The Frontiers of Society, Science and Technology, 2023, 5(8); doi: 10.25236/FSST.2023.050820.
Fu Quan
Inner Mongolia Minzu University, Tongliao, 028000, China
Currently, electronic technology is developing rapidly, and the popularity of internet applications is constantly increasing. Computers have become an important component that cannot be obtained in people's social production and life. The invention and application of computers have brought convenience to people, changing work, learning, and lifestyle patterns. However, at the same time, the information security issues of computer networks are also exceptionally prominent, leading to significant risks in network information security. Once such risks occur, the losses to users are enormous. This article analyzes the factors that threaten computer network information security, studies effective protection technologies for computer network information security, and explores strategies for sacrificial network information security management.
Computer; Network Information Security; Protective Technology; Administration
Fu Quan. Analysis and Management of Computer Network Information Security. The Frontiers of Society, Science and Technology (2023) Vol. 5, Issue 8: 153-156. https://doi.org/10.25236/FSST.2023.050820.
[1] Liu W. Discussion on the analysis and management of computer network information security [J]. Network Security Technology and Applications 2014; (5): 126128
[2] Zhang X. Analysis and management of computer network information security [J]. Computer Knowledge and Technology 2018; 14 (7): 45, 50
[3] Yan G. Research on the implementation of computer network information security analysis and security management [J]. Scientist 2016; 4 (12): 25-27
[4] Liu J. Discussion on computer network information security management strategies [J]. Digital Design (Part 1) 2020; 9 (10): 48-49
[5] Wu T. Analysis of computer network information security and firewall technology application [J]. China New Communications 2022; 24 (21): 110-112
[6] Zhu J, Li J. Research on computer network information security and protection under big data [J]. China New Communications 2021; 23 (5): 147-148
[7] Feng C. Computer network information security based on virtual private network technology [J]. Electronic Testing 2022; (11): 81-83, 52
[8] Bian Q. Exploration of computer network information security and protection based on big data background [J]. Information recording materials 2021; 22 (6): 20-22