Abstract
The collection, transmission and use of information are inseparable from the network. Precisely because the broad applications of computer network information security vulnerability and complexity. Makes computer networks more and more attacks, security has also become increasingly vulnerable, so that information security is growing more difficult. This article from network information security vulnerabilities, network security for common network attacks and countermeasures, to prevent the main construction principles of network security technologies, such as analysis of the various aspects of the current network information security issues, and solutions to common network attacks raised the technical level of, and the principles of network security. At its core are key to preventing network security technologies, and the comparison of several key technologies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mendez, D.J., et al.: System and method for globally and securely accessing unified information in a computer network. U.S. Patent No. 9,361,603, 7 June 2016
Guo, J., et al.: An approach to network security evaluation of computer network information system with triangular fuzzy information. J. Intell. Fuzzy Syst. 28(5), 2029–2035 (2015)
Sun, Q.L.: Information under the network environment using computer information security technology. In: 2015 International Conference on Intelligent Transportation, Big Data and Smart City (ICITBS). IEEE (2015)
Ab Rahman, N.H., Choo, K.-K.R.: A survey of information security incident handling in the cloud. Comput. Secur. 49, 45–69 (2015)
Porras, P.A., Skinner, K.M., Dawson, S.M.: Security actuator for a dynamically programmable computer network. U.S. Patent No. 9,571,523, 14 February 2017
Shropshire, J., Warkentin, M., Sharma, S.: Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Comput. Secur. 49, 177–191 (2015)
Zhang, Y.: Research on the computer network security evaluation based on the DHFHCG operator with dual hesitant fuzzy information. J. Intell. Fuzzy Syst. 28(1), 199–204 (2015)
Titus, J.: The eclipse of stand. J. Zhongkai Agrotech. Coll. 19(2), 32–35 (2006)
Aleksy, M., Korthaus, A., Schader, M.: Use Java and the CORBA realization distribute type system. J. Pingxiang Coll. 4, 104–105 (2005)
Clay Richardson, W., Avondolio, D.: The Java high class weaves a distance: JDK 5. Sci. Technol. Book Rev. 3, 17–18 (2006)
Li, J., Vuong, S.: A semantics-based routing scheme for grid resource discovery. In: E-Science: First International Conference on E-Science and Grid Computing, pp. 58–70, 90 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Li, G., Yu, S., Chai, X. (2019). Research on Computer Network Information Security and Preventive Countermeasures. In: Abawajy, J., Choo, KK., Islam, R., Xu, Z., Atiquzzaman, M. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018. ATCI 2018. Advances in Intelligent Systems and Computing, vol 842. Springer, Cham. https://doi.org/10.1007/978-3-319-98776-7_147
Download citation
DOI: https://doi.org/10.1007/978-3-319-98776-7_147
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98775-0
Online ISBN: 978-3-319-98776-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)