Research on Security Management of Library Computer Network System

2014 ◽  
Vol 687-691 ◽  
pp. 1720-1723
Author(s):  
Xu Wang

With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint library computer network construction greatest limiting factor. This paper describes the impact of the library computer network system security management of specific issues, according to the system requirements of practical application, in terms of the system operating environment, hardware systems, software systems, network systems and system data, such as design of the library computer network system security policy and implementation are discussed. Through the library computer network security threats faced by the system proposed safety management, regulations are important to ensure the development and implementation of computer network system security. Proposed library computer network system security management strategies, we hope to enhance the library computer network security have some help.

2014 ◽  
Vol 687-691 ◽  
pp. 2007-2010
Author(s):  
Xiao Ru Sun

With the rapid development and application of the computer network technology, computer network system has brought many unsafe hidden dangers to the user. The computer network security has got more and more attentions of people. Therefore, this paper analyzes the main problems in computer network security and proposes some effective preventive measures. The author hopes these will help the computer network plays better role for people.


2021 ◽  
Vol 14 (2) ◽  
pp. 268-277
Author(s):  
Etza nofarita

Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware that attacks, causing bandwidth hit continuously. Network security is a factor that must be maintained and considered in an information system. Ddos forms are Ping of Death, flooding, Remote controled attack, UDP flood, and Smurf Attack. The goal is to use DDOS to protect or prevent system threats and improve damaged systems. Computer network security is very important in maintaining the security of data in the form of small data or large data used by the user.


2011 ◽  
Vol 219-220 ◽  
pp. 1305-1308
Author(s):  
Ya Hui Dong ◽  
Wei Li ◽  
Xu Wen Guo

Currently, the issue of computer network security becomes more and more serious. This thesis takes the main factors that affect the computer network security as the breakthrough, and pays attention to the analysis and prevention of various measures that are not conducive to the normal operation of computer network. It also fully discusses the situations that affect the computer network security from different perspectives in order to take preventive measures, remove adverse factors in the embryonic stage and ensure the security management and effective operation of computer network. This thesis proposes solutions from seven aspects, namely security and encryption technology, firewall technology, network address translator technology, security kernel technology of operating system, technology of anti virus in computer network, network backup system and security management.


2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


Author(s):  
Irawan Dwi Wahyono ◽  
Djoko Saryono ◽  
Khoirudin Asfani ◽  
Muhammad Ashar ◽  
Sunarti Sunarti

Computer network security has become an important issue in recent decades, the government and several international organizations have invested in professional education and training for computer network security. In addition, with the increasing incidence of computer network security crimes, the government and several organizations have taken precautions by providing training to students about computer network security. Some parties develop learning models that are suitable for students and find appropriate learning methods to produce professionals in the field of computer network security that is more effective. The purpose of this study is to design a framework-based Learning system in the form of an Adaptive Online Open Course in Computer System Security Subjects for Information Technology (IT) students. The benefits of this framework are to enhance students' skills and abilities in industrial-based computer network security, startup companies and the ability to complete CTF competitions in IT network security. The framework designed is Adaptive in which students learn according to the interests and topics of Computer Network Security. Interest-based on students in completing the pretest per topic. Testing in this study is testing the impact and improvement of students' learning abilities and skills on Computer Security and Security System Competence testing in a small group consisting of 20 students by seeing the success of completing 3 CTF Topics with each topic totaling 100 computer network security problems in the CTF competition, the average validation result was 83.01% and the CTF exam passing rate was 93%


2014 ◽  
Vol 971-973 ◽  
pp. 1440-1443 ◽  
Author(s):  
Yan Kun Zhang

Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.


CONVERTER ◽  
2021 ◽  
pp. 590-597
Author(s):  
Zhao Yonggang

In the process of using the computer network, the main page is hacked, the virus overflows, the information is stolen and so on, which brings the inestimable loss to the security of the campus network. Therefore, how to improve the security of campus computer network has become a common concern. This paper discusses the importance of network security in Colleges and universities, and points out the factors that threaten the network security in Colleges and universities. Based on the analysis of the security problems existing in the computer network system and the current situation of network security management in Colleges and universities, this paper puts forward some measures to strengthen the computer network security management in Colleges and universities. This paper studies and designs a set of computer intranet terminal security management system which is suitable for the characteristics of colleges and universities, including domain management subsystem, patch management subsystem, access control subsystem and platform monitoring subsystem. This paper makes a comprehensive analysis of the functions of each subsystem, and introduces the corresponding management processes and strategies. This paper describes the relationship between the subsystems and analyzes the interface between the architecture and other application systems.


2018 ◽  
Vol 10 (3) ◽  
pp. 11-25
Author(s):  
Rizki Nurdin

With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security


Sign in / Sign up

Export Citation Format

Share Document