A Study on Network Security Situation Evaluation Model

2014 ◽  
Vol 556-562 ◽  
pp. 5312-5315 ◽  
Author(s):  
Abasi

With the rapid development of computer technology and communication technology, user demand more and more and with the application of computer network becoming more and more widely, its scale is becoming increasingly big. But on the other hand, there are so many network security events and the traditional single defense equipment or testing equipment has been unable to meet the demand of security; computer network is faced with severe situation of the information security. Network security situation assessment technology can reflect on the whole dynamic network security situation, and give early warning to its development trend by comprehensively considering various security factors. Therefore, the network security situation assessment model and key technology has become the hot topic of research in the field of network security.

2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.


2010 ◽  
Vol 108-111 ◽  
pp. 168-171 ◽  
Author(s):  
Hong Yun Xu

With the rapid development of network technology, computer network applications in the financial system is becoming increasingly popular, the financial network security issues become increasingly prominent. This paper through the analysis of various risks faced by current financial networks, proposes the design principles of financial network security architecture and the design goals of financial network security architecture, finally gives the design patterns of financial network security architecture.


2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


2013 ◽  
Vol 756-759 ◽  
pp. 791-795
Author(s):  
Ling Jia

The rapid development of computer network technology and information technology, brings greatly facilitate and enrich people's lives for information transfer and fast access, improves work efficiency. At the same time, the network information security is followed. How to ensure the network information is transferred security, which is the problem that various network information systems must face, and also a difficult and hot issue to be researched. In this paper, a variety of effective network security technologies are studied and corresponding implementations are provided for the information network system in the university.


Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.


2016 ◽  
Vol 22 (10) ◽  
pp. 2865-2870
Author(s):  
Yu-Beng Leau ◽  
Selvakumar Manickam

Symmetry ◽  
2018 ◽  
Vol 10 (12) ◽  
pp. 747 ◽  
Author(s):  
Zhifang Liao ◽  
Libing Deng ◽  
Xiaoping Fan ◽  
Yan Zhang ◽  
Hui Liu ◽  
...  

The development of open source brings new thinking and production modes to software engineering and computer science, and establishes a software development method and ecological environment in which groups participate. Regardless of investors, developers, participants, and managers, they are most concerned about whether the Open Source Ecosystem can be sustainable to ensure that the ecosystem they choose will serve users for a long time. Moreover, the most important quality of the software ecosystem is sustainability, and it is also a research area in Symmetry. Therefore, it is significant to assess the sustainability of the Open Source Ecosystem. However, the current measurement of the sustainability of the Open Source Ecosystem lacks universal measurement indicators, as well as a method and a model. Therefore, this paper constructs an Evaluation Indicators System, which consists of three levels: The target level, the guideline level and the evaluation level, and takes openness, stability, activity, and extensibility as measurement indicators. On this basis, a weight calculation method, based on information contribution values and a Sustainability Assessment Model, is proposed. The models and methods are used to analyze the factors affecting the sustainability of Stack Overflow (SO) ecosystem. Through the analysis, we find that every indicator in the SO ecosystem is partaking in different development trends. The development trend of a single indicator does not represent the sustainable development trend of the whole ecosystem. It is necessary to consider all of the indicators to judge that ecosystem’s sustainability. The research on the sustainability of the Open Source Ecosystem is helpful for judging software health, measuring development efficiency and adjusting organizational structure. It also provides a reference for researchers who study the sustainability of software engineering.


2014 ◽  
Vol 971-973 ◽  
pp. 1440-1443 ◽  
Author(s):  
Yan Kun Zhang

Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.


2014 ◽  
Vol 687-691 ◽  
pp. 1720-1723
Author(s):  
Xu Wang

With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint library computer network construction greatest limiting factor. This paper describes the impact of the library computer network system security management of specific issues, according to the system requirements of practical application, in terms of the system operating environment, hardware systems, software systems, network systems and system data, such as design of the library computer network system security policy and implementation are discussed. Through the library computer network security threats faced by the system proposed safety management, regulations are important to ensure the development and implementation of computer network system security. Proposed library computer network system security management strategies, we hope to enhance the library computer network security have some help.


Sign in / Sign up

Export Citation Format

Share Document