BCM206 Analytical Blog post-2

The future network refers to the new generation Internet which is outside the Internet and can meet the needs of the future social network. In 2007, the International Standards Organization and the International Institute of Electrical Engineering (ISO/IEC) launched the “Decimal Network International Standardization Project". Its purpose is to use empty cup design and new architecture to develop a new generation of network system supported by a complete software and hardware system, which can exist independently from the existing Internet system and have the ability of international interconnection. Since the development of the Internet in the 1970s, it has provided multiple convenience and has become an indispensable part of life, including e-mail, instant messaging, video conferencing, blog, social network, online shopping, etc., all highly dependent on the Internet. However, the existing network still faces the problem of insufficient security.

https://www.nsdinc.com/network-security-solutions/network-security-4/

Network rebellion, hacker organization and hacker doctrine, and network warfare are all threatening network security. The current network social situation is not optimistic, and the future network is even more unpredictable. In my opinion, human factor is the root cause of the insecurity of computer information network.

There are many factors that make computer information unsafe, including human factors, natural factors and occasional factors. Among them, the human factor means that some criminals take advantage of the loopholes in the computer network, or sneak into the computer room, steal computer system resources, illegally obtain important data, tamper with system data, destroy hardware equipment, and compile computer viruses. The attacker accessed the information resources without authorization and tampered with the information. This is a threat to the integrity of information. The problem of network security has always been a serious issue.

In the wake of the global financial crisis in 2008, on November 1st of the same year, a man who identified himself as Satoshi Nakamoto published a bitcoin white paper “Bitcoin: a peer-to-peer electronic cash system" on the P2P foundation website, setting out his new vision for electronic currency– Bitcoin. On January 3, 2009, the Bitcoin Genesis Block was born. But some people worry that Bitcoin will become a hotbed of drug trafficking, money laundering and other illegal activities. A website called Silk Road, which set up a platform for lawbreakers to trade bitcoin, was shut down by US authorities earlier this month. Us police said on Oct. 25 that they found $2.8 million worth of bitcoin on the computer of the site’s owner, Ross William Ubrich.(The information comes from the network.)The emergence and trading of Bitcoin is not conducive to network security, and even threatens the law and national security. Similarly, as long as there is a reasonable use and regulation of Bitcoin, it can be used as a driving force to promote online transactions. Bitcoin also has some advantages, it is completely decentralized, there is no issuer, it is impossible to manipulate the number of issues. Its distribution and circulation is realized through open source P2P algorithm. In addition, it is also robust. Bitcoin is completely dependent on P2P networks and has no distribution center, so it cannot be shut down externally. Bitcoin prices may fluctuate, collapse, and governments may declare it illegal, but Bitcoin and its vast peer-to-peer networks will not disappear.

https://www.thenewslens.com/article/101546

Nowadays, virtual currency is playing the role of currency in some aspects and has the function of representing commodity value. For example, bitcoin can be traded and traded in the virtual market. However, these virtual currencies can only circulate in a fixed range, which has also become the biggest disadvantage of virtual currency. They can not become the legal tender of the state and can only represent the value of a certain product. They are only acceptable to a small number of businesses, and customers can not pay freely or circulate freely. 

Virtual currency also needs to be attached to the third-party online financial platform, which also limits the scope of use of virtual currency.(Liu Manman,2020) Therefore, at this stage, internet currency can not replace traditional currency to trade freely in the market.

The traditional financial risk that investors’ asset prices change due to market factors still exists in Internet financial risk. However, the more representative risk comes from credit risk, which is the risk of investors’ loss due to the default of counter parties. The second is liquidity risk, which is the risk of loss to investors when investors cannot sell the subject matter at a reasonable price.

Network security and stability riskIf the network is missing or there are huge hidden dangers of network security, Internet finance is like a fish without water, unable to serve customers normally.(Xu minyang,2019) Today’s Internet technology has developed to a relatively mature level. However, there are still many unknown network security problems, such as unavoidable human and objective factors, and the Internet may lose its function. On the other hand, the Internet may be paralyzed by hacker attacks or virus intrusion.

https://www.bcblbd.com/page/342

Internet banking is becoming more and more popular. On the basis of traditional banks, Internet banking expands various businesses of banks to the Internet, which can expand the business of originally limited business outlets to more customers through the Internet, receive more customers, attract investors and improve efficiency at the same time. There is also a virtual bank completely based on the Internet.(Dmitry Namiot,2019) Its main body is on the Internet, but it has some physical branches. Such banks have not yet been used on a large scale. The biggest feature of Internet banking is that it can intelligently record customer information and conduct screening and analysis. Be able to analyze customers’ behavior habits through data, identify different customers’ financial needs, consumption habits and other information, and design corresponding demand, financial management and other financial products for customers according to these data.

Further popularization of online paymentNow we have contacted and can skillfully use many online payment methods, such as Alipay and WeChat payment. Many enterprises integrate online and offline. Many entity businesses or network enterprises support third-party online payment. (Johannes Thones,2019)Online payment has brought great convenience to our life. However, in some economically backward places, online payment has not been widely used. In addition, online payment technology has not appeared for a long time. Many elderly people do not use third-party software for consumption, which hinders the development of Internet finance to a certain extent. Therefore, in the future, we should not only strengthen the publicity of online payment and expand its influence, but also strive to explore and solve some information security problems existing in online payment.

Gradual improvement of credit system constructionWhen it comes to finance, the most important thing is information security. Only a trusted brand can be bigger and 

stronger. Similarly, the construction of Internet finance is the same. If you want to make Internet Finance bigger, you must get the trust of the masses. Therefore, we should always strive to improve the credit system construction of Internet Finance in the future. With the accumulation of Internet financial credit, Internet finance can get corresponding advantages in more aspects, so as to strengthen the construction of Internet finance, accelerate the pace of development and promote its development.

The industrial chain financial model will be further expandedThe operation concept of the industrial chain under the traditional financial model is deeply rooted. Now it will be a difficult process to transform. The first thing is to change the traditional perspective of enterprise finance and solve the corresponding problems from the perspective of industrial chain finance. 

The financial model of the industrial chain also needs the support of a complete and reliable set of interested parties. We should always ensure that every link in the chain is foolproof. In the past, we paid attention to the cultivation within the enterprise. Now we should also provide good services to these interested parties to provide favorable conditions for the development of Internet finance.

Reference list:

[1] Liu Manman. Analysis of Internet financial supervision [J]. Chinese and foreign entrepreneurs, 2020 (17): 85

[2] Xu minyang. Construction of production business platform for large architectural design enterprises based on micro Service Architecture [a]. Civil engineering graphics branch of China graphics society. Proceedings of the sixth BIM Technology International Exchange Conference – Application and development of digital construction in real estate, design and construction [C]. Civil engineering graphics branch of China Graphics Society: Editorial Department of civil engineering information technology, 2019:7

[3] Johannes Thones, Microservices[J]. Sofware, 2015,32(1): 113-116.

[4] Dmitry Namiot,Manfred sneps-sneppe. On Micro-services Architecture[]. International Journal of Opea

[5] Intemational business machines corporation. Parallelsysplex cluster technology overview[ EB/OL].[ 2006-1 1-13]. htp://www. 03. ibm. com/ servers/eserver/zseries/ibrary/techpapers/gf225015.html.

發表留言