Security Management. In
the network system, there is no absolute reliability and security.
Therefore, to develop a sound management system is a key premise to guarantee the network
security. Only when users and managers work together and sue all the available network security
technologies and tools can it be possible to effectively control the network security and prevent
invasion of viruses and hackers.
Conclusion
With the
development of the Internet, the computer network security is becoming increasingly
important. Because of the openness of the computer network, the network is vulnerable to various
attacks and destruction. Whether in the local area network or the wide area network, there are
natural and man-made and many other factors to form the potential security threats. When we use
the network, we should pay particular importance
to the network security issues, from their own
start, standardize the Internet behavior, not free access to unknown sites,
the establishment of
network rules and regulations, so that the entire network to a safe and stable environment. In short,
network security is a big system engineering. Due to the sharing of the network and the security
defects of the communication, the data information transmitted on the Internet is easy to leak and be
destroyed, the network is very serious security attack, so the establishment of a more effective
network security system is even more urgent.
References
[1] Wang Z. Design and realization of computer network security perception control system[C]//
IEEE, International Conference on Communication Software and Networks. IEEE,
2015:163-166.
[2] Guo J C, Fan D, Che H Y, et al. An approach to network security
evaluation of computer
network information system with triangular fuzzy information[J]. Journal of Intelligent & Fuzzy
Systems, 2015, 28(5):2029-2035.
[3] Shao K N. Research on Data Encryption Technology in Computer Network Communication
Security[J]. Information Security & Technology, 2016.
[4] Liu Z, Amp S V. Computer network information security and protection strategy[J]. Electronic
Test, 2016.
[5] Sun Y. Study on computer network security evaluation based on support vector regression
machine[J]. Modern Electronics Technique, 2016.
[6] YihebaguliWusimanjiang. The main hidden danger and management method of computer
network security[J]. Electronic Test, 2016.
[7] Zhao J. Neural networks applicated in computer network security
evaluation and reliability
analysis[C]// International Conference on Advances in Mechanical Engineering and Industrial
Informatics. 2016.
[8] Liu X. Application of Neural Network Model Combined with Fuzzy Theory in Computer
Network Security[C]// International Conference on Electronics,
Network and Computer
Engineering. 2016.
[9] Liu Z, Zheng X. Analysis and Discussion on Computer Network Security Issues[C]//
International Conference on Machinery, Materials, Environment, Biotechnology and Computer.
Advances in Computer Science Research, volume 82
907
2016.
[10] Wager R, Yarochkin F, Dahlgren Z. Recursive multi-layer examination for computer network
security remediation[J]. 2017.
[11] Zhou X Z, Xin L I. Computer network security technology in
molybdenum mining field of
applied research[J]. World Nonferrous Metals, 2016.
[12] Zhu L S. Computer network security precautions in the process of metal metallurgy analysis[J].
World Nonferrous Metals, 2016.
Advances in Computer Science Research, volume 82
908