Analysis of Computer Network Information Security and Protection Strategy

被引:1
|
作者
Ming, Xiaobo [1 ]
Chen, Ying [1 ]
Guo, Jinhua [1 ]
机构
[1] Shangrao Vocat & Tech Coll, Shangrao 334001, Jiangxi, Peoples R China
关键词
Computer network information; Information security; Security protection;
D O I
10.1051/matecconf/201926702013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
引用
收藏
页数:3
相关论文
共 50 条
  • [41] Computer Network Information Security Protection Faced by Digital Art Museums Based on the Internet of Things
    Wang, Qi
    Li, Ling
    Hu, Shuai
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [42] The Personal Information Privacy Protection Strategy in Social Security Information System
    Wang, Xuefang
    Xue, Hongrong
    [J]. COMMUNICATIONS AND INFORMATION PROCESSING, PT 2, 2012, 289 : 718 - +
  • [43] Application Analysis of Network Security Situational Awareness Model for Asset Information Protection
    Ren, Yuemei
    Feng, Xianju
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 790 - 799
  • [44] The Analysis of University Network Information Security System Based on Level Protection Model
    Xian Weiquan
    Wang Houkui
    He Haoyi
    Zheng Donghong
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 609 - 614
  • [45] Analysis of application strategies of computer information management technology in maintaining network security
    Zheng, Zhou
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 225 - 225
  • [46] Analysis of Computer Network Security Technology and Preventive Measures under the Information Environment
    Ge, Bin
    Xu, Jin
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1978 - 1981
  • [47] Computer Network Information Security Analysis and Management Research Based on Improved Wavelet Neural Network
    Qi, Kun
    [J]. 2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 129 - 132
  • [48] Analysis of Computer Network Security Technology
    Gu, Yanfeng
    Sun, Huijia
    [J]. 2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1788 - +
  • [49] Computer Network Security Analysis and Research
    Cui, Limei
    [J]. PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 945 - 947
  • [50] Computer Network Security Analysis Modeling
    Zhao, Xue
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGY (MEET 2019), 2019, : 165 - 168