(28.9486.74720.82401)
Information Transfer Abstract: We are living in the information age which has Computer, Network and Information Transfer. A flowing river would be lost a part of the water in the forward, Information Transfer too. The existence of information on the Internet as a Shared, Our name, personal information, account information, under some work of encryption. But no one knows exactly, we whether information is really safe. So Information age brings us convenient while, also brought us a lot of hidden dangers. Keyword: Information Transfer Information security The first case: In January 2014, China's Internet appear large DNS lookup failure Many site peers, according to the domestic Internet node has failed, all the top level of the root domain cannot resolve, two-thirds of the nation's DNS server is paralyzed, also direct consequence is a large number of website domain name resolution is not normal. Fault specific displays in: domain name to access the request is to jump to a few no response on IP (mainly 65.49.2.178), users of different provinces have appeared different degree of network failure. For ordinary users, the most direct performance is a lot of web site can't open, especially. Com big station. A DNS technology, experts say the problem appear only in China, shows that global root server did not appear problem, the problem is likely to be the domestic network operators. The second case: At 860000 users information was leaked On December 2, 2014 night, Woo Yun, some netizens submitted recruitment information leakage holes, 860000 users and officially open in 3. Woo Yun showed, according to the network hacker can get including user through loopholes such as name, address, id number, account of private information. Subsequently, the reporter from the public has leaked screenshots to see information, resume information leaked 860000 users, including name, marital status, birth date, the household registration address is very detailed information, such as and, prior to each of the personal information with the word "at". Don't even let your resume, also can have a good job?" Resume for the leak, netizens are mostly concerned. Netizen said: "no wonder so much recently spam messages." I only take two example, and there are many examples of the information security problem. E-commerce security as a whole can be divided into two parts: computer network security and business transaction security. Computer network security (1)Not safety related operating system configuration No matter what the operating system, under the condition of default installation will be some safety problems, only for operating system security related and strict security configuration, can achieve a certain degree of security. Don't think that the default operating system after installation, coupled with strong password system will be classified as safe. Network software vulnerabilities and "back door" is the first target of network attack. (2) Not conducting audit CGI program code If gm CGI, prevention of it a little easier, but for some of the website or software vendors develop CGI programs, many serious CGI problems, for an e-commerce site, there will be a malicious attacker and using accounts for online shopping and other serious consequences (3) Denial of service attacks (DoS, DenialofService) With the development of e-commerce, the site real-time demand is higher and higher, DoS or DDoS threat to site is more and more big. Aimed at network paralysis attack effect than any of the traditional way of terrorism and war are more intense, more destructive, harm is faster, and more extensive, and the risk of the attackers itself is very small, even before the attacks had vanished into thin air, make the other party may not implement retaliatory strike. (4) Inappropriate use of security products Although many site adopted some network security devices, but due to the security product itself or the use of problems, these products do not play a proper role. Many security vendor product technical background to configure personnel requirements are high, beyond the technical requirements of of common network management personnel, even the factory in the original to the user to do the correct installation, configuration, but once the system changes, need change related security products set, it is easy to create many security problems. (5) The lack of strict network security management system Network security is the most important thing is to attaches great importance to the ideological, sites or LAN internal security need to use a complete security system to protect. Establish and implement strict system of computer network security and strategy is the foundation of the real network security. Business transaction security (1)To steal information Due to not using encryption, the data information transmitted in clear text in the network, the invaders on packets through a gateway or router can transmit information intercepted. By stealing and analysis for many times, can find the rule of information and format, and then get the transport information content, net transmission information leaks. (2)Tamper with the information When the invaders to master the information format and rules, through various technical means and methods, will be transmitted on the network information data in the middle of the modification, and then sent to the destination. This approach is not new, on a router or gateway can do such work. (3)An impostor Due to master the format of the data, and can be tampered with by information, an attacker can pretend to be legitimate users to send fake information or active access to information, it is often difficult to distinguish and remote users. (1)Malicious damage Because an attacker can access networks, may modify the information in the network and mastering confidential information online, even can dive into the internal network, the consequences are very serious. So, in the rapid development of the information age, we should be pay attention to safety problems such as personal information leakage.
group status
👤 group joined: 0 ⏳ group pending: 0 🚫 group blocked: 0