Research of Computer Network Information Security and Protection Strategy

Article Preview

Abstract:

The modern computer network has been everywhere in our daily life and working. People obtain information from a computer network or use it to improve working efficiency. The computer network becomes more and more important. The information security decides the long-term stable application of the network. Actually, information security receives various security threats during the practical application. If we cannot support effective, reasonable, and comprehensive protection strategy on time, computer network information or data will be stolen and destroyed. This article analyzes and researches various security loopholes that aiming at computer network information security, and provides related protection strategy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2162-2165

Citation:

Online since:

January 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Xia Dandan, Li Gang, Cheng Mengmeng, Yu Liang. Review of intrusion detection system [J]. Network Security Technology & Application. 2007. 01.

Google Scholar

[2] Liu Ninghong, Luan Hong. Research status and prospect of computer immunology application in network security [J]. Market Modernization, (2008).

Google Scholar

[3] Jia Kaidong. Information security and protection of computer network [J]. Fortune World, 2009(06).

Google Scholar

[4] Wang Dan. Strengthen user security awareness and promote mainframe defense capability [A]. Memoirs of National Conference on Computer Security Academics(24th Volume) [C]. (2009).

Google Scholar

[5] Hao Ying. Brief talk of computer network security [A]. Memoirs of 20th National Academic Conference (Tianjin) on 2006IT, IT, Information technology, electronics, Instrument Innovation [C]. (2006).

Google Scholar

[6] Peng Jun, Gao Jun. Research of computer network information security and protection strategy [J]. Computer & Digital Engineering. 2011(01).

Google Scholar