Design of Computer Information Network Security System

2014 ◽  
Vol 539 ◽  
pp. 305-309
Author(s):  
Li Na Dong

With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.

2018 ◽  
Vol 232 ◽  
pp. 01001
Author(s):  
Jianyun Chen ◽  
Chunyan Li

In this paper, the concept of VPN and the security technology are studied. In combination with the characteristics of the network, the security technology of the remote access VPN server and the client is discussed, the VPN security system of the meteorological special network is designed, and the VPN network security system of the meteorological network is realized.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2013 ◽  
Vol 756-759 ◽  
pp. 791-795
Author(s):  
Ling Jia

The rapid development of computer network technology and information technology, brings greatly facilitate and enrich people's lives for information transfer and fast access, improves work efficiency. At the same time, the network information security is followed. How to ensure the network information is transferred security, which is the problem that various network information systems must face, and also a difficult and hot issue to be researched. In this paper, a variety of effective network security technologies are studied and corresponding implementations are provided for the information network system in the university.


2014 ◽  
Vol 971-973 ◽  
pp. 1440-1443 ◽  
Author(s):  
Yan Kun Zhang

Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.


2013 ◽  
Vol 718-720 ◽  
pp. 1986-1991
Author(s):  
Zhong Xia Hu

The e-commerce transaction security is the security of business activities in the public network, and its essence is based on computer network security, protect the business process to precede smoothly, the core content of the e-commerce information security. IPv6 network layer denial of service attacks, the fight against replay attacks, prevent data passive or active eavesdropping, to prevent data session stealing attacks and other functions, which greatly enhances the security of the network can be realized. The paper presents using IPv6 technology to construct network security system of electronic commerce. Experimental results show that the proposed method has high efficiency.


2014 ◽  
Vol 1044-1045 ◽  
pp. 1298-1301
Author(s):  
Qian Wu

Early network development, people more emphasis on network convenience and availability, and ignore the security of the network. With the development of computer network technology, when people run in the network critical business such as banking, when government activity is increasingly networked, computer network security has become a problem that not allows to ignore. In this paper, the existing network security technology to prevent the analysis and comparison, especially to strengthen security measures should be taken in order to do a more in-depth discussion, and describes the future development trend of this research field.


2021 ◽  
Vol 2143 (1) ◽  
pp. 012019
Author(s):  
Qi Gao ◽  
Jinniu Bai

Abstract With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, there are many kinds of technologies to maintain network information security. Such as firewalls, anti-virus software technology, file encryption and digital signature technology. This paper describes the vulnerability of network security and the importance of maintaining its security, mainly study the role of Java in computer network security technology and its application in which, finally based on Java network security technology and some other comparison, draw its advantages.


2014 ◽  
Vol 977 ◽  
pp. 507-510
Author(s):  
Wei Wei Yao ◽  
Liang Gong ◽  
Xia Xu

Optimization of computer network security technology shift in the relationship is constantly updated. Any computer network security solutions can not be designed once and for all. How seamless integration of network security technology and network security management together to make the network security implementation strategy is very important, this paper proposes a reasonable solution to improve overall network design and optimization of the security system, to develop scientific, reliable, dynamic network security optimization design, the design of enterprise network security solutions, combined with the current firewall, intrusion detection / intrusion prevention technology, VPN technology to achieve rapid escalation of the enterprise information construction in the network security system, thus the basic realization of computer network security optimization design goal.


Sign in / Sign up

Export Citation Format

Share Document