2022英文代写essay范文:关于电子技术安全性相关问题分析
E-commercereferstothegovernment,enterprisesandindividualsusingmoderncomputerandnetworktechnologytoachievethewholeprocessofbusinessexchangeandadministrativemanagement;ItisakindofbasedontheInternet,inordertotradebothpartiesasthemainbody,bymeansofbankelectronicpaymentandsettlement,thenewbusinessmodelbasedoncustomerdata.Essenceistobuildasocietyof"networkcomputingenvironment"or"digitalnervesystem",inordertorealizetheinformationresourcesinthenationaleconomyandthecomprehensiveapplicationofpubliclife.电子商务是指政府、企业和个人利用现代电子计算机与网络技术实现商业交换和行政管理的全过程;它是一种基于互联网,以交易双方为主体,以银行电子支付和结算为手段,以客户数据为依托的全新商务模式。本质是建立一种全社会的“网络计算环境”或“数字化神经系统”,以实现信息资源在国民经济和大众生活中的全方位应用。One,fromasecuritypointofview,thecurrentsituationoftheelectroniccommerce1.Thenetworkinformationsecurityintheworldhashttp://www.ukassignment.org/essayfwnotformedacompletesystem,ourcountryisnoexception.网络信息安全在全球还没有形成一个完整的体系,我国也不例外。2.Theintensityofthesecuritytechnologyisgenerallynotenough.Abroadone-commercesecuritytechnology,althoughitsstructureorencryptiontechnologyisgood,butislimitedbytheforeignpasswordpolicy,sothestrengthofthecommonenough.安全技术的强度普遍不够。国外有关电子商务的安全技术,虽然其结构或加密技术等都不错,但受到了外国密码政策的限制,因此强度普遍不够。3.Thee-commercesite,thereisabighiddendangerofsafetymanagement,generallydifficulttowithstandthehacker'sattack.4.Theelectroniccommercejustconfinedtothefieldofbusinessinformationandreale-commerceinto,theexistenceofthesefactorswillinfluencethedevelopmentofelectroniccommerceinourcountryfurther.Second,theelectroniccommercesecurityrequirementFromtheperspectiveofthedifferentcharacteristicsoftraditionalbusinessandelectroniccommerce,tomeetthesecurityrequirementsofe-commerce,theremustbeatleastthefollowingquestionsneedtobeaddressed:1.Theproblemofidentityauthenticationbeforetrading.E-commerceisbasedonInternetplatformofthevirtualspaceofbusinessactivities,tradebothsidesonlythroughdata,symbols,signals,judgment,choice,specificbusinesspracticesalsorelyonelectricalsignalsanddataexchange,tradingpartiescannolongerusetraditionalmethodstoprotectthesecurityoftransactionsine-commerce.2.Thelegaleffectofelectroniccontractissuesintradingandintegrityconfidentialityissues.3.Theproblemoftheprobativevalueoftheelectronicrecordsaftertrading.IntheAnglo-Americanlawsystem,hearsayevidenceruleslimitingtheprobativevalueofelectronicrecords.Inourcountry,toelectronicrecordstheprobativevalueofprocedurelawdidnotmakecleararegulation,oreventobesingledoutasanevidence.3,thenetworksecuritytechnologyandsolutionComputernetworksecurityischaracterizedbyaimingatthesecurityproblemofcomputernetworkitselfmaybe,toenhanceimplementationofnetworksecurity,toensurethesecurityofcomputernetworkitselfasthegoal.Theproblemsareasfollows:1.Notsecurityrelatedtooperatingsystemconfiguration.Nomatteradoptwhatoperatingsystem,undertheconditionofdefaultinstallationwillexistsomesafetyproblems,onlyforoperatingsystemsecurityrelatedandstrictsecurityconfiguration,canachieveacertaindegreeofsecurity.Don'tthinkthedefaultoperatingsystemafterinstallation,coupledwithastrongpasswordsystemtobeclassifiedassafe.2.TheCGIprogramcodeauditing.IfgmCGI,preventionofitalittleeasier,butforthewebsiteorsoftwarevendorsdevelopsomeoftheCGIprogram,alotofCGIexistseriousproblem,forane-commercesite,therewillbeamaliciousattackerandusingaccountsforonlineshoppingandotherseriousconsequences.3.TheDenialofServiceattacks(DoS,"oftheService).Withtheriseofe-commerce,real-timerequirementsofthewebsiteismoreandmorehigh,DoSorDDoSthreattositebiggerandbigger.Aimedatnetworkparalysisattackeffectthananytraditionalwayofterrorismandwararemoreintense,moredestructive,harmoffasterandrangearemorewide,andtheriskoftheattackersitselfisverysmall,evenbeforetheattackshadvanishedintothinair,maketheothersidedidnotexecutethepossibilityofretaliation.4.Securityproductsuseundeserved.Althoughmanysitesadoptedsomenetworksecuritydevices,butduetothesecurityproductitselfproblemoruse,theseproductsdonotplayaproperrole.Manysecurityvendorproducttechnicalbackgroundforconfigurationpersonnelrequirementsarehigh,beyondthetechnicalrequirementsofcommonnetworkmanagementpersonnel,eventhefactoryintheoriginaltotheusertodothecorrectinstallation,configuration,butoncethesystemmodification,needtochangeSettingsrelatedsecurityproducts,itiseasytocreatemanysecurityproblems.5.Thelackofstrictnetworksecuritymanagementsystem.Networksecurityisthemostimportantthingistoattachesgreatimportancetotheideological,websiteorwithintheLANsecurityneedsacompletesecuritysystemtoprotect.Establishandimplementstrictsystemandcomputernetworksecuritystrategyisthefoundationoftherealnetworksecurity.AnalysisofcomputernetworksecurityproblemsIputforwardthesolutionoftheideasare:1.Toimprovethesecurityofthehostitself,makesecurityconfiguration,installsecuritypatchesintime,reducevulnerability.2.Touseavarietyofsystemvulnerabilitiesdetectionsoftwareofnetworksystemonaregularbasisforscanninganalysis,findoutthepossiblesafetyhazards,andinatimelymannertorepairit.#p#分页标题#e#(3)fromtheroutertouseraccesscontrolmeasuresatalllevelstoestablishandimprove,toinstallafirewall,inordertostrengthenthemanagementofauthorizationandauthentication.4.UseRAID5strengthendatastoragetechnologiessuchasdatabackupandrecoverymeasures.5.Thesensitiveequipmentanddatatoestablishthenecessaryphysicalorlogicalisolationmeasures.6.Thetransmissionofsensitiveinformationonthepublicnetworkfordataencryptionstrength.7.Establishthedetailsofthesecurityauditlog,inordertodetectandtrackintrusionattack,etc.Four,e-commercetransactionsecurityproblemandsolutionIngeneralbusinessexiststhefollowingsecurityhiddentroubleinsecurity1.Tostealinformation.Duetonotusingencryption,thedatainformationtransmittedincleartextontheInternet,anintruderonthepacketsthroughthegatewayorroutercantransmitinformationintercepted.Bystealingandanalysisformanytimes,youcanfindtherulesandformatofinformation,transmissionofinformationisobtained,thecontentoftheonlinetransmissionofinformationdisclosure.2.Thetamperwiththeinformation.Whentheinvadersgottheinformation