Skip to main content
Top

2020 | OriginalPaper | Chapter

On Protection Strategies for Computer Network Information Security and Its Key Technologies

Author : Bin Chen

Published in: Innovative Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

At present, computer network technology is not only widely used in the production activities of all walks of life but also plays an extremely important role in people’s daily life and work. With the rapid development and continuous reform of computer network technology, the problem of network information security becomes more and more serious. While enjoying the convenience brought by computer network technology, people begin to attach importance to the security of computer network information. After entering the information age, our country has made good achievements in the security protection of computer network information and key technology research, but the problem of computer network information security continues unabated and emerges in endlessly. Therefore, we need to improve the security protection mechanism of computer network information constantly and optimize the information security protection system. In this paper, the current situation and threat factors of computer network information security are analyzed, and information security protection strategies are put forward.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhang Wenhui. 2017. Computer network information security based on computer network technology and its protection strategy. Information Systems Engineering. Zhang Wenhui. 2017. Computer network information security based on computer network technology and its protection strategy. Information Systems Engineering.
2.
go back to reference Yuanxin, Wang, and Wang Benyu. 2017. Research on computer network information security and its protection strategy. Reading Digest 12 (1): 00175. Yuanxin, Wang, and Wang Benyu. 2017. Research on computer network information security and its protection strategy. Reading Digest 12 (1): 00175.
3.
go back to reference Chang, Li. 2017. Analysis of computer network information security and its main protection strategies. Electronic Production 22: 59–60. Chang, Li. 2017. Analysis of computer network information security and its main protection strategies. Electronic Production 22: 59–60.
4.
go back to reference Wang Fang. 2018. Research on computer network information security and its protection strategy in big data era. Computer Fan 94 (05): 74. Wang Fang. 2018. Research on computer network information security and its protection strategy in big data era. Computer Fan 94 (05): 74.
5.
go back to reference Hui, Gao. 2018. Research on computer network information security and its protection strategy in big data era. Science and Technology Innovation 6: 76–77. Hui, Gao. 2018. Research on computer network information security and its protection strategy in big data era. Science and Technology Innovation 6: 76–77.
6.
go back to reference Jin Chuan. 2017. On computer network information security and its protection strategy. 4, Modern Information Technology. Jin Chuan. 2017. On computer network information security and its protection strategy. 4, Modern Information Technology.
7.
go back to reference Wei, Pei. 2018. Computer network information security based on computer network technology and its protection strategy. Information Recording Materials 19 (7): 67–68. Wei, Pei. 2018. Computer network information security based on computer network technology and its protection strategy. Information Recording Materials 19 (7): 67–68.
8.
go back to reference Liu Hang. 2018. On computer network information security and its protection strategy. Computer Knowledge and Technology: Academic Exchange. Liu Hang. 2018. On computer network information security and its protection strategy. Computer Knowledge and Technology: Academic Exchange.
9.
go back to reference Li Ruijuan, Xu Haidan. 2017. Analysis of computer network information security and its protection strategy. Computer Fan (1). Li Ruijuan, Xu Haidan. 2017. Analysis of computer network information security and its protection strategy. Computer Fan (1).
10.
go back to reference Xuan, Chen. 2017. Thinking on computer network information management and security protection strategy. Digital Technology and Applications 2: 228. Xuan, Chen. 2017. Thinking on computer network information management and security protection strategy. Digital Technology and Applications 2: 228.
11.
go back to reference Dong, Yu. 2017. Research on factors and protection strategies of threatening network information security. Information and Computer (Theoretical Edition) 6: 196–197. Dong, Yu. 2017. Research on factors and protection strategies of threatening network information security. Information and Computer (Theoretical Edition) 6: 196–197.
Metadata
Title
On Protection Strategies for Computer Network Information Security and Its Key Technologies
Author
Bin Chen
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5959-4_78

Premium Partner