General Discussion on Prevention Technologies of Network Security

Article Preview

Abstract:

Definition of network security is stated first. Network security threats; roughly including network connection threat, physical environment threat, authentication treat, malicious programs and system vulnerabilities, which can be further divided into more detailed categories. 8 prevention technology and strategies consisting of physical security means, firewall technology, intrusion detection, information encryption technology, vulnerability scanning, antivirus software, disaster recovery technology, and honeypots and honeynet technology are elaborated to try to form a general discussion of the security prevention structure. In the end, we propose that all of these technology and strategies should be organically combined and enterprises should pay more attention to network security rather than expanding production uncontrolled.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3307-3311

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zheng Lihua, Security Technology and its Development Trend, Network Security Technology and Application, China, May, 2010, 7-8.

Google Scholar

[2] Lai Zongli, Li Yuejie, security login for computer and file protection system. Network Security Technology and Application, China, May, 2010, 31-33.

Google Scholar

[3] Pan Feng, Sun Peng, Zhang Dian, Research and Realization of Key Technology on Security Situation Recongnization Sysytem, Secrecy Science and Technology , November, 2012: 26, 52-56.

Google Scholar

[4] Mu Ying security and Privacy, That We Were Once Concerned about in 2012, Information Security and Communication Privacy, December, 2012, 1-5.

Google Scholar

[5] Xuo Jinyin, Chenshuang, Liu Jiandong, a key agreement model based on identity authentication, Information Security and Communication Privacy, December, 2012, 116-118.

Google Scholar

[6] Security Cyber Space for the 44th Presidency, Technology and Public Policy Program Center for Strategic and International Studies Washington, D. C December (2008).

Google Scholar

[7] Anderson J P, Computer Security Threat Monitoring and Surveillance PA19034, USA, (1980).

Google Scholar