Proceedings of the 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016)

Discussion on Several Typical Computer Network Security Technologies in China

Authors
Liangying Chen
Corresponding Author
Liangying Chen
Available Online December 2016.
DOI
https://doi.org/10.2991/iceeecs-16.2016.86How to use a DOI?
Keywords
Firewall technology; Virus protection technology; Virtual private network technology.
Abstract
The application and development of computer technology have driven and promoted the change of information technology. The computer and information technology have a wide range of penetration and affinity, which influences the world economy and social development in all aspects. In twenty-first Century, the human life will be more closely linked to the Internet, and more closely related, such as electronic commerce, information platform, etc. However, all kinds of problems arise, for example, there are many threats and attacks existing in the Internet, making the network security damaged, which can cause the disclosure of information, and the system platform and the network resources are under attack. In consequence, in terms of how to ensure the information is sent and received truly, completely, effectively and legally, the issue of network security has become a current research hot-spot. This paper, in allusion to this problem, introduces and analyzes several typical computer network security technologies, including firewall technology, virus protection technology, and virtual private network technology, also called VPN technology.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016)
Part of series
Advances in Computer Science Research
Publication Date
December 2016
ISBN
978-94-6252-265-7
ISSN
2352-538X
DOI
https://doi.org/10.2991/iceeecs-16.2016.86How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Liangying Chen
PY  - 2016/12
DA  - 2016/12
TI  - Discussion on Several Typical Computer Network Security Technologies in China
BT  - 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016)
PB  - Atlantis Press
SN  - 2352-538X
UR  - https://doi.org/10.2991/iceeecs-16.2016.86
DO  - https://doi.org/10.2991/iceeecs-16.2016.86
ID  - Chen2016/12
ER  -