Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (4): 51-53    DOI:
Current Issue | Archive | Adv Search |
Study on Network Information Security Based on E-government
Wang Xiaoyi,Luo Yunhai
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In view of the problem of the current e-government system information being threatened in the network, this paper solves it with the information security technology and e-government security system. Firstly, it describes the encryption technology, intrusion detection technology, firewall technology, digital signature technology, etc; secondly, it designs the e-government security system framework and analyzes the security system supporting technology ; finally, it discusses on the realization of information security from three aspects: physical layer, network layer and application layer. This paper has a certain positive significance for e-government maintenance personnel.
Key wordse-government      network information      security     
Published: 10 November 2017
:  TP309  

Cite this article:

Wang Xiaoyi, Luo Yunhai. Study on Network Information Security Based on E-government. Computer & Telecommunication, 2016, 1(4): 51-53.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2016/V1/I4/51

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[3] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[4] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[5] GUO Xu-kun.
Construction and Analysis on the Development Model of Chinese E-government
from Multi-dimensional Perspective
[J]. 电脑与电信, 2023, 1(3): 15-19.
[6] HE Zhen-xiang WANG Li-ying.
The Governance Problems and Countermeasures of Network Space
from the Angle of Investigation and Evidence Collection
[J]. 电脑与电信, 2022, 1(1-2): 36-39.
[7] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[8] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[9] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[10] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[11] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[12] LAI Jin-zhi.
Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
[J]. 电脑与电信, 2021, 1(11): 12-15.
[13] GONG Jian-feng.
Research on Cloud Security Evaluation Model Based on Data Mining
[J]. 电脑与电信, 2021, 1(11): 95-.
[14] YE Hui-qing.
Discussion on Application of 5G Customized Private Network for Vertical Industry
[J]. 电脑与电信, 2021, 0(10): 64-66.
[15] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd