To see the other types of publications on this topic, follow the link: Computer network security.

Journal articles on the topic 'Computer network security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Full text
Abstract:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
APA, Harvard, Vancouver, ISO, and other styles
2

Shkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.

Full text
Abstract:
The aim of the article is to analyze the security of modern computer networks for the develop-ment of technical solutions used in the creation of corporate networks and to present practical applications for information security in the enterprise. One of the most important parts of the information infrastructure of modern enterprises and many government organizations are corporate networks. Since the operation of corporate systems can take place in an open environment, the failure of such a system or distortion of the subsystem of access to information resources actually means the cessation of the enterprise. The article considers the issues of methodological and technical aspects of information protection it the enterprise. The issues of application of network technologies for the implementation of security policy and levels of access to information are considered. Issues of security and access to information at different levels are considered and analyzed, taking into account technical and personnel support. The principles of construction used in network planning and decision-making are defined. The structure of the corporate network and the methodology of its creation are considered. The methods of realization of the corporate network of the enterprise taking into account the issues of security and protection of information are given. Theoretical and methodological bases for designing a corporate network for the information security of the enterprise are proposed. The article presents the technologies used in the creation of corporate networks. The methodology of creating a corporate network is considered, namely, what are the requirements for the corporate network and the technical objectives of the corporate computer network. As a result of the research, an updated scheme of the corporate computer network (for the implementation of computer security) was developed and the security system of the corporate computer network was presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Full text
Abstract:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Hong Zhu. "Discussion on Computer Network Security." Applied Mechanics and Materials 427-429 (September 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.

Full text
Abstract:
Abstract. As the development of informatization process and the rapid development of Internet, network security problems are highlighted gradually.College is a unity that requires large quantity and high quality of knowledge and information, and the network provides college students more opportunities to learn and communicate, but it also poses a serious crisis of Internet security.This paper has a deep analysis of present situation and necessity of college students' computer network security, and suggest that network information security education should be attatched great importance as a preventive measure and important countermeasures.Twenty-first Century is the era of information and technology, as an important channel of acquiring knowledge and information and a wide platform of all kinds of cultural dissemination and communication, network has played a positive role in promoting the exchange of social information, making personal interaction convenient, promoting social and economic development. Along with the rapid development and maturity of the campus network, network activity has become one of college students’ daily activities, and made a profound effect on students in all aspects.
APA, Harvard, Vancouver, ISO, and other styles
6

Wan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.

Full text
Abstract:
Internet technology in the life to people bring convenient while, also is facing increasingly serious security threat from the network, many invaders one thousand ways to want to "see" to some concerned data or information, computer network information security is more and more attention. This article, from the perspective of the system vulnerability and network own existence safe hidden trouble, put forward to realize protection methods and strategies of network security.
APA, Harvard, Vancouver, ISO, and other styles
7

Niu, Yiming, Wenyong Du, and Zhenying Tang. "Computer Network Security Defense Model." Journal of Physics: Conference Series 2146, no. 1 (January 1, 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.

Full text
Abstract:
Abstract With the rapid development of the Internet industry, hundreds of millions of online resources are also booming. In the information space with huge and complex resources, it is necessary to quickly help users find the resources they are interested in and save users time. At this stage, the content industry’s application of the recommendation model in the content distribution process has become the mainstream. The content recommendation model provides users with a highly efficient and highly satisfying reading experience, and solves the problem of information redundancy to a certain extent. Knowledge tag personalized dynamic recommendation technology is currently widely used in the field of e-commerce. The purpose of this article is to study the optimization of the knowledge tag personalized dynamic recommendation system based on artificial intelligence algorithms. This article first proposes a hybrid recommendation algorithm based on the comparison between content-based filtering and collaborative filtering algorithms. It mainly introduces user browsing behavior analysis and design, KNN-based item similarity algorithm design, and hybrid recommendation algorithm implementation. Finally, through algorithm simulation experiments, the effectiveness of the algorithm in this paper is verified, and the accuracy of the recommendation has been improved.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Kun, Hai Feng Wang, Jian Feng Zhu, and Zhuang Li. "Computer Network Security Several Strategies." Key Engineering Materials 474-476 (April 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.

Full text
Abstract:
With the continuous development of the Internet, it while brings each kind of beneficial information to the people , the hacker, viral as well as the malicious destruction and so on bad factor also multiplies along with it the spread, the network security and the reliability have become the focal point which various countries pay attention together .
APA, Harvard, Vancouver, ISO, and other styles
9

Courtney, M., J. Hayes, and P. Hunter. "The protectors [Computer network security]." Engineering & Technology 9, no. 5 (June 1, 2014): 54–8. http://dx.doi.org/10.1049/et.2014.0520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

White, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jackson, Keith M. "Tutorial: Computer and network security." Computer Fraud & Security Bulletin 9, no. 8 (June 1987): 15–16. http://dx.doi.org/10.1016/0142-0496(87)90122-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Coronado, Adolfo S. "Corporate Computer and Network Security." Journal of Information Privacy and Security 8, no. 4 (October 2012): 81–84. http://dx.doi.org/10.1080/15536548.2012.10845668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

周, 宏达. "Analysis of Computer Network Security." Computer Science and Application 03, no. 04 (2013): 202–7. http://dx.doi.org/10.12677/csa.2013.34035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jittawiriyanukoon, Chanintorn. "Evaluation of computer network security using attack undirected geography." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1508. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1508-1514.

Full text
Abstract:
<span>To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.</span>
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.

Full text
Abstract:
Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.
APA, Harvard, Vancouver, ISO, and other styles
16

Cohen, Fred. "Managing network security — Part 6: Computer games and network security management." Network Security 1997, no. 5 (May 1997): 14–18. http://dx.doi.org/10.1016/s1353-4858(97)90053-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Qiao Ling. "On the Maintenance Management and Network Security of Local Area Network." Applied Mechanics and Materials 484-485 (January 2014): 842–46. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.842.

Full text
Abstract:
With the development of the science and technology of the computer application, the maintenance management and the security of the computers is an important problem. In this paper the author presents his own opinions on these issues. Therefore, the maintenance management of the computer local area network is very important to guarantee the security and stability of the network and to the use of the cyber sources to a maximum.
APA, Harvard, Vancouver, ISO, and other styles
18

CERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Full text
Abstract:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
19

Widodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.

Full text
Abstract:
Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.
APA, Harvard, Vancouver, ISO, and other styles
20

Shihab, Khalil. "A Backpropagation Neural Network for Computer Network Security." Journal of Computer Science 2, no. 9 (September 1, 2006): 710–15. http://dx.doi.org/10.3844/jcssp.2006.710.715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Full text
Abstract:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.
APA, Harvard, Vancouver, ISO, and other styles
23

Sun, Xiu Juan. "Personal Computer Network Security Prevention Research." Advanced Materials Research 971-973 (June 2014): 1684–87. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1684.

Full text
Abstract:
this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.
APA, Harvard, Vancouver, ISO, and other styles
24

Sales Monteiro, Gisele, Wicaro Italo Cordovil Da Silva, Jean Mark Lobo De Oliveira, and Paulo Roberto Freitas Rodrigues. "TARGETING A COMPUTER NETWORK IN A UNIVERSITY CENTER." International Journal of Advanced Research 10, no. 11 (November 30, 2022): 435–39. http://dx.doi.org/10.21474/ijar01/15687.

Full text
Abstract:
In the modernization of technology and its media, it is observed that the amount of electronic components interconnected to local networks and the worldwide network of computers is numerous and only grows with each passing day. Activities in institutions in general have become fully connected, sectors are reputable and connected to a network of computers generating and receiving data. The project addressed focuses on explaining a situation and informing the reader about the relevance of data traffic control on a local network, ensuring the delivery and receipt of data competently and securely to destinations, without interference from other unauthorized internal connections and thus being external connections. The use of virtual local networks aims at accurately segmenting the network making it independent of physical topology, ensuring cost savings and broadcast traffic control resulting in an easy-to-administer network and increased security. The results obtained in the implementation of segmentation proved to be very effective in terms of monitoring and isolation of some sectors, with this diluted some problems that existed in the issue of information security.
APA, Harvard, Vancouver, ISO, and other styles
25

Sun, Xiao Ru. "Research on the Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2007–10. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2007.

Full text
Abstract:
With the rapid development and application of the computer network technology, computer network system has brought many unsafe hidden dangers to the user. The computer network security has got more and more attentions of people. Therefore, this paper analyzes the main problems in computer network security and proposes some effective preventive measures. The author hopes these will help the computer network plays better role for people.
APA, Harvard, Vancouver, ISO, and other styles
26

Beker, HJ, and CJP Hale. "Network security." Data Processing 28, no. 4 (May 1986): 191–94. http://dx.doi.org/10.1016/0011-684x(86)90360-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Rahneva, Darina, Vanya Stoykova, Angelina Cherneva, and Krum Videnov. "VIRTUAL LABORATORY for NETWORK AND COMPUTER SECURITY." International Conference on Technics, Technologies and Education, no. 1 (2018): 315–22. http://dx.doi.org/10.15547/ictte.2018.08.003.

Full text
Abstract:
We live in the digital era and our daily lives are constantly connected with information and communication technologies. But this new world of digital information has inevitably raised the issue of data security, stored on electronic media or transmitted over the Networks. An important part in the field of computer and network security is cryptography and its study is an indispensable element in the preparation of all future specialists in the field of computer and communication technologies. The purpose of this report is to present a new way to conduct practical training in the field of Network and Computer Security using a Virtual Lab in which the basic cryptographic algorithms are presented using programming modules developed in language familiar to the students.
APA, Harvard, Vancouver, ISO, and other styles
28

Yassir, Ammar, and Alaa A. "Current Computer Network Security Issues/Threats." International Journal of Computer Applications 155, no. 1 (December 15, 2016): 1–5. http://dx.doi.org/10.5120/ijca2016912255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

BORMAN, STU. "Computer virus boosts network security efforts." Chemical & Engineering News 66, no. 46 (November 14, 1988): 8. http://dx.doi.org/10.1021/cen-v066n046.p008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Edwards, C. "Paranoid and adroit [computer network security]." Information Professional 2, no. 2 (April 1, 2005): 20–27. http://dx.doi.org/10.1049/inp:20050204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Deng, Robert H. "Network security." Computer Communications 18, no. 1 (January 1995): 55–56. http://dx.doi.org/10.1016/0140-3664(95)90074-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Qin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study." Advanced Materials Research 1079-1080 (December 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.

Full text
Abstract:
With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding national security and social stability. In the network security event, the hacker often can’t successfully intrude into the network by means of a single host / services hacker. With the help of various kinds of "vulnerability" generated bydifferent relationship existing in multiple point multiple host, the hacker can achieve the purpose of network intrusion. Therefore one important aspect of network security is after obtaining the vulnerability of the network information, considering a combination of multiple exploits and analyzing the attack path of network penetration attacks that the attacker may take.
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.

Full text
Abstract:
Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.
APA, Harvard, Vancouver, ISO, and other styles
34

Dong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.

Full text
Abstract:
With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.
APA, Harvard, Vancouver, ISO, and other styles
35

Borate, Madhur Anil, Ajay Narayan Panhale, Vijay Narayan Panhale, Pranjali Gade, and Dr Sunita Jadhav. "Cryptography & Network Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 819–26. http://dx.doi.org/10.22214/ijraset.2022.48057.

Full text
Abstract:
Abstract: Cryptography is the practice and study of techniques to secure communication in the presence of adversarial behavior. On the other hand, Network security is the set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies. Cryptography and network security are used to protect network and data communication take place over wireless networks and data which is stored in our systems. Cryptography is a network security tactic that is used to protect enterprise information and communication from cyber threats through the use of codes(encryption) using techniques such as merging words with images, and other ways to hide information in storage or transit. In this paper, we discussed about cryptography process, security mechanism, security services, attacks, types of cryptography, Steganography.
APA, Harvard, Vancouver, ISO, and other styles
36

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
37

Sun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.

Full text
Abstract:
In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main reasons for leaks. Therefore, it is of great significance to study the physical isolation and protection technology of classified information systems. Physical isolation is an important part of the protection of classified information systems, which cuts off the possibility of unauthorized outflow of information from the network environment. To achieve the physical isolation of the network environment and build a safe and reliable network, it is necessary to continuously improve the level of network construction and strengthen network management capabilities. At present, the realization of physical isolation technology mainly relies on security products such as firewall, intrusion detection, illegal outreach, host monitoring, and auditing. This study analyzes network security systems such as intrusion detection, network scanning, and firewall. Establishing a model based on network security vulnerabilities and making up for network security hidden dangers caused by holes are generally a passive security system. In a network, the leader of network behavior—human behavior—needs to be constrained according to the requirements of the security management system and monitoring. Accordingly, this study proposes a security monitoring system for computer information network involving classified computer. The system can analyze, monitor, manage, and process the network behavior of the terminal computer host in the local area network, to achieve the purpose of reducing security risks in the network system. Based on the evaluation value sequence, the initial prediction value sequence is obtained by sliding adaptive triple exponential smoothing method. The time-varying weighted Markov chain is used for error prediction, the initial prediction value is corrected, and the accuracy of security situation prediction is improved. According to the security protection requirements of secret-related information systems, a complete, safe, reliable, and controllable security protection system for secret-related information systems is constructed, and the existing security risks and loopholes in secret-related information systems are eliminated to the greatest extent possible. This enables the confidentiality, integrity, and availability of confidential data and information in the computer information system to be reliably protected.
APA, Harvard, Vancouver, ISO, and other styles
38

Jin, Shujuan. "Research on Application of Neural Network in Computer Network Security Evaluation." Open Electrical & Electronic Engineering Journal 8, no. 1 (December 31, 2014): 766–71. http://dx.doi.org/10.2174/1874129001408010766.

Full text
Abstract:
Purpose: discuss the role of the neural network (NN) theory in the computer network security evaluation. Method: propose three-level and four-class indicator system suitable for network security evaluation, establish the network security evaluation system model based on NN, optimize the NN model by using the particle swarm, collect 100- group data on the computer network security evaluation of different scales via expert scoring, and normalize them; Result: the evaluation model based on NN is simple and practicable to network security evaluation and can eliminate disturbance of the subjective factors of the human being. The simulation results indicate that the system can reduce relative output error and improve correctness rate of evaluation. Conclusion: The NN model is very valuable in research on the computer network security evaluation system, which can offset weaknesses of the past evaluation methods to some extent, improve precision of the evaluation results, and provide reference to prediction and control of the network security problems in future.
APA, Harvard, Vancouver, ISO, and other styles
39

Boyanov, Petar. "USING THE SECURITY NETWORK SCANNER GFI LANGUARD TO DISCOVER AND IMPROVE THE VULNERABILITIES IN THE COMPUTER NETWORK SYSTEMS." Journal scientific and applied research 4, no. 1 (October 10, 2013): 74–79. http://dx.doi.org/10.46687/jsar.v4i1.83.

Full text
Abstract:
In this paper a comprehensive testing for computer network vulnerabilities is made. Thanks to the program product GFI LanGuard some critical flaws and vulnerabilities have been discovered and thereby this action improves the security mechanisms in the tested hosts. It is recommended that many cyber-security professionals and IT administrators to use GFI LanGuard in order to increase the computer and network security in their organizations.
APA, Harvard, Vancouver, ISO, and other styles
40

Novokhrestov, Aleksey, Anton Konev, and Alexander Shelupanov. "Model of Threats to Computer Network Software." Symmetry 11, no. 12 (December 11, 2019): 1506. http://dx.doi.org/10.3390/sym11121506.

Full text
Abstract:
This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to describe the software components of computer networks and all possible connections between them. On the basis of elementary operations on metagraphs, a model of threats to the security of computer network software is developed, which allows compiling lists of threats to the integrity and confidentiality of computer network software. These lists include more threats in comparison with the considered analogues.
APA, Harvard, Vancouver, ISO, and other styles
41

Sheikh, Yelena Mujibur, and Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.

Full text
Abstract:
Abstract: Cyber Security is employed for shielding knowledge systems like networks, computers, databases, information centers, and applications with acceptable procedural and technical security measures. As most of the issues pop up the thoughts, ‘cybercrimes’ can mix colossally daily. Crime is rising as a grave threat in today’s world. It’s an aggressive space of crime. As the number of web users has grown, so has offense. For example, the current Covid-19 pandemic has had a notable consequence for organizations and establishments, resulting in security vulnerabilities; as a result, network security is becoming progressively diverse and complex, and as a matter of fact, completely different ways are being devised to exploit it. Network engineers got to sustain with recent advances in each hardware and software package field to forestall them from being employed, together with user information. Historically, solely mobile computers and phones were connected to the internet; however, with the advancement of technology, other items such as security cameras, microwaves, automobiles, and industrial machinery are all now connected to the internet. The web of stuff is the term given to this network of interconnected things. Prime Securities for the Web of Things are involved[1]. This paper gives detailed information on cyber security and crime as little more than a result. It addresses forms of cyber security, the need for cyber security, issues regarding cyber security, benefits and drawbacks, criminal background, and criminal offenses. Keywords: Computer Security, Internet, Protection, Application software, IP network, Exploits, Malware Threats, Virus, IoT, Network Security, Computer Network, Cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Jian Hang, and Hai Bo Wang. "Computer Local Area Network Security and Management." Advanced Materials Research 1079-1080 (December 2014): 595–97. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.595.

Full text
Abstract:
Development of computer network technology has greatly improved the sharing rate and utilization of information resources, many areas are widely used local area network, widely used degree gradually expose their security and confidentiality issues. In particular, people lack knowledge on security policy and network security control mechanisms, leading network security becomes more complex. In this paper, the main problem with the current computer Local Area Network security and the starting point, the focus of the analysis and management of their security and confidentiality measures, hope to further enhance the computer LAN security.
APA, Harvard, Vancouver, ISO, and other styles
43

纪, 汉杰. "Computer Network Information Security and Protection Strategy Based on Computer Network Technology." Computer Science and Application 09, no. 09 (2019): 1703–7. http://dx.doi.org/10.12677/csa.2019.99190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Xinwei, Hui Chen, and Bryan Ariann. "Computer network security evaluation model based on neural network." Journal of Intelligent & Fuzzy Systems 37, no. 1 (July 9, 2019): 71–78. http://dx.doi.org/10.3233/jifs-179065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ma, Jie, and Shuanbao Li. "The Construction Method of Computer Network Security Defense System Based on Multisource Big Data." Scientific Programming 2022 (May 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/7300977.

Full text
Abstract:
This article proposes a computer network security defense system model based on multisource big data, which makes the security of computer networks more complete because of the shortage of current computer network security defense systems. The current network security situation is analyzed, and the problems faced in the field of network security are pointed out; then, multisource big data is introduced, and the characteristics of the multisource big data model are analyzed. This article proposes an information system network security model, which formally describes the relationship between network behavior among nodes, security threats, network attacks, and defense capability of security devices in an information system. After that, a network security defense system measurement scheme is constructed based on hierarchical analysis, and quantitative indicators of defense effectiveness are defined in two dimensions: risk severity of security threats and defense response actions of security devices, which enables quantitative evaluation of the security defense system, and then identifies omissions and defects of the network security defense system. A defense system measurement and optimization system is designed based on the proposed network security system measurement and optimization scheme. The application analysis of the project is combined with the actual scenarios. Through the evaluation and optimization of the security defense system in the natural methods, it is proved that the network security defense system evaluation and optimization scheme proposed in this article has reasonableness and effectiveness in the actual application.
APA, Harvard, Vancouver, ISO, and other styles
46

Zhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.

Full text
Abstract:
Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.
APA, Harvard, Vancouver, ISO, and other styles
47

Dong, Ya Hui, Wei Li, and Xu Wen Guo. "Analysis on Network Security and Solution of Computer." Advanced Materials Research 219-220 (March 2011): 1305–8. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.1305.

Full text
Abstract:
Currently, the issue of computer network security becomes more and more serious. This thesis takes the main factors that affect the computer network security as the breakthrough, and pays attention to the analysis and prevention of various measures that are not conducive to the normal operation of computer network. It also fully discusses the situations that affect the computer network security from different perspectives in order to take preventive measures, remove adverse factors in the embryonic stage and ensure the security management and effective operation of computer network. This thesis proposes solutions from seven aspects, namely security and encryption technology, firewall technology, network address translator technology, security kernel technology of operating system, technology of anti virus in computer network, network backup system and security management.
APA, Harvard, Vancouver, ISO, and other styles
48

Sun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.

Full text
Abstract:
This paper of University Library in the computer network security situation analysis, proposed the threat factors of current university library computer network security faces, proposed the university library computer software maintenance and maintenance measures to ensure the safety of computer network application system in the library.
APA, Harvard, Vancouver, ISO, and other styles
49

Akhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (February 6, 2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.

Full text
Abstract:
Along with the current development of Information Technology is always changing to make the security of an information is very important, especially on a network connected to the internet. But what is unfortunate is that the imbalance between each development of a technology is not accompanied by developments in the security system itself, so that there are quite a lot of systems that are still weak and have to be increased by the security wall. This study aims to design a Web-based App interface to facilitate users or administrators in securing network computers from various types of attacks. The Instrusion detection system (IDS) method is used to detect suspicious activity in a system or network using snort and honeypot. Honeypot is built on a computer along with Apache, MySQL, and Snort. Honeypot will act as a target to attract attackers and log information from the attacker and snort to apply the rules made from the web. The functional system will then be tested using the black box testing method. The results of this study concluded that Web App-based interfaces that are created can be used to help users and administrators in maintaining data and information on server computers from various types of attacks on computer networks
APA, Harvard, Vancouver, ISO, and other styles
50

Wang, Xu. "Research on Security Management of Library Computer Network System." Applied Mechanics and Materials 687-691 (November 2014): 1720–23. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1720.

Full text
Abstract:
With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint library computer network construction greatest limiting factor. This paper describes the impact of the library computer network system security management of specific issues, according to the system requirements of practical application, in terms of the system operating environment, hardware systems, software systems, network systems and system data, such as design of the library computer network system security policy and implementation are discussed. Through the library computer network security threats faced by the system proposed safety management, regulations are important to ensure the development and implementation of computer network system security. Proposed library computer network system security management strategies, we hope to enhance the library computer network security have some help.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography