Education, Science, Technology, Innovation and Life
Open Access
Sign In

Analysis of computer network information security and protection strategy

Download as PDF

DOI: 10.23977/acss.2024.080306 | Downloads: 6 | Views: 109

Author(s)

Xuwei Zhang 1, Yanfang Wang 2

Affiliation(s)

1 Philippine Christian University Center for International Education, Manila, 1004, Philippines
2 Jinhua Guangxin Network Engineering Co., Ltd, Jinhua, 321000, China

Corresponding Author

Xuwei Zhang

ABSTRACT

In the contemporary development of computer network, the attention of computer network information security and the analysis of protection strategies can protect personal privacy, prevent data leakage and guarantee the reliability of network services. Computer network information security is not only related to the protection of personal privacy and corporate secrets, but also has an important impact on social stability. Therefore, it is of great practical significance to study the computer network information security and the corresponding protection strategies. Based on the reality, this paper makes a comprehensive and in-depth analysis of the main problems of computer network information security, including phishing, computer virus, DDoS attack and network security vulnerabilities. On the basis of in-depth analysis of these problems and their causes, this paper further discusses the scientific and effective protection strategies, such as firewall technology, anti-virus software and intrusion detection system. These strategies aim to meet the increasingly complex network security challenges, prevent network information security problems, and provide useful reference for relevant personnel in the field of network information security. By implementing these strategies, we are expected to improve the overall level of computer network information security, and build a more secure and reliable network environment.

KEYWORDS

Computer; network; information security; protection

CITE THIS PAPER

Xuwei Zhang, Yanfang Wang, Analysis of computer network information security and protection strategy. Advances in Computer, Signals and Systems (2024) Vol. 8: 41-50. DOI: http://dx.doi.org/10.23977/acss.2024.080306.

REFERENCES

[1] Zhao Guanglei, Niu Junpeng. Analysis of computer Network Information Security and its Protection Strategy based on Computer Network Technology [J]. Science and Informatization, 2022 (3): 2.
[2] Li Haojie. Analysis of computer network information security protection strategy and evaluation algorithm [J]. Computer Programming Skills and Maintenance, 2023 (12): 168-170.
[3] Li Long. Computer network information security and Protection strategy in the era of big data [J]. Information System Engineering, 2022 (7): 4.
[4] Guo Xiufeng. Research on computer Network Information Security and Protection Strategy in the era of Big Data [J]. Computer Application Abstract, 2022, 38 (23): 77-79.
[5] Chen Chong. Analysis of computer network and information security strategies based on big data [J]. Integrated circuit applications, 2023, 40 (7): 230-231.
[6] Pan Tianhao. Analysis of computer network information security protection strategy under the background of information technology [J]. Information and Computer, 2022, 34 (20): 220-222.
[7] Wen Ke-chun, Zhang Yi, Xu Tao. Analysis of computer network information security management strategy [J]. Computer Application Abstract, 2022 (9): 38.
[8] Yun Tao. Discussion on information security risks and defense strategies in the development process of computer network [J]. China Science and Technology Journal Database Industry A, 2022 (6): 3.
[9] Yu Guangxu. Information security protection strategy of computer communication network under the background of information technology [J]. Information and Computers, 2023, 35 (4): 239-241.
[10] Zhang Bofan. Contemporary computer network information security and protection strategy [J]. Chinese Science and Technology Journal Database (abstract edition) Engineering Technology, 2022 (9): 3.
[11] Wang Song, Zhao Ying. Brief analysis of computer network information security influencing factors and prevention strategies [J]. Electronic components and Information Technology, 2022 (10): 213-216.
[12] Hu Yuanyuan, Xiong Jiawei. Analysis of the influencing factors and preventive measures of computer network information security [J]. Network security Technology and Application, 2022 (4): 2.

Downloads: 16265
Visits: 272495

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.