期刊文献+

计算机网络信息安全与防护综述

A Survey of Computer Network Information Security and Protection
下载PDF
导出
摘要 在大数据时代背景下,网络信息安全问题逐渐突出,带来了一定的安全隐患,不利于计算机网络信息安全系统的长远发展.计算机网络信息安全问题成为当前社会发展的重点内容,如何利用大数据提高计算机网络信息安全防护等级也是目前信息技术发展的重要方向之一.所以需要深入探究大数据视角下的计算机网络信息安全和防护工作,着重分析黑客攻击、用户缺乏安全意识和缺乏健全的信息安全管理系统这三个方面,最后有效提升计算机网络信息安全防护的等级.基于这一观点,本文将从不同角度阐述大数据视角下计算机网络信息安全及防护的措施. In the background of big data era,the network information security problem is gradually prominent,bringing some security risks,which is not conducive to the long-term development of computer network information security system.The problem of computer network information security has become the key content of the current social development.How to use big data to improve the level of computer network information security protection is also one of the important directions of the development of information technology.Therefore,it is necessary to deeply explore the computer network information security and protection work from the perspective of big data,focusing on the analysis of hacker attacks,the lack of security awareness of users and the lack of sound information security management system,and finally effectively improve the level of computer network information security protection.Based on this point of view,this paper will elaborate the computer network information security and protection measures from different perspectives of big data.
作者 林杰克 LIN Jie-ke(Dezhou Vocational and Technical College,Shandong Dezhou 253034,China)
出处 《新一代信息技术》 2022年第6期115-116,125,共3页 New Generation of Information Technology
关键词 计算机 大数据时代 网络信息安全 computer big data era network information security
  • 相关文献

参考文献10

二级参考文献65

  • 1The SANS institue. The twenty most critical internet security vulnerabilities. May 2, 2002.
  • 2S Forrest, S A Hofmeyr, et al. A sense of self for Unix processes, In Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996.
  • 3S A Hofmeyr, A Somayaji, and S Forrest. Intrusion Detection using Sequences of System Calls. Journal of Computer Security,1998, 6:151-180.
  • 4Scott Maxwell. Linux Core Kernel Commentary, 2000.
  • 5Alessandro Rubini& Jonathan Corbet. Linux Device Drivers,2001.
  • 6CERT/CC.CERT/CC Statistics 1988-2003.http://www.cert.org/stats/ cert_stats.html#vulnerabilities[EB/OL].2004.
  • 7FARMER D,SPAFFORD E H.The Cops Security Checker System[R].Technical Report CSD-TR-993.Department of Computer Sciences,Purdue University.1991.
  • 8NMAP.http://www.insecure.org/nmap/index.html[EB/OL].2003.
  • 9Renaud Deraison.Nessus Scanner.http://www.nessus.org[EB/OL].2004.
  • 10.[EB/OL].ISS.http://www.iss.com/[EB/OL],2004.

共引文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部