Wednesday, December 15, 2010
【 Weak current college 】 online banking security four problems currently exist
Online banking security after years of self-improvement, present itself as well as the authentication mechanism relatively safe, jiangmin anti-virus experts believe that currently online banking security problems mainly lies in the client and the associated third-party payment links, mainly includes the following four areas:
First, the hacker to remotely control a computer there is the possibility of hackers offsite transfers.
If a computer hacker success control of "broiler" then when users use this computer for online banking operations, hackers can monitor to the Internet banking operations, and the use of Trojan horse access account password, and then use the user is using a shield and other mobile hardware U digital certificate, success will use online bank transfer. This is possible only if, first, the computer is a remote control, the user is using the Internet Bank U shield transfer, the user is not using the mobile phone authentication services.
Second, to prevent IE browser hijacked risk.
Bank features U shield is the transaction information is encrypted authentication, certification of transaction information to meet the accurate and complete, not fake, it cannot be denied. In a real online banking operations process, users in the IE browser form transaction information, and the IE browser the transaction information to authenticate the U shield. U shield full trust to the IE browser, even if IE had submitted a pen through the manipulation of transaction, U shield cannot authenticate, so found. Therefore, if a Trojan horse virus through some technical means, to gain complete control of the IE browser, you can online banking user tampering of transaction information, once the user confirms the transaction, the transaction will be tampered with and normal transactions, certified, send, and eventually executed.
3. false online trading orders can often be confused as real ones.
Virus in monitoring the user computer to shop online, will give the user the current page to jump to a particular set of false hackers payment page. Due to the Receiver General of online shopping are all the same third-party payment platform (such as Pat network receiver is Shenzhen Tencent technology company, Taobao's recipient is Zhejiang Alipay Network co., Ltd., etc.), and fake Web page with only the order number and the amount of the difference, in that case often careless users click on to confirm the payment, the results of the original normal shopping money paid to the hacker in the fake account.
IV. third-party payment platform of docking there exploitable vulnerabilities.
Many online banking transactions with third-party platforms, this will give hackers stealing online banking users may take advantage of the funds provided. Third-party trading platforms have an exploitable vulnerability, and had many users of the stolen funds. As online banking and third-party trading platform are closely related, so third-party trading platform security on Internet banking development role is not to be ignored.
Network security concerns two major security technical overview
As the network of progressive universal and viruses, malicious programs continue to endanger, network security has become the focus, it is not only related to the further development of the INTERNET and universal, but also the survival of the INTERNET. The good news is we are Internet experts did not make the majority of INTERNET users, network security technology is emerging, the majority of Internet users and enterprises have more peace of mind, the following network security in two major technologies: anti-virus technology and firewall technology for a brief introduction to the Internet and enterprise network security to provide a reference network security plan.
1. antivirus software technology
Antivirus software in security technology applications are more common, we also used the most common security scenarios, because this technology is relatively simple to implement, can effectively avoid the INTERNET tour, from a variety of viruses, Trojans, worms, and we all know that antivirus software's main function is to check the virus, antivirus, as well as real-time antivirus, this way for individuals or small businesses can meet your needs, basically for medium and large enterprise platform, you need a higher level of anti-virus programs, such as rising Internet Edition, specifically for large and medium-sized enterprises. Along with the anti-virus technology continue to evolve, now the mainstream anti-virus engine technology continually innovate, and virus database upgrades at an increasing rate, rising anti-virus software, has been to three times a day with the upgrade frequency response to virus programs continue to breed new species and new varieties.
Second, the firewall technology
"Firewall" is an image, in fact it is a computer hardware and software combinations that make the Internet and the internal network between a security gateway (scuritygateway), thereby protecting internal networks from the illegal invasion of users, or make the personal computer against attacks from the outside world, it is actually one of the Internet and the internal network (usually the LAN or WAN) or Internet and personal computer space.
Firewall if you come from implementations, is divided into hardware and software firewalls, hardware firewall is through a combination of hardware and software to achieve isolation internal and external network aims to expensive, the effect is good, generally small business and personal cost to achieve; software firewalls it is software technology to achieve the objective of the protection of the calculation of the price, through effective rule (allow, prohibited) or white blacklist to reach the limit, some illegal user access to the internal network or the purpose of the personal computer. Moreover, the firewall technology also enables computer internal programs access the Internet in a variety of control strategies and, above all, oversight, and second, the program has to offer to the user before asking, whether to grant it access to the outside world, which effectively eliminates all kinds of new Trojans rebound-join external theft of virtual property loss is thrown. The new edition of the rising firewall also integrates the program protection technology, QQ, online games and other programs added to the protected list, prevents other processes on the non-normal access to effective protection of the password.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment