Analysis of computer network information security and protection strategy
DOI: 10.23977/acss.2024.080306 | Downloads: 6 | Views: 109
Author(s)
Xuwei Zhang 1, Yanfang Wang 2
Affiliation(s)
1 Philippine Christian University Center for International Education, Manila, 1004, Philippines
2 Jinhua Guangxin Network Engineering Co., Ltd, Jinhua, 321000, China
Corresponding Author
Xuwei ZhangABSTRACT
In the contemporary development of computer network, the attention of computer network information security and the analysis of protection strategies can protect personal privacy, prevent data leakage and guarantee the reliability of network services. Computer network information security is not only related to the protection of personal privacy and corporate secrets, but also has an important impact on social stability. Therefore, it is of great practical significance to study the computer network information security and the corresponding protection strategies. Based on the reality, this paper makes a comprehensive and in-depth analysis of the main problems of computer network information security, including phishing, computer virus, DDoS attack and network security vulnerabilities. On the basis of in-depth analysis of these problems and their causes, this paper further discusses the scientific and effective protection strategies, such as firewall technology, anti-virus software and intrusion detection system. These strategies aim to meet the increasingly complex network security challenges, prevent network information security problems, and provide useful reference for relevant personnel in the field of network information security. By implementing these strategies, we are expected to improve the overall level of computer network information security, and build a more secure and reliable network environment.
KEYWORDS
Computer; network; information security; protectionCITE THIS PAPER
Xuwei Zhang, Yanfang Wang, Analysis of computer network information security and protection strategy. Advances in Computer, Signals and Systems (2024) Vol. 8: 41-50. DOI: http://dx.doi.org/10.23977/acss.2024.080306.
REFERENCES
[1] Zhao Guanglei, Niu Junpeng. Analysis of computer Network Information Security and its Protection Strategy based on Computer Network Technology [J]. Science and Informatization, 2022 (3): 2.
[2] Li Haojie. Analysis of computer network information security protection strategy and evaluation algorithm [J]. Computer Programming Skills and Maintenance, 2023 (12): 168-170.
[3] Li Long. Computer network information security and Protection strategy in the era of big data [J]. Information System Engineering, 2022 (7): 4.
[4] Guo Xiufeng. Research on computer Network Information Security and Protection Strategy in the era of Big Data [J]. Computer Application Abstract, 2022, 38 (23): 77-79.
[5] Chen Chong. Analysis of computer network and information security strategies based on big data [J]. Integrated circuit applications, 2023, 40 (7): 230-231.
[6] Pan Tianhao. Analysis of computer network information security protection strategy under the background of information technology [J]. Information and Computer, 2022, 34 (20): 220-222.
[7] Wen Ke-chun, Zhang Yi, Xu Tao. Analysis of computer network information security management strategy [J]. Computer Application Abstract, 2022 (9): 38.
[8] Yun Tao. Discussion on information security risks and defense strategies in the development process of computer network [J]. China Science and Technology Journal Database Industry A, 2022 (6): 3.
[9] Yu Guangxu. Information security protection strategy of computer communication network under the background of information technology [J]. Information and Computers, 2023, 35 (4): 239-241.
[10] Zhang Bofan. Contemporary computer network information security and protection strategy [J]. Chinese Science and Technology Journal Database (abstract edition) Engineering Technology, 2022 (9): 3.
[11] Wang Song, Zhao Ying. Brief analysis of computer network information security influencing factors and prevention strategies [J]. Electronic components and Information Technology, 2022 (10): 213-216.
[12] Hu Yuanyuan, Xiong Jiawei. Analysis of the influencing factors and preventive measures of computer network information security [J]. Network security Technology and Application, 2022 (4): 2.
Downloads: | 16265 |
---|---|
Visits: | 272495 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks