ArticleOpen Access http://dx.doi.org/10.26855/aitcs.2024.12.002
Computer Network Information Security and Encryption Technology
Shengzhi Zhu, Xiaoman Qiu, Yuanchao Qi
Wuhan Donghu University, Wuhan 430212, Hubei, China.
*Corresponding author: Shengzhi Zhu
Published: November 26,2024
Abstract
Computers have become common equipment in all fields of society and are of great significance to promoting social development. Because the network is open and complex, it will also be threatened by many factors during the operation of computer networks, such as hacker attacks, network viruses, system vulnerabilities, etc. In order to effectively protect the information security of users, computer network security protection should be strictly carried out to meet the diversified and personalized use needs of users. With the improvement of technical level, network threats also show diversified characteristics. It is necessary to continuously optimize data encryption methods and carry out technological innovation to adapt to the characteristics of current network threats and enhance system protection capabilities.
Keywords
Computer; network information security; encryption technology
References
[1] Du Mingming. Discussion on computer network information security and encryption technology[J]. Digital Communication World, 2022(07):76-78.
[2] Lin Wei, Zhang Yuxi, Zhang Chi. Application of data encryption technology in computer network information security[J]. Wireless Internet Technology, 2022, 19(13): 27-29.
[3] Wang Shuman. Analysis of data encryption technology in computer network information security[J]. Electronic Test, 2022, 36(07): 86-88.
[4] Zou Jiabin. Research on data encryption technology in computer network information security[J]. China High-tech, 2022(02):42-43.
[5] Wang Qin. Discussion on computer network information security and encryption technology[J]. Science and Technology Innovation and Application, 2021, 11(33): 90-92+96.
[6] Chen Yumei. Application of data encryption technology in computer network information security[J]. Digital Technology and Application, 2021, 39(03): 174-176.
[7] Wen Zhu. Analysis of application countermeasures of data encryption technology in computer network security[J]. Electronic Technology and Software Engineering, 2020(17):259-260.
[8] Zhang Fangkun, Wang Hongyan. On the impact of encryption technology on computer network security[J]. China New Technologies and New Products, 2020(15):139-140.
How to cite this paper
Computer Network Information Security and Encryption Technology
How to cite this paper: Shengzhi Zhu, Xiaoman Qiu, Yuanchao Qi. (2024) Computer Network Information Security and Encryption Technology. Advance in Information Technology and Computer Science, 1(1), 5-7.
DOI: http://dx.doi.org/10.26855/aitcs.2024.12.002