The Optimization of the Structure of Computer Network Security System

Article Preview

Abstract:

The computer network security system is the basic condition to ensure the users to operate the computer safely. It is as well an important content of the development and research for the network system. Analyzing from the perspective of the operation effects of the traditional networking security system, there are still quite apparent shortages in the structure composition. It has not only caused the increase of the research and development costs of the system, but also has brought a great deal of inconveniences for the users to operate the system. In order to meet the requirements for high-performance system of the users, it is of great importance to carry out the optimization improvement on the structures of the computer network security system. Focusing on this point, this paper has explored on the shortages of the traditional computer network security system. In addition to this, it has brought out an effective optimization scheme for the structure.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

517-520

Citation:

Online since:

October 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] CERT-Coordination Center, Home Computer Security. Software Engineering Institute Carnegie Mellon . http: /www. cert. org/homeusers/HomeComputerSecurity/. November 22, (2002).

Google Scholar

[2] C. C. Hsu, A. Brian. The Delphi Technique: Making Sense Of Consensus . Practical Assessment, Research & Evaluation, 2007, Volume 12, Volume 12 (Number 10).

Google Scholar

[3] M. Tian-tong. Delphi Technique . http: /it. kmutnb. ac. th/monchai. F aculty of Information Technology, King Mongkut's University of Technology North Bangkok, March 25, (2011).

Google Scholar

[4] G. J. Skulmoski, F. T. Hartman, J. Krahn. The Delphi Method for Graduate Research . Journal of Information Technology Education. 2007, Volume 6, Volume 6.

Google Scholar

[5] ZHU Wen-yan. The computer network security and protection. Public Communication of Science & Technology, 2010, (10).

Google Scholar