Discussion on the Protection and Problem of Computer Network Security

被引:0
|
作者
Wan, Biao [1 ]
机构
[1] Wuhan Polytech, Sch Comp Technol & Software Engn, Wuhan 430070, Peoples R China
关键词
Computer Network; Security; Protecting Methods;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
With the advent of the Internet era, people's life has changed a lot. In this change, on the one hand, the Internet has brought a lot of benefits; on the other hand, it also brings a lot of troubles. In order to reduce the unnecessary loss in the process of using computer networks, many network technology experts provide a lot of good advice to the users. Here, this paper analyzes the current situation of computer network security problems, and discusses some methods of protecting computer security.
引用
收藏
页码:344 / 347
页数:4
相关论文
共 50 条
  • [31] Research on the personal privacy information protection problem based on computer security technology
    Zhong, Shuangxi
    Zhang, Min
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 917 - 923
  • [32] Computer network security
    Janson, P
    Rudin, H
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 785 - 786
  • [33] On computer network security
    Ma, Ting-ting
    Renmin Changjiang/Yangtze River, 2000, 31 (01):
  • [34] RETRACTED: Encryption Technology for Computer Network Data Security Protection (Retracted Article)
    Yu, Yang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [35] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [36] Research on Computer Big Data Technology in Generative Countermeasures Network Security Protection
    Yin Xuxi
    2022 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, BIG DATA AND ALGORITHMS (EEBDA), 2022, : 1178 - 1183
  • [37] Research on Computer Network Security Protection Technology Incorporating Full Convolutional Networks
    Duan X.
    Zhang S.
    Feng L.
    Zhang L.
    Applied Mathematics and Nonlinear Sciences, 2023,
  • [38] Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics
    Hunt, Ray
    Slay, Jill
    PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 23 - 30
  • [39] Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age
    Xue, Liang
    Yang, Juan
    Fan, Weiguo
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 81 - 85
  • [40] COMPUTER SECURITY AUTHENTICATION AND DATA PROTECTION
    PRITCHARD, JAT
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 1980, 31 (01) : 110 - 110