
 
① The seller's information security threat. Illegal elements impersonate legal users to tamper with the content of business information, affect normal trading activities, and damage the reputation of the seller and the interests of the buyer; Information espionage invades the network to obtain business information and steal business secrets; Malicious competitors impersonate buyers or attack servers to generate a large number of false orders to occupy system resources, and the seller mistakenly believes that after receiving a large number of orders, it will quickly prepare goods, causing goods hoarding and affecting capital flow.
 
② Information threats faced by the buyer. The main information threats faced by the Buyer include: the buyer's information is intercepted and embezzled, for example, the illegal elements embezzle the customer's information so that the customer cannot pay; Internal employees of the enterprise sell users' personal information to other operators, resulting in users receiving too much information; The seller is attacked by hackers, resulting in the loss of buyer information.
 
2.3 main security technologies of e-commerce
 
The information security of e-commerce is affected by security technology. The common security technologies are introduced below.
 
(1) Encryption technology
 
Encryption technology refers to changing plaintext data into specific ciphertext data according to a specific password to prevent information leakage. The plaintext can be converted into ciphertext by encryption algorithm, and then converted into plaintext data when necessary. Key encryption technology can be divided into symmetric key and asymmetric key. The encryption methods and degrees of the two technologies are different. For example, symmetric key technology is characterized by small amount of computation and fast encryption speed, but key management is difficult, and information security will be affected if key leakage occurs. The core of asymmetric key encryption algorithm is one-way trapdoor function encryption with high encryption degree. In addition, link encryption technology and node encryption technology should be included, and specific encryption methods can be selected according to actual conditions.
 
(2) Firewall technology
 
Firewall technology is one of the most important security technologies in recent years. It can effectively strengthen the access between networks, prevent illegal elements from invading the internal network by illegal means, and thus ensure information security. Firewall technology has many advantages, such as filtering unsafe services and reducing the risk of hosts in the subnet; Information leakage caused by organizing attackers to attack the network system; Record and count the times of network use and the ways of being attacked, and predict the methods to avoid attacks in advance; Centralized management according to the internal network of the enterprise; Formulate network security policies, etc.
 
(3) countermeasures for strengthening e-commerce information security
 
3.1 the government shall strengthen the planning and guidance for the development of e-commerce
 
In the process of e-commerce development, the government must play a correct guiding role. For example, the government clarifies the role of each unit in the development of e-commerce, formulates the development plan of e-commerce, and then coordinates, organizes and guides the development of e-commerce. In addition, the government should also strengthen the supervision of e-commerce operation to avoid illegal events.
 
3.2 strengthen research on safety technology and formulation of business standards
 
To promote the better development of e-commerce, we must solve the security and reliability of information technology. Because of the time lag of the computer itself, virus infection and hacker attacks will affect the security of the computer, especially the business activities of e-commerce. Relevant departments should organize security technology research teams to focus on password technology and firewall technology to provide guarantee for the development of e-commerce. At the same time, we should always pay attention to the development level and problems of e-commerce, constantly optimize e-commerce technology, and create an environment for the development of e-commerce.
 
3.3 strengthen network infrastructure construction
 
E-commerce is a business activity based on information technology and network, so corresponding infrastructure construction must be done well, such as the development of information technology and the research and development of information transmission equipment. However, due to economic and technological constraints, China's network infrastructure construction is lagging behind. The quality of the completed network is low, and the user's use cost is high, which hinders the development of e-commerce. Therefore, how to improve the construction of infrastructure and change the lack of network communication development becomes the key. The state should support relevant enterprises to focus on infrastructure research and create favorable conditions for the development of e-commerce.
 
(4) conclusion
 
The information problem of e-commerce is the key factor affecting its development. Therefore, to develop e-commerce, we must solve the information security problem of e-commerce. However, such problems are not static, but constantly appear in the development of e-commerce. Although the e-commerce information security problem has been solved to a certain extent under the guidance of the government and the efforts of relevant enterprises, a reliable e-commerce security system has not yet been formed. It is still necessary to vigorously develop information security technology and optimize the e-commerce business environment.

分享到:
------分隔线----------------------------
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
最新评论
随机推荐英语论文格式