magazinelogo

Advance in Information Technology and Computer Science

ISSN Online: 3066-3156 CODEN:
Frequency: Instant publication Email: AITCS@hillpublish.com
Total View: 73686 Downloads: 6394 Citations: 0 (From Dimensions)
ArticleOpen Access http://dx.doi.org/10.26855/aitcs.2024.12.002

Computer Network Information Security and Encryption Technology

Shengzhi Zhu, Xiaoman Qiu, Yuanchao Qi

Wuhan Donghu University, Wuhan 430212, Hubei, China.

*Corresponding author: Shengzhi Zhu

Published: November 26,2024

Abstract

Computers have become common equipment in all fields of society and are of great significance to promoting social development. Because the network is open and complex, it will also be threatened by many factors during the operation of computer networks, such as hacker attacks, network viruses, system vulnerabilities, etc. In order to effectively protect the information security of users, computer network security protection should be strictly carried out to meet the diversified and personalized use needs of users. With the improvement of technical level, network threats also show diversified characteristics. It is necessary to continuously optimize data encryption methods and carry out technological innovation to adapt to the characteristics of current network threats and enhance system protection capabilities.

Keywords

Computer; network information security; encryption technology

References

[1] Du Mingming. Discussion on computer network information security and encryption technology[J]. Digital Communication World, 2022(07):76-78.

[2] Lin Wei, Zhang Yuxi, Zhang Chi. Application of data encryption technology in computer network information security[J]. Wireless Internet Technology, 2022, 19(13): 27-29.

[3] Wang Shuman. Analysis of data encryption technology in computer network information security[J]. Electronic Test, 2022, 36(07): 86-88.

[4] Zou Jiabin. Research on data encryption technology in computer network information security[J]. China High-tech, 2022(02):42-43.

[5] Wang Qin. Discussion on computer network information security and encryption technology[J]. Science and Technology Innovation and Application, 2021, 11(33): 90-92+96.

[6] Chen Yumei. Application of data encryption technology in computer network information security[J]. Digital Technology and Application, 2021, 39(03): 174-176.

[7] Wen Zhu. Analysis of application countermeasures of data encryption technology in computer network security[J]. Electronic Technology and Software Engineering, 2020(17):259-260.

[8] Zhang Fangkun, Wang Hongyan. On the impact of encryption technology on computer network security[J]. China New Technologies and New Products, 2020(15):139-140.

How to cite this paper

Computer Network Information Security and Encryption Technology

How to cite this paper: Shengzhi Zhu, Xiaoman Qiu, Yuanchao Qi. (2024) Computer Network Information Security and Encryption Technology. Advance in Information Technology and Computer Science, 1(1), 5-7.

DOI: http://dx.doi.org/10.26855/aitcs.2024.12.002