Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (7): 71-73    DOI:
Current Issue | Archive | Adv Search |
Research on the Key Technologies of Computer Network Defense Policy Refinement
Liu Dabao,Zhang Yi,Tang Yong
Shenyang University of Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  The rapid development of information technology has injected fresh vitality for the industry field. But the following cyber attacks have become more and more severe, such as Trojans, viruses, etc., which influences the safe operation of network. In severe cases, there will have a large number of important information being stolen or network paralysis. Through the research and practice, it is found that the introduction of corresponding key technologies of defense policy refinement has a great effect on the safe operation of network. This paper studies on the status and the key technologies of computer network defense policy refinement, and proposes relevant recommendations about strengthening technologies for computer network defense policy refinement.
Key wordscomputer network defense      network security management      policy refinement     
Published: 13 November 2017
ZTFLH:  TP393.08  

Cite this article:

Liu Dabao, Zhang Yi, Tang Yong. Research on the Key Technologies of Computer Network Defense Policy Refinement. Computer & Telecommunication, 2016, 1(7): 71-73.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I7/71

[1] GAO Pan LIN Li. Discussion on the Omni-directional Defense for Virus Defense[J]. 电脑与电信, 2019, 1(5): 45-47.
[2] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[3] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[4] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
[5] WUWen-gang, ZHANG Xin. The Application of Penetration Test in Level Evaluation[J]. 电脑与电信, 2018, 1(1-2): 67-69.
[6] LIU Xiao-xiao. Analysis of Abnormal Traffic Identification Technology Based on Network Protocol[J]. 电脑与电信, 2017, 1(12): 56-58.
[7] TANG Jun-ming. Network Security Analysis Method for Big Data[J]. 电脑与电信, 2017, 1(12): 62-63.
[8] XUE Jin-song , FENG Ren-jun. Network security technology based on LAN environment[J]. 电脑与电信, 2017, 1(11): 92-94.
[9] Xie Fan. Analysis on the Computer Network Security and Router Troubleshooting[J]. 电脑与电信, 2017, 1(7): 42-43.
[10] Li Fangjun. The Application of Data Encryption Technology in Computer Network Communication Security[J]. 电脑与电信, 2017, 1(5): 59-61.
[11] Zou Ning. Design and Realization of a Kind of Network Tool Software Based on Jpcap[J]. 电脑与电信, 2017, 1(4): 47-49.
[12] Chen Fubin. Thoughts on Computer Network Security Precautions[J]. 电脑与电信, 2016, 1(12): 84-85.
[13] Zhao Yonggang. Design of the LAN Computer Network Security Monitoring Platform Based on Nagios[J]. 电脑与电信, 2016, 1(11): 48-49.
[14] Shen Lixiang. The Security of Linux Server Deployment[J]. 电脑与电信, 2016, 1(11): 50-52.
[15] Chen Zhen. Research on the Role of Virtual Network Technology in Computer Network Security[J]. 电脑与电信, 2016, 1(9): 31-32.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd