Current location - Education and Training Encyclopedia - Graduation thesis - Network security technical paper
Network security technical paper
Network security technical paper

From primary school, junior high school, high school to university and even work, people often read papers, which can promote experience and exchange understanding. There are many precautions in writing a paper. Are you sure you can write it? The following are the technical papers on network security that I collected. Welcome to reading. I hope you will like them.

Abstract: With the promotion of computer network technology, e-commerce has made great progress, but the security of computer network directly threatens the development of e-commerce. Therefore, for e-commerce, making good use of computer network security technology is the key. On the basis of introducing the hidden dangers of e-commerce network security, this paper analyzes the application of computer network security technology, and cooperates with the measures to ensure the privacy security of e-commerce, hoping to meet the security requirements of e-commerce operating environment.

Keywords: e-commerce; Computer; Network security technology

E-commerce itself has many advantages, but once network technology lacks security, it will directly threaten e-commerce. In order to promote the development of e-commerce, a stable and secure network environment is essential. To obtain a safe and reliable network environment, we should not only eliminate the hidden dangers of the network itself, but also solve the security problems faced by e-commerce in computer network applications.

1, security risk of e-commerce network

First, information theft. By using a gateway or router, the transmitted information can be intercepted, which will directly lead to the disclosure of information and passwords. Or through analysis, find rules and formats to intercept the information content transmitted by the network. The problem of information theft is mainly caused by the lack of security or the simple encryption [1]. Second, information changes. Information on both the gateway and the router can be changed. When transferring money online, you can steal money by changing your account number. Or after modifying the information, send the obtained information directly to the destination. Third, counterfeiting. After mastering the basic information of users, impersonate users by changing information, publish false information, or take the initiative to obtain information. Fourth, malicious destruction. Attackers mainly use the access network to modify the network information, so as to master the relevant information and obtain the network-related content smoothly. Once such a problem occurs, the consequences will be very serious.

2. Application of computer network technology in e-commerce.

In order to meet the security requirements, a variety of network security protocols and technologies are needed to provide different degrees of security when conducting e-commerce transactions.

2. 1 intelligent firewall technology

Intelligent firewall refers to correctly judging programs with viruses, and then identifying and processing data by decision-making, memory and statistics. Intelligent firewall generally does not ask users, only when the network access is uncertain will it pass the information to users, and then invite users to take precautions together. Intelligent firewall can solve the problems of virus spread, common denial of server attacks and advanced application intrusion. However, compared with the traditional firewall, not every access program needs to ask the user, thus avoiding the appearance of frequent firewall alarm inquiries, making it difficult for users to judge by themselves, leading to misjudgment or direct injury.

2.2 Data encryption technology

Intelligent firewall itself belongs to passive defense, but compared with traditional firewall, its own advantages are very obvious, but there are still many problems. Uncertain and unsafe factors in e-commerce are difficult to eliminate. Then, to ensure the security of e-commerce transactions, data encryption can be used to make up for its shortcomings. At present, data encryption includes symmetry and asymmetry. Many organizations have built a complete signature system and encryption system by using public key system technology, which can solve the security problems in e-commerce well. Through the construction of public key system, Party A can give one of the keys to the counterparty when generating it. After waiting for access, Party B will encrypt the confidential information and return it to Party A, and Party A will use another special key to decrypt it to ensure that the confidential information can be exchanged in a safe state [2].

2.3 Digital signature technology

Digital signature means that the receiver can confirm the source and integrity of the data by attaching the data to the data unit or secretly converting the data unit. This data or transformation allows the receiver of the data unit to confirm the source and integrity of the data unit and protect the data from forgery. The signature is mainly presented in electronic form, and the signed information can also be transmitted in the communication network. Digital signature technology mainly encrypts the private key of the sender of abstract information directly and sends it to the receiver after completion. Only by using the public key can the receiver decrypt it, and then using the HAVH function, a digest message will be formed and compared with the decrypted digest message. If they are the same, it proves that the information is complete and has not been modified during transmission, otherwise it indicates that the information has been modified. Therefore, digital signature can meet the integrity requirements of information transmission and avoid the denial problem in the transaction. At present, this technology has been well applied in e-commerce.

2.4 illegal intrusion detection technology

In the process of protecting network security, firewall technology can prevent external intrusion, but it is difficult to prevent internal attacks and cannot provide intrusion detection ability. Illegal intrusion detection can complement firewall technology. Illegal intrusion detection technology is a technology designed and configured to meet the security requirements of computer systems, which can find abnormal phenomena and unauthorized behaviors. Through reasonable analysis and understanding of the information collected from several key points in computer networks and computer systems, we can find out whether there are violations of security policies and attacks in networks or systems. Intrusion detection technology is an important part in network security protection. Under the premise of not affecting the network performance, it can be monitored to prevent external attacks, internal attacks and misoperation, thus improving the overall security of the network.

2.5 virus prevention technology

E-commerce will be harmed by virus attacks, and virus prevention technology can effectively avoid virus threats. The prevention of computer viruses is mainly through the establishment of prevention systems and regulations, targeted prevention and treatment of invading viruses, so that the spread and destruction of computer viruses can be effectively controlled. Computer viruses are mainly infected by reading and writing files, and infected and destroyed by staying in memory and intercepting interrupt vectors. To prevent computer viruses, it is necessary to update the virus database in time, ensure that the system is well protected, and regularly kill viruses, which can also effectively avoid virus infection and ensure normal use.

3. Countermeasures to ensure the privacy and safety of e-commerce.

First, strengthen network security management. This requires the leading institutions to coordinate with each other and formulate safeguard laws and regulations to ensure the safety of e-commerce transactions and avoid privacy leakage. Third, efforts should be made to train professionals to ensure the security of e-commerce networks. Training personnel according to international standards, in addition, through advanced defense means and technologies, can effectively guarantee the security of e-commerce networks. Third, do a good job in network security law enforcement legislation. Pay attention to legislative procedures, establish and improve the legal system and improve the security system. In addition, actively learn from experience and modify the existing legal system. Fourth, strengthen the construction of privacy security facilities. Establish a public key infrastructure and improve the emergency handling infrastructure. In addition, the establishment of detection and evaluation standards can lay the foundation for ensuring network privacy security [3].

4. Conclusion

In a word, solving network security problems and promoting the development of network security technology play an important role in the healthy and safe development of e-commerce. Therefore, scientific and reasonable network security technology should be applied to promote the better and faster development of e-commerce.

refer to

[1] Tang. Research on the Application of Computer Network Security Technology in Electronic Commerce [J]. Information and Communication, 20 13(3):79.

[2] Chen Jinqiang, Huang Jimei. The application of computer network security technology in e-commerce [J]. Information and Computer: Theoretical Edition, 20 15 (2 1): 82-83.

[3] Gao Yang. The influence of computer network security technology on the development of e-commerce [J]. Fujian Quality Management, 20 16 (3): 100.

;