scholarly journals Security Management Measures for Library Computer Network

2019 ◽  
Vol 3 (4) ◽  
Author(s):  
Jie Li

Informationization and automation are important in library management due to the development of computer technology and network technology. Although computer networks bring great convenience and improvement to library management’s efficiency and quality, there are many security issues that could tag along with networks. The library information is prone to leak due to virus and hackers as well as the transparency of the network. Thus, this leads to a high security risk in library management. Therefore, this paper mainly analyses the security management strategies of library computer networks.

2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Long Chen

With the development of society, we have entered the information age.Computer network technology is widely used in people’s life and production, and has played an important role in promoting social progress. However, due to its own nature and characteristics, some security risks have appeared in the process of application in the development of computer network technology, which interferes with the safe use of computer networks. This article combines the information security risk of computer network, making an analysis of the information security architecture of computer network based on WPDRRC model, and the strategy of how to prevent computer network security risk.


2010 ◽  
Vol 108-111 ◽  
pp. 168-171 ◽  
Author(s):  
Hong Yun Xu

With the rapid development of network technology, computer network applications in the financial system is becoming increasingly popular, the financial network security issues become increasingly prominent. This paper through the analysis of various risks faced by current financial networks, proposes the design principles of financial network security architecture and the design goals of financial network security architecture, finally gives the design patterns of financial network security architecture.


2014 ◽  
Vol 513-517 ◽  
pp. 2182-2185
Author(s):  
Yi Jun Bai

With the general progress of information technology, the computer & network technology are generally applied in the tax system of which it will make more rooms for the tax administration and services in implementing the electronization, networking, transparency and efficiency developments. Meanwhile, the computer & network security issues become more prominent and significant in the e-tax system. In the paper, the author puts forward the corresponding solutions and measures by analyzing the network risks of the e-tax applications from the technical and management points.


Author(s):  
Siti Aisyah

Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.


2014 ◽  
Vol 1030-1032 ◽  
pp. 1657-1659
Author(s):  
Qing Chao Jiang

With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually extend to the use of radio. Although it brought a lot of convenience to people's lives, wireless LAN security problems also frequently occurred. This paper mainly aims to analyze the security risk and at the same time offer some preventive measures.


2018 ◽  
Vol 2 (5) ◽  
Author(s):  
Yuantian Zhang ◽  
Wei Yang ◽  
Zhongxi Zhang

Abstract: In the context of the information age, on the basis of the convenience of computer networks, security issues have gradually emerged. The data encryption technology is reasonably applied in the process of computer network security practice, which promotes the safe and reliable operation of the computer network to a certain extent. Based on this, our article regards data encryption technology as the main research object, focusing on its specific application in computer network security.


2015 ◽  
Vol 9 (1) ◽  
pp. 974-978
Author(s):  
Chenhao Guo ◽  
Yapeng Yan ◽  
Tiansong Wang

With the rapid development of the economy in China and the speeding up of urbanization, urban roads and highways in China continue to increase. However, due to some of the characteristics of road construction, long duration, high fluidity, large volume of work and complex process, there exist many security problems during the period of construction, which determines that security management is unoptimistic on construction site. This paper makes a comprehensive research over the achievements of domestic and foreign experts and analyzes the causes of the security incidents in domestic road construction, so as to further clarify that the deep reasons for the security incidents in management. Based on this, the author advances the corresponding security management measures. With comprehensive evaluation methods applied on road construction site, the security situation can be predicted and prevented whenever and wherever possible.


Author(s):  
Andre M. R. Wajong

The rapid development of computer technology allows ease of access, yet lurking threats. Security in computer networks are categorized into two, namely the physical and non physical security. Physical security is a security that is more likely to focus to all things physical. This type of security can be avoided by more careful guarding of the thieves’ threats by putting in locked places and so on. As with the non-physical security, the more important issue involved is such as data security where its physical value may be less important. Therefore, this article discussed the safety factor especially on a computer network, vulnerable points on the computer network, techniques often used on attacks and some things you can do to ward off them.


Author(s):  
H. Gunes Kayacik

Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 1995, 171 vulnerabilities were reported to CERT/CC © while in 2003, there were 3,784 reported vulnerabilities, increasing to 8,064 in 2006 (CERT/CC©, 2006). Operations, which are primarily designed to protect the availability, confidentiality, and integrity of critical network information systems are considered to be within the scope of security management. Security management operations protect computer networks against denial-of-service attacks, unauthorized disclosure of information, and the modification or destruction of data. Moreover, the automated detection and immediate reporting of these events are required in order to provide the basis for a timely response to attacks (Bass, 2000). Security management plays an important, albeit often neglected, role in network management tasks. Defensive operations can be categorized in two groups: static and dynamic. Static defense mechanisms are analogous to the fences around the premises of a building. In other words, static defensive operations are intended to provide barriers to attacks. Keeping operating systems and other software up-to-date and deploying firewalls at entry points are examples of static defense solutions. Frequent software updates can remove the software vulnerabilities, which are susceptible to exploits. Firewalls provide access control at the entry point; they therefore function in much the same way as a physical gate on a house. In other words, the objective of a firewall is to keep intruders out rather than catching them. Static defense mechanisms are the first line of defense, they are relatively easy to deploy and provide significant defense improvement compared to the initial unguarded state of the computer network. Moreover, they act as the foundation for more sophisticated defense mechanisms. No system is totally foolproof. It is safe to assume that intruders are always one step ahead in finding security holes in current systems. This calls attention to the need for dynamic defenses. Dynamic defense mechanisms are analogous to burglar alarms, which monitor the premises to find evidence of break-ins. Built upon static defense mechanisms, dynamic defense operations aim to catch the attacks and log information about the incidents such as source and nature of the attack. Therefore, dynamic defense operations accompany the static defense operations to provide comprehensive information about the state of the computer networks and connected systems.


2015 ◽  
pp. 2149-2164
Author(s):  
Joseph M. Kizza ◽  
Li Yang

Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the case, one can say that it is a continuous evolution of a computer network technology. It extends client-server technology that offers scalability, better utilization of hardware, on-demand applications and storage, and lower costs over the long run. It is done through the creation of virtual servers cloned from existing instances. The cloud technology seems to be in flux; hence, it may be one of the foundations of the next generation of computing. A grid of a few cloud infrastructures may provide computing for millions of users. Cloud computing technology consists of and rests on a number of sound, fundamental, and proven technologies. This includes virtualization, service-oriented architectures, distributed computing, and grid computing. Based on these fundamental and sound computing principles, one wonders whether cloud computing is the next trajectory of computing. This chapter discusses this in depth and also looks at the security issues involved.


Sign in / Sign up

Export Citation Format

Share Document