Research and Design on the Comprehensive Experimental of Network Security Technology Course

Author(s):  
Lili Yan ◽  
Shibin Zhang ◽  
Yan Chang
2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


Cyber Crime ◽  
2013 ◽  
pp. 417-429
Author(s):  
Göran Pulkkis ◽  
Kaj J. Grahn ◽  
Peik Åström


2018 ◽  
Vol 246 ◽  
pp. 03016
Author(s):  
Aidong Xu ◽  
Kai Fan ◽  
Hang Yang

With the rapid development of information technology construction in the power industry, research on network security has become a problem that cannot be ignored. This paper introduces the use of information communication network equipment at home and abroad in power system; analyzes the security risks of foreign network equipment in power system, shows the risk of power system network and the urgent need for localization of network equipment and analyzes the security of internal network of power system Risks; specific measures for the safety control of network equipment in the whole process are proposed to provide reference for power system network security protection.


Sign in / Sign up

Export Citation Format

Share Document