Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (5): 27-28    DOI:
Current Issue | Archive | Adv Search |
The Application of VPN Technology in Computer Network Information Security
Li Yingjie
Nursing College of Hunan Polytechnic of Environment and Biology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Virtual Private Network (VPN) is mainly applied in departments and sub-departments of enterprises, realizing remote operation among different divisions, strengthening the level of information security, as well as enabling employees to get remote access to enterprise network. Due to different VPN protocols, service types and customer demands, there are generally two types of VPN. This paper provides a detailed discussion on the application of these two types of VPN technology in network information security
Key wordsVPN technology      computer network      information security     
Published: 01 January 1900
ZTFLH:  TP393  

Cite this article:

Li Yingjie. The Application of VPN Technology in Computer Network Information Security. Computer & Telecommunication, 2015, 1(5): 27-28.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2015/V1/I5/27

[1] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[2] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[3] HOU Hui-ling. Exploration on Experiment Teaching Reform Based on Computer Network Teaching Platform[J]. 电脑与电信, 2020, 1(7): 4-6.
[4] LIU Yi. The Integration of Creative Training and Curriculum Learning in Computer Network Teaching in the DigitalAge[J]. 电脑与电信, 2020, 1(7): 77-79.
[5] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[6] LI Wei-hong. Exploration on the Professional Development Mode of Computer Network Technology under the 1+ X Certificate Mode — — TakingAnhui Forestry Vocational and Technical College for Example[J]. 电脑与电信, 2020, 1(12): 7-9.
[7] LI Jie. An Exploration of the Research Reform of Computer Network Curriculum Based on the Three-stage Teaching Model of "Subject Inquiry"[J]. 电脑与电信, 2019, 1(5): 18-20.
[8] ZHANG Xiu-jie CAO Li-zhi LU Feng-wei. Research on Personnel Training Objectives for Computer Network Technology Specialty-- According to Sydney Agreement[J]. 电脑与电信, 2019, 1(3): 32-35.
[9] YU Cheng-min, WANG Li-yan. Study on Computer Network Teaching Based on Mind Mapping[J]. 电脑与电信, 2018, 1(1-2): 28-30.
[10] Zhang Jinyong, Zhu Yunpeng, Chen Gang. Teaching Design for Computer Network Curriculum in International Certification[J]. 电脑与电信, 2017, 1(7): 7-9.
[11] Li Yingjie. Teaching Innovation of Foundation of Computer Network Driven by Process Management[J]. 电脑与电信, 2017, 1(4): 87-89.
[12] ZHANG Shi-jun. Research on the EarlyWarning and Control System of Information Security Incident Based onWebsite[J]. 电脑与电信, 2017, 1(12): 50-52.
[13] YU Qing. Research on the Reliability Promotion Strategy of Computer Network[J]. 电脑与电信, 2017, 1(11): 87-88.
[14] Zhao Xiaomeng, Zhou Junjie. Management System of Mobile Payment Based on Short-range Visible Light Communication[J]. 电脑与电信, 2017, 1(10): 10-13.
[15] Cao Junqi. Analysis on the Teaching Design of Computer Network Course Based on CDIO[J]. 电脑与电信, 2017, 1(10): 83-85.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd