【正文】
s: digital signatures, digital certificates, digital time stamp, CA security authentication technology. (C), hacker protection technology Currently, hackers have bee the biggest emerce security threats, thus preventing hacking work security technology has bee the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, work monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective antihacker technologies, including firewalls, intrusion detection, and work security evaluation techniques. Ⅵ .the future security of emerce Increasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, emerce and improve the protection of the laws against cybercrime security system. (2) Establishment of relevant institutions, to take practical measures to bat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law. (3) Increase investment in work security technology。 nonputer expert can not be a hacker. Have kicked Yahoo39。 plete data encryption system and so on. Ⅳ .emerce security issues facing As emerce work is the puterbased, it inevitably faces a number of security issues. (1) Information leak Performance in emerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents。 using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key. Online trading and traditional face to face or written transactions in different ways, it is transmitted through the work business information and trade activities. The security of online transactions means: Validity: the validity of the contract to ensure online transactions, to prevent system failure, puter viruses, hacker attacks. Confidentiality: the content of the transaction, both transactions account, the password is not recognized by others and stealing. Integrity: to prevent the formation of unilateral transaction information and modify. Therefore, the emerce security system should include: secure and reliable munications work to ensure reliable data transmission integrity, prevent viruses, hackers。 Third, enterprises should also be responsible for product aftersales service, This service may be through works, may not. Inter transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the hands reach into their own hands, what it is. Therefore, t