1、 E-commerce Information Security Problems . Introduction E-commerce (E-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of
2、characteristics and benefits. However, e-commerce open this Internet-based data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues. In this paper, the basic ideas and principles of systems engineering, analyzes the current security th
3、reats facing e-commerce, in this based on security technology from the perspective of development trend of e-commerce. . E-commerce model Modern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinct
4、ion between structure and function, differences in their function and structure to achieve these methods and the way business operate. Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishmen
5、t of this virtual store, so customers can, as in a real supermarket pushing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency an
6、d transaction must store customers and stores are safe and reliable. Behind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be r
7、esponsible for product after-sales service, This service may be through networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that
8、 the goods can not be confirmed until the hands reach into their own hands, what it is. Therefore, the credibility of the store network and service quality is actually the key to the success of e-commerce. .the key to development of electronic commerce E-commerce in the telecommunications network to
9、 develop. Therefore, the advanced computer network infrastructure and telecommunications policy easing the development of electronic commerce has become a prerequisite. Currently, telecom services, high prices, limited bandwidth, the service is not timely or not reliable and so the development of e-
10、commerce has become a constraint. Speed up the construction of telecommunications infrastructure, to break the telecommunications market monopoly, introduce competition mechanism to ensure fair competition in the telecommunications business, to promote networking, ensure to provide users with low-co
11、st, high-speed, reliable communications services is a good construction target network environment, but also all of the world common task. E-commerce the most prominent problem is to solve the on-line shopping, trading and clearing of security issues, including the establishment of e-commerce trust
12、between all the main issues, namely the establishment of safety certification system (CA) issues; choose safety standards (such as SET , SSL, PKI, etc.) problems; using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key
13、. Online trading and traditional face to face or written transactions in different ways, it is transmitted through the network business information and trade activities. The security of online transactions means: Validity: the validity of the contract to ensure online transactions, to prevent system
14、 failure, computer viruses, hacker attacks. Confidentiality: the content of the transaction, both transactions account, the password is not recognized by others and stealing. Integrity: to prevent the formation of unilateral transaction information and modify. Therefore, the e-commerce security syst
15、em should include: secure and reliable communications network to ensure reliable data transmission integrity, prevent viruses, hackers; electronic signatures and other authentication systems; complete data encryption system and so on. .e-commerce security issues facing As e-commerce network is the c
16、omputer-based, it inevitably faces a number of security issues. (1) Information leak Performance in e-commerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents; transaction to the other party to provide documents
17、used illegal use by third parties. (2) Altered E-commerce information for business performance in the authenticity and integrity issues. Electronic transaction information in the network transmission process may be others to illegally modify, delete or re-changed, so that information about its authe
18、nticity and integrity. (3) Identification Without identification, third-party transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction bet
19、ween the two sides can prevent suspicion situation. (4) Computer viruses Computer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Internet for the spread of the virus has provided the best medium. Many new viruses directly using the network a
20、s its transmission, as well as many viruses spread faster through dried networks, frequently causing billions of dollars in economic losses. (5) Hacker With the spread of a variety of application tools, hackers have been popular, and are not in the past; non-computer expert can not be a hacker. Have
21、 kicked Yahoos mafia boy did not receive any special training, only a few attacks to the users to download software and learn how to use the Internet on a big dry. .e-commerce security and safety factors Enterprise application security is the most worried about e-commerce, and how to protect the sec
22、urity of e-commerce activities, will remain the core of e-commerce research. As a secure e-commerce system, we must first have a safe, reliable communication network, to ensure that transaction information secure and rapid transmission; second database server to ensure absolute security against hack
23、ers break into networks to steal information. E-commerce security technologies include encryption, authentication technology and e-commerce security protocols, firewall technology. (A), encryption technology To ensure the security of data and transactions to prevent fraud, to confirm the true identi
24、ty of transaction parties, e-commerce to adopt encryption technology, encryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption