1, information leaked.
Mainly in two aspects: the contents of the transaction between the two parties were stolen by a third party, and the documents provided by one party to the other party were illegally used by the third party.
Attackers can intercept confidential information transmitted on the Internet or obtain useful information, such as bank account number, password, etc., through the Internet, public telephone network, wiring or installing interception devices within the electromagnetic radiation range. By analyzing the parameters and direction of online information flow, the frequency and length of communication.
2. The information has been tampered with.
Electronic transaction information is illegally modified, deleted, inserted or replayed by others in the process of network transmission (that is, information that can only be used once is used many times), so that the receiver receives the wrong information and the information loses its authenticity and integrity.
3. identification.
After identity identification, there will be no cases where a third party impersonates the identity of one party to destroy the transaction, destroy the reputation of the counterfeited party or steal the transaction results of the counterfeited party. At the same time, both parties can be bound to be responsible for their own actions, and the information sent and received cannot be denied.
4. The information was destroyed.
It is manifested in two aspects: the loss and fallacy of information transmission caused by network hardware or software problems, and the destruction of e-commerce information by some malicious programs of computer network itself.
Extended data:
Precautions against security problems in e-commerce;
1, information is confidential.
Business information in the transaction needs to be kept confidential. If you know the account number and user name of the credit card, you may be stolen. If the information of ordering and payment is known by competitors, you may lose business opportunities. Therefore, the dissemination of e-commerce information generally needs encryption.
2. The certainty of the trader's identity.
The two sides of online transactions are probably strangers, thousands of miles apart. In order to make the transaction successful, we must first be able to confirm the identity of the other party. Merchants should consider that the customer can't be a liar, and the customer will also worry about whether the online shop is a scam shop. Therefore, it is the premise of the transaction to confirm the identity of the other party conveniently and reliably.
3. It is undeniable.
Due to the ever-changing business conditions, once the transaction is reached, it cannot be denied, otherwise it will inevitably harm the interests of one party. For example, when ordering gold, the price of gold is low, but after receiving the order, the price of gold rises. If the acquirer can deny the actual time of receiving the order, or even the fact of receiving the order, then the orderer will suffer losses.
Therefore, every link in the communication process of electronic transactions must be undeniable.
4. Integrity of information.
The transaction file cannot be modified, and the information receiver can verify whether the received information is complete and consistent and whether it has been tampered with. As mentioned in the above example, after receiving the order, the supplier found that the price of gold rose sharply.
If the contents of the document can be changed and the order number is changed from 1kg to 1g, it will benefit greatly and the ordering company may suffer losses. Therefore, electronic transaction documents must also be unalterable to ensure the seriousness and fairness of the transaction.
5. Reliability of the system.
E-commerce system is a computer system, and its reliability refers to preventing computer information errors or failures caused by computer failures, program errors, transmission errors and natural disasters.
Baidu encyclopedia-e-commerce