【正文】
, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked. Encryption technology can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented. (B), authentication Commonly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology. (C), hacker protection technology Currently, hackers have bee the biggest emerce security threats, thus preventing hacking work security technology has bee the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, work monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective antihacker technologies, including firewalls, intrusion detection, and work security evaluation techniques. Ⅵ .the future security of emerce Increasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, emerce and improve the protection of the laws against cybercrime security system. (2) Establishment of relevant institutions, to take practical measures to bat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law. (3) Increase investment in work security technology。網絡商店和真實商店在部門結構和功能上沒有區(qū)別,不同點在于其實現這些功能和結構的方法以及商務運作的方式。因此網絡商店的信譽和服務質量實際上是電子商務成功與否的關鍵。網上交易的安全問題意味著: 有效性 :保證網上交易合同的有效性,防止系統(tǒng)故障、計算機病毒、黑客攻擊。 (3)身份識別 如果不進行身份識 別,第三方就有可能假冒交易一方的身份,以破壞交易、破壞被假冒一方的信譽或盜取被假冒一方的交易成果等,進行身份識別后,交易雙方就可防止相互猜疑的情況。 (一 )、加密技術 為保證數據和交易的安全、防止欺騙 ,確認交易雙方的真實身份,電子商務須采用加密技術,加密技術是指通過使用代碼或密碼來保障數據的安全性。 (三)、黑客防范技術 目前,黑客攻擊已成為電子商務安全所面臨的最大威脅,于是黑客防范技術也成為了網絡安全的主要內容,受到了各國政府和業(yè)界人士的高度重視。很多安全問題都存在技術的原因,所以更應該加大技術研究的資金,不斷推進舊技術的發(fā)展,并研究新的安全技術。這已經成為影響我國電子商務發(fā)展的一個障礙。 。 ( 6)加強對國民的網絡安全教育,注意對優(yōu)秀計算機人才的培養(yǎng)。 ( 3)加大對網絡安全技術的投入,提高網絡安全技術的水平。非對稱加密技術通常以 RSA算法為代表。作為一個安全的電子商務系統(tǒng),首先必須具有一個安全、可靠的通信網絡,以保證交易信息安全、迅速地傳遞;其次必須保證數據庫服務器絕對安全,防止黑客闖入網絡盜取信息。 (2)竄改 電子商務中表現為商業(yè)信息的真實性和完整性的問題。其中建立安全認證體系是關鍵。網絡交易通常是一種先交錢后拿貨的購物方式。然而,電子商務這種基于 Inter的開放式的數據交換是的其安全具有很大的脆弱性,安全問題是制約電子商務發(fā)展的一個核心和關鍵問題。 nonputer expert can not be a hacker. Have kicked Yahoo39。 Emerce Information Security Problems Ⅰ . Introduction Emerce (EBusiness) is in open works, including betwe