Research on Computer Wireless Network and Information Security

2013 ◽  
Vol 416-417 ◽  
pp. 1450-1453
Author(s):  
Wen Zhan Guo

with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.

2014 ◽  
Vol 484-485 ◽  
pp. 493-496 ◽  
Author(s):  
Xin Ju Mo

with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.


2014 ◽  
Vol 539 ◽  
pp. 317-320
Author(s):  
Xiang Xin

With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance.


Author(s):  
Pamela R. McCauley-Bell ◽  
Lesia L. Crumpton

The information technology field has been increasingly plagued by threats to the security of information systems, networks, and communication media. The solutions to these problems have primarily focused on the techniques to more closely safeguard networks (i.e. firewalls) with similar efforts being put into assessing the vulnerabilities of the hardware and software aspects of the systems. With the exception of discussions into more creative password selection, discussion pertaining to the role of the user, can play in reducing the risk of human error and thus promoting system security has been extremely limited. This lecture will present an overview of information security issues impacted by human interaction that may or may not play a role in promoting system security. Understanding that information systems are in fact composed of hardware and software components which must be addressed using traditional information security protocol, this lecture will provide an understanding of the possible risk that the human/user poses to an information system. Once the risks or factors associated with the human in the security of the system are identified, the next question is do the factors matter? The objective of this lecture is to present an intellectual discussion of human factors issues and their impact on information security. This is an important discussion topic that the information technology field can not afford to ignore.


2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


2021 ◽  
Vol 7 (5) ◽  
pp. 1036-1048
Author(s):  
Jun Li ◽  
Kai Zou ◽  
Shang Xiang ◽  
Zhen Wan ◽  
Lining Xing

With the rapid development of technologies, such as big data, artificial intelligence, and cloud computing, the work cooperation among cities and the resources involved in business exchanges are deeply complementary. At the same time, information security has become one of the challenges for smart cities, which is ubiquitous and easy to cause public security issues. For this reason, this research modeled the actual problems and then made decisions on resource allocation by considering full cooperation and non-cooperation situations. Their influence with respect to city size, probability of intrusion by illegal users, and propagation probability of one-time intrusion were analyzed. Based on these foundation works, this research proposed incentive mechanisms to ensure the optimized information security for smart cities. These mechanisms ensure that cities not only voluntarily increase the intensity of resource allocation to information security, but also make the co-operation in line with the reality. Therefore, this balances the advantages and disadvantages of non-cooperation and full cooperation, so as to ensure that the information security level of urban agglomerations reaches the optimal state.


2014 ◽  
Vol 1079-1080 ◽  
pp. 598-600
Author(s):  
Ying Zhao

With the rapid development of computer networks and the Internet, while promoting the development of all aspects, the Internet also brings some trouble. The text starts from the Local Area Network information security status, analyzes problems in LAN information security management, puts forward maintenance and virus prevention strategies for LAN security.


2021 ◽  
Vol 8 (1) ◽  
pp. 37-44
Author(s):  
Eduard B. Khatov

The article is devoted to the perspectives of digital technologies in crime analysis. According to the author, the key role of such analysis performed by prosecutors is played by artificial intelligence technologies, extra-big data, and electronic voice assistants. The need for their implementation, appropriate material and technical support, solutions for information security issues, as well as the training of prosecutors in the use of digital technologies, including the basics of programming and visualization of big data, were emphasized.


2021 ◽  
Vol 1047 (1) ◽  
pp. 012117
Author(s):  
E A Lavrov ◽  
A L Zolkin ◽  
T G Aygumov ◽  
M S Chistyakov ◽  
I V Akhmetov

2021 ◽  
Vol 18 (6) ◽  
pp. 7955-7964
Author(s):  
Xiang Nan ◽  
◽  
Kayo kanato

<abstract> <p>With the rapid development of tourism and the Internet industry, tourism activities have increasingly become a fashion behavior of people. The role of intelligent tourism resources in tourism activities has gradually become prominent. In order to meet the needs of all kinds of users, the tourism management system services are developing in the direction of diversification and individualization, and recommending the tourism resource products that best meet the needs of users to users has become a top priority. This article aims to improve the practical value of the system through the intelligent functions of the tourism management system based on information security in the intelligent recommendation of tourism resources. The tourism management system can display the received information about tourists. Through the experimental research of the accompanying information security algorithm and the analysis of the recommendation of the tourism system, the intelligent functions of the tourism management system based on information security can be captured in the intelligent recommendation of tourism resources. Develop the tourism management system to solve efficiency problems and realize tourism management information. Experimental results show that based on information security, 80% of tourists have become a popular choice for smart recommendation countries, which will bring more convenience to tourists during the game.</p> </abstract>


Sign in / Sign up

Export Citation Format

Share Document