Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (4): 51-53    DOI:
Current Issue | Archive | Adv Search |
Study on Network Information Security Based on E-government
Wang Xiaoyi,Luo Yunhai
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In view of the problem of the current e-government system information being threatened in the network, this paper solves it with the information security technology and e-government security system. Firstly, it describes the encryption technology, intrusion detection technology, firewall technology, digital signature technology, etc; secondly, it designs the e-government security system framework and analyzes the security system supporting technology ; finally, it discusses on the realization of information security from three aspects: physical layer, network layer and application layer. This paper has a certain positive significance for e-government maintenance personnel.
Key wordse-government      network information      security     
Published: 10 November 2017
ZTFLH:  TP309  

Cite this article:

Wang Xiaoyi, Luo Yunhai. Study on Network Information Security Based on E-government. Computer & Telecommunication, 2016, 1(4): 51-53.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I4/51

[1] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[2] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[3] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[4] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[5] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[6] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[7] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[8] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[9] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[10] LI Jun-tao. Security Research on Internet of Things Based on NB-IoT Network[J]. 电脑与电信, 2020, 1(7): 62-64.
[11] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[12] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[13] LI Jun-tao. Research on Security Technology of Intelligent Collaborative Network[J]. 电脑与电信, 2020, 1(4): 48-50.
[14] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[15] ZHU Sheng-cai. Exploration on Cybersecurity Construction in University[J]. 电脑与电信, 2020, 1(1-2): 49-53.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd