Research and Practice of Security Technology in Computer Network

被引:0
|
作者
Qu, Qinghong [1 ]
机构
[1] Baicheng Normal Univ, Media Coll, Baicheng 137000, Peoples R China
来源
Proceedings of the 2016 4th International Conference on Machinery, Materials and Information Technology Applications | 2016年 / 71卷
关键词
Computer network; security technology; defense mechanism; development status; service level;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The arrival of the information age has gradually expanded the practical application of computer networks, provided more convenience for people's lives, and promoted the rapid development of Chinese information industry. In this situation, the process of using computer network has gradually produced network security problems, affected the security of the user's personal information. Affected by various illegal attacks will bury a large security risks to popularization and use of computer network, indirectly reduce the efficiency of a variety of information security transmission, restrict the future level of network services. In order to change the current situation of the development of adverse, we need to pay attention to the rational use of network security technology, structure reliability computer network defense mechanism, enhance the safety performance of network. This will maximize to meet the actual needs of users. Based on this, this paper will carry on the systematic elaboration to the security technology in the computer network.
引用
收藏
页码:1169 / 1172
页数:4
相关论文
共 50 条
  • [21] Research on Applications of Data Encryption Technology in Security of Computer Network Communication
    Li, Na
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 136 - 139
  • [22] Research on Application Value of Data Encryption Technology in Computer Network Security
    Meng, Xiaoli
    MODERN COMPUTER SCIENCE AND APPLICATIONS II (MCSA 2017), 2017, : 13 - 18
  • [23] Research on computer network security protection technology based on a superiority algorithm
    Wang Z.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01):
  • [24] Research on the optimization of computer network security technology from the perspective of psychology
    Wei, Chengxin
    INTERNATIONAL JOURNAL OF MENTAL HEALTH NURSING, 2024, 33 : 91 - 91
  • [25] Research on Computer Network Information Security Based on Big Data Technology
    Xiao, Gengyi
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 325 - 329
  • [26] Analysis of Computer Network Security Technology
    Gu, Yanfeng
    Sun, Huijia
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1788 - +
  • [27] Research on the Network Technology Security
    Rong, Wang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1739 - 1741
  • [28] Research on Computer Security and Firewall Technology
    Chen, Ping
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 257 - 260
  • [29] Computer Science Technology and Network Technology in the Application of the Computer Room Security
    Yang Zi-yan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1404 - 1406
  • [30] Research on computer network data security storage technology in the era of big data
    Zhang, Liying
    Gu, Xin
    Zhao, Qiang
    REVISTA INTERNACIONAL DE METODOS NUMERICOS PARA CALCULO Y DISENO EN INGENIERIA, 2024, 40 (02):