Visualization Research of Internet Information Security in China in Recent 20 Years

Author(s):  
Chunlei Liu ◽  
Mi Shi
2014 ◽  
Vol 635-637 ◽  
pp. 1628-1631
Author(s):  
Li Juan Zhuang

In the context of the rapid development of Internet technology, information security is particularly important, especially at present there is growing incidence of attack targeting at the host and a variety of attacking means, which does a lot of harm. To do preventive work well is to figure out what risks threatening the host and formulate timely and effective measures to protect the host.The first computer in the world came out in 1946 in the USA. With the birth of this computer, the computer technology of humankind has made spectacular development for more than the last half century and penetrated into all aspects of our lives till today. Compared with traditional means of communication, the Internet has greatly facilitated our lives, which led to the growing dependence on the Internet as well. While technology is a double-edged sword, the Internet information security is also very acute problem, which greatly troubles people’s work and life. As the most fundamental part of a computer system, the host security problem draws people’s attention in particular.


2020 ◽  
Vol 218 ◽  
pp. 04008
Author(s):  
Yang Shen

In the era of big data, due to the great influence of big data itself, Internet information security has also become the focus of attention. In order to avoid disturbing people’s lives, this article summarizes the opportunities and challenges in the era of big data based on previous work experience. This article analyzes and studies five aspects including establishing complete laws and regulations, protecting personal information, applying big data technology to public security systems, doing a good job in data management and classification, and ensuring the security of data transmission. The author discusses specific measures for the maintenance of Internet information security in the era of big data from the above five aspects.


2018 ◽  
Vol 228 ◽  
pp. 02010
Author(s):  
Xinde Song

The large-scale development and utilization of renewable energy has become a major trend in the development of the global energy sector. Compared with traditional power grids, energy Internet information security has many features and complex technologies, and the hidden dangers of information security risks are more prominent. In the face of various cyber threats, effective measures must be taken to ensure the safe operation of the power information network. This paper introduces the relationship between energy Internet and smart grid, sorts out the current new technology of energy Internet application, analyzes the risks it faces, and designs the security architecture of energy Internet information communication system.


2017 ◽  
Vol 2 (4) ◽  
Author(s):  
Chu Ba Quyet ◽  
Hoang Cao Cuong

E-Commerce is the purchase and sale of goods, services and exchange of information based on communications networks and the Internet. Information, information systems, computers, computer networks, and other electronic means play an especially important role. These objects are valuable assets and targeted attacks by cybercriminals. E-commerce risk management is to protect the development of e-commerce. It includes setting information security objectives, assessing vulnerabilities, threats and attacks, and selecting countermeasures. The paper presents the theory of e-commerce risk management, analysing the Vietnam Airlines e-commerce risk management case, using the DREAD model. The paper provides the discussions and short recommendations to other enterprises in e-commerce risk management nowadays.


2018 ◽  
Vol 3 (2) ◽  
pp. 248
Author(s):  
Azernikov A. D. ◽  
Norkina A. N. ◽  
Myseva E. R. ◽  
Chicherov K. A.

So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space.


2021 ◽  
Vol 2068 (1) ◽  
pp. 012013
Author(s):  
Yuanyuan Chen ◽  
Jing Chen ◽  
Mingzhu Li

Abstract With the development of digital technology, Computer technology, communication technology and multimedia technology gradually infiltrate into each other and become the main core of information technology. In information technology, digital, text, graphics, images, sound, video, animation and other information carriers are spread through computers and the Internet. Due to the openness, sharing, dynamic and other characteristics of the Internet, information security is threatened and interfered. Information security has become a strategic issue that people must pay attention to, which is related to social stability, economic development and national security. This paper studies a new kind of virtual track cryptography, which breaks through the traditional character memory method and transforms it into memory graphics by using mathematical modeling, and changes the surface memory method from memorizing numbers and characters to memorizing trajectory graphics, so as to make the traditional process of people memorizing passwords easier.


Author(s):  
O. Dvoryankin

The article is about new information technologies of the Internet, such as anonymizers, intranet, extranet, proxy servers and overlay networks in particular. Their features, types, characteristics, positive and negative sides are also presented. Special attention is paid to personal information security. 


2008 ◽  
pp. 3542-3549
Author(s):  
Paul Benjamin Lowry ◽  
Jackson Stephens ◽  
Aaron Moyes ◽  
Sean Wilson ◽  
Mark Mitchell

The need for increased security management in organizations has never been greater. With increasing globalization and the spread of the Internet, information-technology (IT) related risks have multiplied, including identity theft, fraudulent transactions, privacy violations, lack of authentication, redirection and spoofing, data sniffing and interception, false identities, and fraud.


Sign in / Sign up

Export Citation Format

Share Document