期刊文献+

企业办公计算机网络安全防范及应对对策

Enterprise Office Computer Network Security Precautions and Countermeasures
下载PDF
导出
摘要 随着社会经济的飞速发展和互联网的逐渐普及,信息工程逐步进入深入开展阶段,办公网络在社会各界所有领域内都是十分关键的部分,作为现代化信息的核心载体,如何防范办公计算机在日常运行中不受各种黑客侵袭,是现阶段亟待解决的巨大难题。进行计算机网络安全保护,主要从物理安全和逻辑安全两方面着手,确保计算机网络数据真实性、可控性、可用性、保密性和完整性,本文简要描述计算机网络安全保护过程中常见问题及解决对策。 With the rapid development of social economy and the gradual popularization of the Internet,information engineering has gradually entered an in-depth development stage.The office network is a key part in all fields of society.As the core carrier of modern information,how to prevent office computers from being It is a huge problem that needs to be solved at this stage in the daily operation without being attacked by various hackers.Computer network security protection is mainly carried out from physical security and logical security to ensure the authenticity,controllability,usability,confidentiality and integrity of computer network data.This paper briefly describes the common problems and solutions in the process of computer network security protection..
作者 陈洁敏 CHEN Jie-min(Tangshan Branch of China Mobile Railing Co.,Ltd.,Tangshan Hebei 063000)
出处 《数字技术与应用》 2019年第1期214-214,216,共2页 Digital Technology & Application
关键词 办公室 计算机系统 网络安全 解决对策 office computer system network security solution
  • 相关文献

参考文献3

二级参考文献10

  • 1.EPC Class 1 Gen 2 standard[]..
  • 2Duc D N,Park J,Lee H, et al.Enhancing Security of EPCglobal GEN-2RFID Tag Again Traceability and cloning[].Proceedings of theSymposium on Cryptography and Information Security.2006
  • 3Chien H Y,Chen C H.Mutual authentication protocol forRFID conforming to EPC class 1 generation 2 standards[].Computers and Standards.2007
  • 4OHKUBO M,SUZUKI K,KINOSHITA S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[].Proceedings of theSy mposium on Cr y ptog raphy and Information Security.2004
  • 5Konidala D M,Kim K.RFID Tag-Reader Mutual Authentication Scheme Utilizing Tag’’s Access Password[].Auto-ID Labs White Pa per.2007
  • 6Selwyn Piramuthu.RFID mutual authentication protocols[].Decision Support.2011
  • 7袁署光,戴宏跃,赖声礼.基于Hash函数的RFID认证协议[J].计算机工程,2008,34(12):141-143. 被引量:18
  • 8孙博成.计算机操作系统安全设置问题探析[J].科技经济市场,2015(11):18-18. 被引量:2
  • 9张翰英,张艳华.计算机安全弱点及应对策略研究[J].通讯世界,2017,23(3):102-102. 被引量:1
  • 10杨键,韩冬.计算机安全弱点及其对应关键技术分析[J].电脑知识与技术(过刊),2016,22(3X):64-66. 被引量:2

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部