Analysis of Computer Network Security Problems and Countermeasures



Yüklə 1,97 Mb.
Pdf görüntüsü
səhifə1/5
tarix19.05.2023
ölçüsü1,97 Mb.
#117002
  1   2   3   4   5


Analysis of Computer Network Security Problems and Countermeasures 
Feng
Jiangxi Technical College of Manufacturing,Nanchang,330095 
Keywords: Computer network; Network security; Network attack; Counter measures 
Abstract. With the continuous advanced of the information, digital and network society, the 
computer network has gradually become an indispensable aid in people’s modern life, and security 
of computer network is becoming increasingly important. The development of computer network 
technology not only brings great convenience to people’s life today, but it is also difficult to avoid a 
series of security risks. If the security risks are dealt with in a timely manner, it is bound to lead to 
the emergence of computer application barriers. Thus it can be seen that it is of great practical 
significance to study the status quo of computer network security and develop effective strategies.
Introduction 
With the development of information technology, the application of computer network is becoming 
more and more extensive, and the security problems are receiving more and more attention. 
Whether it is at government sectors, schools and companies, there are sensitive data within the 
system that need to be protected. And the computer network has the form of connection diversity, 
terminal distribution inhomogeneity and network interconnection, openness and other 
characteristics, so that the network vulnerable to hackers, malicious software attacks, so the security 
and confidentiality of network information is a very important of the subject. Therefore, to ensure 
the integrity of network information, availability and confidentiality, network security measures 
must be able to respond to their own vulnerability and a variety of network threats. This paper starts 
from the security of computer network, and discusses the security of computer network. This paper 
analyzes the common attack methods such as virus attack, system vulnerability attack, spoofing 
attack and hacker attack, and discusses the access control strategy, information encryption strategy, 
virus attack coping strategy, system vulnerability attack strategy, hacker attack coping strategy. And 
the conventional cryptographic algorithm and public key cryptography algorithm are analyzed.

Yüklə 1,97 Mb.

Dostları ilə paylaş:
  1   2   3   4   5




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin