Analysis of Factors Influencing Computer Network Security Technology
نویسندگان
چکیده
With the advent of information age, development internet and computer technology has brought new opportunities challenges to various industries, also changed people's lives. Whether it is economy, politics, culture, they have all become faster with platforms, world gradually a whole, allowing people from over achieve real-time communication. Of course, times, networks encountered some problems, which been exploited by illegal elements, resulting in network crises posing huge security. Based on this, this article provides detailed analysis influencing factors security technology, uncovers existing explores corresponding directions, providing certain countermeasures.[1]
منابع مشابه
analysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولAnalysis of Factors Influencing Food Security Status of Female Headed Farm Households in Abia State, Nigeria
This study analysed factors influencing food security status of female headed farm households in Abia state, Nigeria. Multistage random sampling technique was employed in selecting 240 female headed farm households from whom data were collected using structured questionnaire. Data collected were analyzed using descriptive statistics, food security indices and probit regression technique. Result...
متن کاملFolk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk
There are several standard approaches to risk analysis recommended for use in information security, however, the actual application of risk analysis by security analysts follows an opaque mix of standard risk analysis procedures and adaptations based on an analyst’s understanding of risk. We refer to these approaches as Folk Risk Analysis. To understand folk risk analysis, we present the result...
متن کامل" Computer Network Security "
The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security. 1 What the book is about The book is intended as a textbook for a one-...
متن کاملComputer Security Technology Planning Study
Details of a planning study for USAF computer security requirements are presented. An Advanced development and Engineering program to obtain an open-use, multilevel secure computing capability is described. Plans are also presented for the related developments of communications security products and the interim solution to present secure computing problems. Finally a Exploratory development pla...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of electronics and information science
سال: 2023
ISSN: ['2371-9524', '2371-9532']
DOI: https://doi.org/10.23977/jeis.2023.080301