Analysis of Factors Influencing Computer Network Security Technology
DOI: 10.23977/jeis.2023.080301 | Downloads: 46 | Views: 1055
Author(s)
Guohui Zou 1
Affiliation(s)
1 Longnan Secondary Vocational School, Longnan, Ganzhou, Jiangxi, 341700, China
Corresponding Author
Guohui ZouABSTRACT
With the advent of the information age, the development of internet and computer technology has brought new opportunities and challenges to various industries, and has also changed people's lives. Whether it is the economy, politics, and culture, they have all become faster with the development of internet platforms, and the world has gradually become a whole, allowing people from all over the world to achieve real-time communication. Of course, with the development of the times, computer networks have gradually encountered some problems, which have been exploited by illegal elements, resulting in network crises and posing huge challenges to computer network security. Based on this, this article provides a detailed analysis of the influencing factors of computer network security technology, uncovers the existing problems, and explores corresponding development directions, providing certain countermeasures.[1]
KEYWORDS
Computer; Network security technology; influence factorCITE THIS PAPER
Guohui Zou, Analysis of Factors Influencing Computer Network Security Technology. Journal of Electronics and Information Science (2023) Vol. 8: 1-4. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2023.080301.
REFERENCES
[1] Chen Wenbing. Exploring the Application Strategies of Computer Information Management Technology in Maintaining Network Security [J]. Computer Knowledge and Technology: Academic Exchange, 2015, 0 (12X): 35-36
[2] Xu Hong, Mao Xiumei. From the construction of security measures for multimedia video on demand systems to discuss the current situation of network security and corresponding technologies [J]. China Management Informatization (Comprehensive Edition), 2005, 0 (A09): 72-74
[3] Cai Meng, Chen Zhizhong, Wang Jun. The application strategy of computer information management technology in maintaining network security [J]. Electronic Technology and Software Engineering, 2017, 0 (21): 190-190
[4] Sun Xueyang. Starting from me, starting from a young age, and becoming a diligent person - Reflections on Network Information Security [J]. Off campus education in China: mid-year, 2010 (6): 35-35
[5] Chen Hang. Discussion on the Practice of Network Security Construction in the Logistics Industry - Taking China Railway Express Co., Ltd. Shanghai Branch as an Example [J]. Information Technology and Informatization, 2018, 0 (2): 114-118
[6] Li Hongliang, Gai Xingjie, Li Lu. The influencing factors and preventive measures of computer network security technology [J]. Electronic Technology and Software Engineering, 2018, 0 (24): 188-188
Downloads: | 6471 |
---|---|
Visits: | 252226 |
Sponsors, Associates, and Links
-
Information Systems and Signal Processing Journal
-
Intelligent Robots and Systems
-
Journal of Image, Video and Signals
-
Transactions on Real-Time and Embedded Systems
-
Journal of Electromagnetic Interference and Compatibility
-
Acoustics, Speech and Signal Processing
-
Journal of Power Electronics, Machines and Drives
-
Journal of Electro Optics and Lasers
-
Journal of Integrated Circuits Design and Test
-
Journal of Ultrasonics
-
Antennas and Propagation
-
Optical Communications
-
Solid-State Circuits and Systems-on-a-Chip
-
Field-Programmable Gate Arrays
-
Vehicular Electronics and Safety
-
Optical Fiber Sensor and Communication
-
Journal of Low Power Electronics and Design
-
Infrared and Millimeter Wave
-
Detection Technology and Automation Equipment
-
Journal of Radio and Wireless
-
Journal of Microwave and Terahertz Engineering
-
Journal of Communication, Control and Computing
-
International Journal of Surveying and Mapping
-
Information Retrieval, Systems and Services
-
Journal of Biometrics, Identity and Security
-
Journal of Avionics, Radar and Sonar