Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (7): 68-70    DOI:
Current Issue | Archive | Adv Search |
Research on the Computer Information Security Technology and Its Protection
Chen Zhangrong
Suzhou Higher Vocational and Technical School
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the rapid development of Internet technology in recent years, the security of computer information has been paid more and more attention. This paper studies the computer security technology and protection. Firstly, it briefly states the basic content of computer information security technology, and then puts forward the existence of security risks according to the actuality in recent years. Finally, it puts forward the computer information security protection measures.
Key wordscomputer      information security technology      hidden danger      protection measures     
Published: 13 November 2017
:  TP309  

Cite this article:

Chen Zhangrong. Research on the Computer Information Security Technology and Its Protection. Computer & Telecommunication, 2016, 1(7): 68-70.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2016/V1/I7/68

[1] TANG Qian-yuan  GUO Yun-di . Exploration of Data Structure Practice Courses for Non-computer Majors under the Background of "Emerging Engineering Education"[J]. 电脑与电信, 2024, 1(5): 57-.
[2] ZHANG Bi-xian. Research on the Reform of Practical Teaching System of the Crossover of Computer Major and Modern Medicine for New Engineering Education: A Case Study of Fuzhou Institute of Technology[J]. 电脑与电信, 2024, 1(3): 21-.
[3] LIU Ping WANG Shi-wei JIANG Meng-yun. Research on the Ideological and Political Education in the Courses of Embedded System in Applied Undergraduate[J]. 电脑与电信, 2024, 1(3): 24-.
[4] ZHANG Bi-chuan LIU Wei-dong MI Hao JING Ya-ning. Safety Helmet Detection Based on Lightweight YOLOv8[J]. 电脑与电信, 2024, 1(1): 35-39.
[5] LV Xue-song SHI Dong-xiao. Construction of Computer Network Professional Talent Training System Based on Vocational Ability Quality Model[J]. 电脑与电信, 2023, 1(7): 4-8.
[6] LI Xin JIA Mei-juan LIU Chun MAO Kai-ji. Reform and Practice of Computer Public Basic Education Model for Training Applied Talents in the Era of Big Data and Artificial Intelligence[J]. 电脑与电信, 2023, 1(11): 19-22.
[7] HU Li-hua ZHANG Ji-fu LIU Ai-qin. Teaching Reform and Practice on Compiling Principle for Ability Training of Computer System[J]. 电脑与电信, 2023, 1(11): 42-44.
[8] LI Shao-feng.
Promoting the Reform of Diversified Education and Teaching of Computer Network Based on Case Competition
[J]. 电脑与电信, 2022, 1(1-2): 20-22.
[9] WU Qing-gang ZHU Fu-bao HUANG Wei QIAN Shen-yi. Reform and Exploration of Operating System Curriculum Teaching for Computer System Ability Cultivation[J]. 电脑与电信, 2021, 1(9): 16-19.
[10] JIA Li-ping. Research on Ideological and Political Education Teaching Evaluation of Computer Course Based on AHP[J]. 电脑与电信, 2021, 1(9): 20-23.
[11] LU Jiang-dong WANG Peng-long MI Bo-yan DAI Zhuo-chen ZHENG Fen. Exploration and Practice of Computer Teaching Mode for International Students [J]. 电脑与电信, 2021, 1(7): 22-24.
[12] XIAO Man-mei NIU Wen-jun. The Training Strategy of Computer Professional Quality Based on the Integration of Industry and Education —a Case of Technical Help for MA Xianghua Traffic Public Welfare in Boluo Technical Secondary School[J]. 电脑与电信, 2021, 1(6): 9-12.
[13] SHI Yun. Problems and Paths of Construction of Computer Science Major in Application-oriented Universities inWestern China#br#[J]. 电脑与电信, 2021, 1(5): 52-58.
[14] CHENGJiang-guo. Exploration andPractice on Teaching ofComputerDrawingfor the Major of Mineral Processing Engineering[J]. 电脑与电信, 2021, 1(3): 33-35.
[15] YAN Yuan-hai. Design and Innovation of the Experimental Course ofComputerCompositionPrinciple[J]. 电脑与电信, 2021, 1(3): 36-38.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd