Study on the Host Security Protection in the Internet Environment

2014 ◽  
Vol 635-637 ◽  
pp. 1628-1631
Author(s):  
Li Juan Zhuang

In the context of the rapid development of Internet technology, information security is particularly important, especially at present there is growing incidence of attack targeting at the host and a variety of attacking means, which does a lot of harm. To do preventive work well is to figure out what risks threatening the host and formulate timely and effective measures to protect the host.The first computer in the world came out in 1946 in the USA. With the birth of this computer, the computer technology of humankind has made spectacular development for more than the last half century and penetrated into all aspects of our lives till today. Compared with traditional means of communication, the Internet has greatly facilitated our lives, which led to the growing dependence on the Internet as well. While technology is a double-edged sword, the Internet information security is also very acute problem, which greatly troubles people’s work and life. As the most fundamental part of a computer system, the host security problem draws people’s attention in particular.

2016 ◽  
Vol 11 (3) ◽  
pp. 163
Author(s):  
Muhamad Abu-Jalil ◽  
Ashraf Aaqoulah

This study aimed to identify the role of Internet technology in transforming the role of its users to promoters of medical products in Jordan. The study found that there are statistically significant effects of independent variables (multipurpose and advanced Internet programs, reduced costs of the use of Internet programs, collective and interactive communication via the Internet, and Internet information abundance and variety of its resources) on the dependent factor, which is transformation of the role of Internet users to promoters of medical products in Jordan. The study recommended increasing attention on networks to promote medical products in Jordan. This is consistent with the fact that promotion via networks has become an effective way to support and enhance the image of products and its delivery to the target group in all markets around the world.


2020 ◽  
Author(s):  
Syufrijal .

This research aims to develop interactive PLC learning media based on virtual learning. The interactive PLC learning media uses a 3D simulator design to simulate the application of PLC in the industry, so it looks like real and makes students more interested in learning PLC This study uses experimental methods. The 3D simulation software is Factory I/O developed by Real Games. It enables us to build a conveyor virtual plant and to bring it into the classroom. The automatic controller used to control the virtual plant is the PLC Siemens S7-1200 with Tia Portal software. The PLC is connected to the computer server through an ethernet network via TCP/IP protocol. With the rapid development of current internet technology, PLC learning can be done in virtual learning. This PLC learning media can be run remotely through the internet with team viewer program so that PLC learning is not only done on campus but can be done anywhere. From the results of research that has been done, the user can create PLC programs remotely to control conveyor virtual plant on a computer server through an internet network without having to install the program on their computers. Keywords: PLC, interactive learning media, virtual learning, remote desktop


Author(s):  
Sergey Volodenkov

Introduction. The author aims to analyze the phenomenon of information interference with national political processes in the conditions of the contemporary information society and the evolution of the Internet as a space of political communications. The article shows that the digital information intervention is relevant and at the same time, a complex multidimensional phenomenon of contemporary politics. In many respects, the potential of the digital interference phenomenon is closely related to the essential features of functioning and the transformation of the contemporary Internet, which has been actively used when changing political regimes in many countries. The problem of information security and sovereignty of the present state on the Internet is becoming one of the most urgent in the conditions of the rapid development of information and communication technologies. Methods and materials. The issues identified in the article are investigated using the methods of comparative, structural-functional and normative analysis, included observation, as well as the case-study method. The method of scientific forecasting and scripting techniques has allowed to form a scenario for the effective settlement of international conflicts in the field of information security. The empirical base of the study is reports of foreign experts, official materials of state authorities of the Russian Federation and foreign countries, reports of Freedom House international organization, official speeches and statements by the heads of state on the issues outlined in the work. Analysis. Countering external information expansion is becoming one of the most critical tasks of effective political governance at the state level to preserve the sovereignty of the national political communication space, including domestic segments of the Internet. The initiatives of states to form the sovereign national segments of the Internet space are, on the one hand, an attempt to protect their political systems from external influence and invasion, to ensure their own political stability, and on the other hand, they create risks for the democratic potential of the Internet. The article substantiates the thesis that the phenomenon of interference in elections in actual practice often becomes not so much an objective process as an instrument of information warfare, mass political propaganda and discrediting political opponents, a manipulative tool that can be actively used not only by authoritarian regimes with a low level of democratic development. Results. The study shows that differences in understanding and defining the essence of the Internet by various countries give rise to a significant potential for political conflicts on a global scale. This circumstance leads the author to the conclusion that it is necessary to form international institutions capable of preventing and regulating information conflicts in the Internet space, as well as reducing global political risks (including risks associated with potential interference in the electoral process of sovereign states). The implementation of this scenario will allow forming a collective responsibility in the functioning of the global Internet.


Author(s):  
Hüseyin Tolu

Racism is one of the oldest, most oppressive issues along with other extreme forms of social communications. Nevertheless, the internet has already led to the opportunity of cyber-racism that occurs more surreptitiously and aggressively than before. This study commences by unravelling the abstractions of conventional-racism and cyber-racism, and it introduces the global stakeholders' approaches and counter measures, in particular the EU and the USA and their regulated and non-regulated practices to combat cyber-racism. This paper shall then bring forward informative argumentations on how the stakeholders' perspectives on cyber-racism can be scrutinised by focusing on both values of being human (individualism) and a reconciled global-society (cosmopolitanism) towards contemporary debates in the sociology of education and technology. In this conceptual thinking, even though hate-mongers are using internet technology to spread their hatred what is the acceptable action for us to do in the subject of internet governance?


Author(s):  
Hüseyin Tolu

Racism is one of the oldest, most oppressive issues along with other extreme forms of social communications. Nevertheless, the internet has already led to the opportunity of cyber-racism that occurs more surreptitiously and aggressively than before. This study commences by unravelling the abstractions of conventional-racism and cyber-racism, and it introduces the global stakeholders' approaches and counter measures, in particular the EU and the USA and their regulated and non-regulated practices to combat cyber-racism. This paper shall then bring forward informative argumentations on how the stakeholders' perspectives on cyber-racism can be scrutinised by focusing on both values of being human (individualism) and a reconciled global-society (cosmopolitanism) towards contemporary debates in the sociology of education and technology. In this conceptual thinking, even though hate-mongers are using internet technology to spread their hatred what is the acceptable action for us to do in the subject of internet governance?


2014 ◽  
Vol 608-609 ◽  
pp. 317-320
Author(s):  
Wei Wei Duan ◽  
Da Mai Zhou

For the rapid development of the Internet in Chinese rural areas and the status of not high agricultural informationization level, this paper adopts sample investigation method, making clear the reasons of low application efficiency of Internet technology in agricultural production operation. The reason of agricultural informationization backward is that rural people have obvious difference in age, gender and education group structure aspect. Insufficient understanding of Internet information resource, the lack of application technology and traditional information habits are the restricting factors of influencing network application in agricultural production.


2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


2019 ◽  
Vol 5 (1) ◽  
pp. 63-81 ◽  
Author(s):  
Ria Nur Rizqiah ◽  
Ahmad Tarmizi Lubis

Along with the rapid development of internet technology today, the company's financial reporting activities can be done via the Internet in real time in an easy way and a wider scope. Internet-based financial reporting is commonly known as the Internet Financial Reporting (IFR). This research is a descriptive study that aims to determine the implementation of IFR on Islamic Banks in Indonesia. The variables in this study consisted of content, presentation and timeliness variable with a total of 112 items tested indicators. The results of this study indicate that the eleventh BUS sampled research has been able to apply IFR. IFR score obtained by each BUS has a nearly equal value ranging from 49% to 63% with the total maximum score of 100% and average score of 55%


2020 ◽  
Vol 4 (2) ◽  
pp. 8
Author(s):  
Xiang Anqi

With the rapid development of Internet technology, the Internet economy has gradually penetrated into every aspect of people’s life. The group of high school students has increasingly become an important part of the Internet consumption market, and its consumption concept is also deeply influenced by the Internet economy. Based on the analysis of the development status of the Internet economy and the characteristics of high school students’ consumption concepts, this article analyzes the double impact of the Internet economy on high school students’ consumption concepts. On this basis, it expounds how to guide high school students to form the correct consumption concepts under the Internet economy from the three dimensions of school, family and individual.


2015 ◽  
Vol 12 (2) ◽  
pp. 235
Author(s):  
Deniz Yüncü ◽  
Hilmi Rafet Yüncü

<p>Complaint is defined as an act of reflecting a dissatisfying situation to other side. Consumers act differently while they are expressing their dissatisfaction. Consumer complaints constitute an important feedback mechanism for companies. Thanks to these feedbacks, the firms get a chance to correct the mistake in the process of production and to produce a more satisfying product. Consumers express their complaints about the dissatisfying processes through feedback to the firm, expressing them to their friends, or resentment. With the developments in the Internet technology, it is seen that complaints have become widespread. Consumers let more people know about their complaints by expressing them in the internet environment. Therefore, the firms should attach importance to e-complaints and tolerate the dissatisfaction of their consumers. Although there are some studies about consumer complaints in the tourism area, there are not any studies about fast-food agencies. For this reason, it is aimed to categorize the fast-food agencies in www.sikayetvar.com.</p>


Sign in / Sign up

Export Citation Format

Share Document