The application of computer network in e-commerce Abstract: With the rapid development of computer network technology, the application of e-commerce is more and more extensive. Since most transactions in e-commerce are completed online, the security of e-commerce is a key factor affecting the success or failure of both parties. This paper introduces the method of solving security problems by using network security technology from the perspective of computer network security and business transaction security of e-commerce system. Keywords: computer network, e-commerce security technology 1. Introduction In recent years, e-commerce has developed very rapidly. E-commerce can reduce costs, increase trade opportunities, simplify trade flow, improve productivity and improve logistics, cash flow and commodity flow. Environment and system of information flow Although e-commerce is developing strongly, the proportion of its trade volume to the total trade volume is still very low. The primary factor affecting its development is safety. Online transactions are non-face-to-face transactions, so "transaction security" is very important in the development of e-commerce. It can be said that there is no e-commerce without security. The security of e-commerce can be divided into two parts as a whole: computer network security and business transaction security. Computer network security includes computer network equipment security, computer network system security, database security and so on. Its characteristic is to implement a network security enhancement scheme for the possible security problems of the computer network itself, with the goal of ensuring the security of the computer network itself. Business security closely revolves around various security problems arising from the application of traditional business on the Internet. On the basis of computer network security, how to ensure the smooth progress of e-commerce process. That is, to realize the confidentiality, integrity, identifiability, unforgeability and unreliability of e-commerce. Second, the security risk of e-commerce network 1 stealing information: because no encryption measures are taken, data information is transmitted in clear text on the network, and intruders can intercept the transmitted information on the gateway or router where the data packet passes. Through repeated stealing and analysis, the laws and formats of information are found, and then the content of transmitted information is obtained, which leads to the leakage of information transmitted on the network. 2. Tampering with information: After mastering the format and rules of information, intruders will modify the information data transmitted on the network through various technical means and methods, and then send it to the destination. This method is not new. This work can be done on the router or gateway. 3 Forgery Because the data format is mastered, the transmitted information can be tampered with, and attackers can impersonate legitimate users to send false information or take the initiative to obtain information, which is usually difficult for remote users to distinguish. Malicious destruction: Because the attacker can access the network, he may modify the information in the network, master the confidential information on the network, and even sneak into the network. The consequences are very serious. Third, the network security technology applied in e-commerce transactions In order to improve the security of e-commerce, a variety of network security technologies and protocols can be adopted. These technologies and protocols have their own scope of use, which can provide different degrees of security for e-commerce transactions. 1. firewall technology. Firewall is the main network security equipment at present. The common security control methods of firewall mainly include packet filtering, state detection and proxy service. Because it undertakes the boundary and service of the network, it is difficult to effectively control the illegal access inside. Therefore, the isolation technology that is most suitable for a relatively independent single network (such as a common enterprise private network) with limited interconnection with external networks and relatively concentrated network services determines its important role in e-commerce security transactions. At present, firewall products are mainly divided into two categories: proxy-based services and state-based detection. For example, CheckPoim Filewali- 140 is a software firewall based on Unix and WinNT platforms. Cisco PIX is a state-checking hardware firewall, and it is also a state-checking firewall. Because of the use of special operating system, the possibility of hackers using operating system G) H is reduced. Raptor is a software firewall based on proxy technology. Due to the openness and complexity of the Internet, firewalls also have their inherent shortcomings (1). Without a firewall, a firewall cannot prevent attacks. For example, if you allow unlimited dialing from inside the protected network, some users can form a direct connection with the Internet, thus bypassing the firewall and creating a potential backdoor attack channel, so the uniqueness of the channel between the internal network and the external network should be guaranteed. (2) Firewalls cannot prevent the spread of infected software or files. In this way, only anti-virus real-time monitoring software can be installed on each host. (3) Firewalls cannot prevent data-driven attacks. Data-driven attacks occur when some seemingly harmless data is mailed or copied to the Internet (which is executed by the host to launch an attack). Therefore, for data of unknown origin, we must first carry out anti-virus or program coding to prevent backdoor programs. 2. Data encryption technology. Firewall technology is a passive defense technology, and it is difficult to effectively defend against unsafe factors in e-commerce activities. Therefore, to ensure the transaction security of e-commerce, it is necessary to use contemporary cryptographic technology to help out. Encryption technology is the main security measure in e-commerce, and traders can use it in the information exchange stage as needed. At present, encryption technologies are divided into two categories, namely symmetric encryption/symmetric key encryption/private key encryption and asymmetric encryption/public key encryption. At present, many organizations use PKI (the abbreviation of Punickey infrastructure) technology to build a complete encryption/signature system, which can solve the above problems more effectively. Other parts of the paper can be found in the following websites:/z/q11677677.htm.
Satisfied, please adopt.