Analysis of Computer Network Security Problems and Countermeasures
Feng
Jiangxi Technical College of Manufacturing,Nanchang,330095
Keywords: Computer network; Network security; Network attack; Counter measures
Abstract. With the continuous
advanced of the information, digital and network society, the
computer network has gradually become an indispensable aid in people’s modern life, and security
of computer network is becoming increasingly important. The development
of computer network
technology not only brings great convenience to people’s life today, but it is also difficult to avoid a
series of security risks. If the security risks are dealt with in a timely manner, it is bound to lead to
the emergence of computer application barriers. Thus it can be seen that it is of great practical
significance to study the status quo of computer network security and develop effective strategies.
Introduction
With the development of information technology, the application of computer network is becoming
more
and more extensive, and the security problems are receiving more and more attention.
Whether it is at government sectors,
schools and companies, there are sensitive data within the
system that need to be protected. And the computer network has the form of connection diversity,
terminal distribution inhomogeneity
and network interconnection, openness and other
characteristics, so that the network vulnerable to hackers, malicious software attacks, so the security
and confidentiality of network information is a very important of the subject. Therefore, to ensure
the integrity
of network information, availability and confidentiality,
network security measures
must be able to respond to their own vulnerability and a variety of network threats. This paper starts
from the security of computer network, and discusses the security of computer network. This paper
analyzes the common attack methods such as virus attack,
system vulnerability attack, spoofing
attack and hacker attack, and discusses the access control strategy, information encryption strategy,
virus attack coping strategy, system vulnerability attack strategy, hacker attack coping strategy. And
the conventional cryptographic algorithm and public key cryptography algorithm are analyzed.