期刊文献+

浅谈网络信息安全面临的问题和对策 被引量:1

Analysis on problem and countermeasure faced with network information safety
下载PDF
导出
摘要 近些年来,我国的网络技术的成熟以及资费的下降,使得我国的网络普及率大幅提高。但是,我国网络同样面临信息安全的问题,这给人们的工作、学习和生活埋下了较大的隐患。文章首先阐述了当下我国网络信息安全面临的问题,并针对这些问题提出了一些相应的对策。希望能为网络使用者和相关问题的研究者提供一些有意义的参考,进而有效促进我国网络信息安全体系的建设和完善。 In recent years, that China's network technology is becoming maturer and the tariffs is declining makes China's Internet penetration rate increased significantly. However, China's network also faces the problem of information security, which brings the people's work, study and life great risks. This paper first describes the problems current network information security faced with in our country, and puts forward some corresponding countermeasures for these problems. Aiming to provide some significant reference for network users and researcher on relevant problems, then effectively promote the network information security system in China's construction and perfection.
作者 王彬蔚 Wang Binwei(Liaoyuan Human Resource and Social Security Information Center, Liaoyuan 136200, China)
出处 《无线互联科技》 2017年第4期24-25,共2页 Wireless Internet Technology
关键词 网络技术 网络信息安全 问题 network technology network information security problem
  • 相关文献

参考文献7

二级参考文献26

  • 1张惠平.浅谈高校校园网络安全分析及防护策略[J].中国公共安全(学术版),2008(Z1):104-106. 被引量:15
  • 2曹立明.计算机网络信息和网络安全及其防护策略[J].三江高教,2006,0(Z2):111-116. 被引量:19
  • 3陈世伟,熊花.大学生网络信息安全教育探析[J].武汉科技学院学报,2005,18(1):101-103. 被引量:35
  • 4骆懿玲.大学生网络安全意识现状调查及对策[J].中山大学学报论丛,2006,26(12):105-107. 被引量:14
  • 5HANDLEY M, PAXSON V, KREIBICH C. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics[A]. Proceedings of the 10th USENIX Security Symposium[C]. Washington D C, 2001. 159-167.
  • 6MAHONEY M, CHAN P. Detecting Novel Attacks by Identifying Anomalous Network Packet Headers[R]. Technical Report CS-2001-2, Florida Institute of Technology, 2001.
  • 7BETTATI R, ZHAO W, TEODOR D. Real-time intrusion detection and suppression[A]. Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring[C]. Santa Clara, CA, April 1999.
  • 8COHEN W. Fast effective rule induction[A]. Proceedings of the Twelfth International Conference on Machine Learning[C]. Lake Tahoe, CA, 1995. 115-123.
  • 9LIPPMANN R, et al. The 1999 DARPA Off-Line Intrusion Detection Evaluation[M]. Draft of Paper Submitted to Computer Networks, 2000. 1-20.
  • 10ALLEN J, CHRISTIE A, FITHEN W, et al. State of the Practice of Intrusion Detection Technologies[R]. Carnegie Mellon University/Software Engineering Institute Technical Report CMU/SEI-99-TR-028, Jan 2000.

共引文献252

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部