A Study on the Reform of Computer Network Security Technology Teaching Based on Task-driven in Vocational Education

2021 ◽  
2014 ◽  
Vol 971-973 ◽  
pp. 1440-1443 ◽  
Author(s):  
Yan Kun Zhang

Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.


2014 ◽  
Vol 1044-1045 ◽  
pp. 1298-1301
Author(s):  
Qian Wu

Early network development, people more emphasis on network convenience and availability, and ignore the security of the network. With the development of computer network technology, when people run in the network critical business such as banking, when government activity is increasingly networked, computer network security has become a problem that not allows to ignore. In this paper, the existing network security technology to prevent the analysis and comparison, especially to strengthen security measures should be taken in order to do a more in-depth discussion, and describes the future development trend of this research field.


2021 ◽  
Vol 2143 (1) ◽  
pp. 012019
Author(s):  
Qi Gao ◽  
Jinniu Bai

Abstract With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, there are many kinds of technologies to maintain network information security. Such as firewalls, anti-virus software technology, file encryption and digital signature technology. This paper describes the vulnerability of network security and the importance of maintaining its security, mainly study the role of Java in computer network security technology and its application in which, finally based on Java network security technology and some other comparison, draw its advantages.


2014 ◽  
Vol 977 ◽  
pp. 507-510
Author(s):  
Wei Wei Yao ◽  
Liang Gong ◽  
Xia Xu

Optimization of computer network security technology shift in the relationship is constantly updated. Any computer network security solutions can not be designed once and for all. How seamless integration of network security technology and network security management together to make the network security implementation strategy is very important, this paper proposes a reasonable solution to improve overall network design and optimization of the security system, to develop scientific, reliable, dynamic network security optimization design, the design of enterprise network security solutions, combined with the current firewall, intrusion detection / intrusion prevention technology, VPN technology to achieve rapid escalation of the enterprise information construction in the network security system, thus the basic realization of computer network security optimization design goal.


Sign in / Sign up

Export Citation Format

Share Document