Analysis of Computer Network Information Security and Protection Strategy

被引:1
|
作者
Ming, Xiaobo [1 ]
Chen, Ying [1 ]
Guo, Jinhua [1 ]
机构
[1] Shangrao Vocat & Tech Coll, Shangrao 334001, Jiangxi, Peoples R China
关键词
Computer network information; Information security; Security protection;
D O I
10.1051/matecconf/201926702013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] Analysis of computer network information security and protection strategy
    Yu, Wenye
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT-16), 2016, 59 : 1239 - 1242
  • [2] The Strategy of Computer Network Information Security and Protection
    Long, Teng
    [J]. 2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 31 - 35
  • [3] The security and protection strategy research of computer network information
    Liu, Yu
    Chang, Jing
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 95 - 99
  • [4] Study on Security and Protection Strategy of Computer Network Information
    Zhang, Chenxiang
    [J]. Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 74 - 77
  • [5] Research of Computer Network Information Security and Protection Strategy
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2162 - +
  • [6] The Security and Protection Strategy Study of Computer Network Information
    Shi, Junyan
    Li, Juanjuan
    [J]. Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 34 - 37
  • [7] Discussion and Practice of Computer Network Information and Network Security Protection Strategy
    Liu, Li
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1810 - 1813
  • [8] The Research of Computer Network Security and Protection Strategy
    He, Jian
    [J]. MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [9] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [10] Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age
    Xue, Liang
    Yang, Juan
    Fan, Weiguo
    [J]. PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 81 - 85