Research on the Key Technologies of Computer Network Defense Policy Refinement

Liu Dabao, Zhang Yi, Tang Yong

Computer & Telecommunication ›› 2016, Vol. 1 ›› Issue (7) : 71-73.

Computer & Telecommunication ›› 2016, Vol. 1 ›› Issue (7) : 71-73.

Research on the Key Technologies of Computer Network Defense Policy Refinement

  • Liu Dabao,Zhang Yi,Tang Yong
Author information +
History +

Abstract

The rapid development of information technology has injected fresh vitality for the industry field. But the following cyber attacks have become more and more severe, such as Trojans, viruses, etc., which influences the safe operation of network. In severe cases, there will have a large number of important information being stolen or network paralysis. Through the research and practice, it is found that the introduction of corresponding key technologies of defense policy refinement has a great effect on the safe operation of network. This paper studies on the status and the key technologies of computer network defense policy refinement, and proposes relevant recommendations about strengthening technologies for computer network defense policy refinement.

Key words

computer network defense / network security management / policy refinement

Cite this article

Download Citations
Liu Dabao, Zhang Yi, Tang Yong. Research on the Key Technologies of Computer Network Defense Policy Refinement[J]. Computer & Telecommunication. 2016, 1(7): 71-73

Accesses

Citation

Detail

Sections
Recommended

/