scholarly journals Research on Computer Network Security Policy of Cloud Computing

2020 ◽  
Vol 1533 ◽  
pp. 032044
Author(s):  
XiaoJing Wang
2021 ◽  
Vol 2083 (4) ◽  
pp. 042084
Author(s):  
Xi Wang ◽  
Lei Shi

Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.


2014 ◽  
Vol 687-691 ◽  
pp. 1720-1723
Author(s):  
Xu Wang

With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint library computer network construction greatest limiting factor. This paper describes the impact of the library computer network system security management of specific issues, according to the system requirements of practical application, in terms of the system operating environment, hardware systems, software systems, network systems and system data, such as design of the library computer network system security policy and implementation are discussed. Through the library computer network security threats faced by the system proposed safety management, regulations are important to ensure the development and implementation of computer network system security. Proposed library computer network system security management strategies, we hope to enhance the library computer network security have some help.


2020 ◽  
Vol 2 (1) ◽  
pp. 1
Author(s):  
Zhi Li

<p>With the development of science and technology, the network in human society continues to be improved and enriched, as well as the ability of database technology, which is of super cloud computing ability and extensive data sharing and brings great convenience to the whole country. But at the same time, the data that is used improperly in the network environment not only poses a certain threat to the network system, but also gradually erodes people's lives. For the computer network security problems in the era of big data, this paper first analyzes the location of the problems, and then puts forward the means to solve and prevent the security problems.</p>


2020 ◽  
Vol 9 (6) ◽  
pp. 57
Author(s):  
Zhou Fan

Aiming at the computer network security issues in the cloud computing environment, this article outlines the great prospects of cloud computing technology and its significance, and respectively dissects the hidden dangers of computer network security problems under the use of cloud computing and the corresponding solutions. Computer network security issues in computing contribute to the smooth and long-term development of computer network security.


2021 ◽  
Vol 22 (2) ◽  
Author(s):  
Hongkai Lin ◽  
Feng Zhao ◽  
Lina Qin ◽  
Hongkai Lin

With the advancement in communication technology, computer network will become important for information exchange. However, the network has the potential therefore the strong security policy is needed for network security ensuring. To prevent the computer network from the virus invasion, the computer network security technology is ensured, having a clear network virus understanding. In this paper, the structural model of network security detection and monitoring system is established in a proactive way, the function of each component is described, and the design model is introduced to conduct comprehensive and effective automatic security detection on the client and each layer of the network, so as to find and avoid the system from being attacked.Result: The observed example shows that the flow rate of information in and out of the network is relatively stable, with few changes, and the rate of change is close to zero per unit time. In the case of network attack, the amount of data flowing into the target network is far more than the amount of data flowing out of the network.Computer security technology is used to improve the security of the network and prevent network virus from attacking the computer network.


Sign in / Sign up

Export Citation Format

Share Document