Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (7): 68-70    DOI:
Current Issue | Archive | Adv Search |
Research on the Computer Information Security Technology and Its Protection
Chen Zhangrong
Suzhou Higher Vocational and Technical School
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the rapid development of Internet technology in recent years, the security of computer information has been paid more and more attention. This paper studies the computer security technology and protection. Firstly, it briefly states the basic content of computer information security technology, and then puts forward the existence of security risks according to the actuality in recent years. Finally, it puts forward the computer information security protection measures.
Key wordscomputer      information security technology      hidden danger      protection measures     
Published: 13 November 2017
ZTFLH:  TP309  

Cite this article:

Chen Zhangrong. Research on the Computer Information Security Technology and Its Protection. Computer & Telecommunication, 2016, 1(7): 68-70.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I7/68

[1] WU Qing-gang ZHU Fu-bao HUANG Wei QIAN Shen-yi. Reform and Exploration of Operating System Curriculum Teaching for Computer System Ability Cultivation[J]. 电脑与电信, 2021, 1(9): 16-19.
[2] JIA Li-ping. Research on Ideological and Political Education Teaching Evaluation of Computer Course Based on AHP[J]. 电脑与电信, 2021, 1(9): 20-23.
[3] LU Jiang-dong WANG Peng-long MI Bo-yan DAI Zhuo-chen ZHENG Fen. Exploration and Practice of Computer Teaching Mode for International Students [J]. 电脑与电信, 2021, 1(7): 22-24.
[4] XIAO Man-mei NIU Wen-jun. The Training Strategy of Computer Professional Quality Based on the Integration of Industry and Education —a Case of Technical Help for MA Xianghua Traffic Public Welfare in Boluo Technical Secondary School[J]. 电脑与电信, 2021, 1(6): 9-12.
[5] SHI Yun. Problems and Paths of Construction of Computer Science Major in Application-oriented Universities inWestern China#br#[J]. 电脑与电信, 2021, 1(5): 52-58.
[6] CHENGJiang-guo. Exploration andPractice on Teaching ofComputerDrawingfor the Major of Mineral Processing Engineering[J]. 电脑与电信, 2021, 1(3): 33-35.
[7] YAN Yuan-hai. Design and Innovation of the Experimental Course ofComputerCompositionPrinciple[J]. 电脑与电信, 2021, 1(3): 36-38.
[8] TANG Di HUANG Si-han. Application of Micro Course in Ecological Teaching Mode of Computer Majorin Higher Vocational Colleges[J]. 电脑与电信, 2021, 1(3): 39-41.
[9] LI Ling. Cloud Storage Construction of Teaching Files in University Computer Room Based on ownCloud[J]. 电脑与电信, 2021, 1(1): 30-33.
[10] SHEN Xiao-chun SHAWen-rui LI Jun-qin ZHUANG Wen-ge. The Design and Implementation of Intelligent Pill Boxes[J]. 电脑与电信, 2021, 1(1): 46-50.
[11] CHU Guang-qin. Exploration on the Mixed Teaching Model for Computer Major in Higher Vocational Education[J]. 电脑与电信, 2021, 1(1): 55-57.
[12] LI Hong-yan. Application and Practice of SPOC Mixed Teaching Mode in Basic Computer Teaching in Colleges and Universities[J]. 电脑与电信, 2020, 1(8): 15-18.
[13] GU Wen YAN Jun-jie . Research and Design of the Humidifier Intelligent Control System[J]. 电脑与电信, 2020, 1(8): 51-54.
[14] HOU Hui-ling. Exploration on Experiment Teaching Reform Based on Computer Network Teaching Platform[J]. 电脑与电信, 2020, 1(7): 4-6.
[15] XU Xin-xin. Exploration and Practice of Mixed Golden Course of Computer Foundation[J]. 电脑与电信, 2020, 1(7): 74-76.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd