Research on Enterprise Computer Network Security Protection Technology Based on Information Technology

As information technology slowly penetrates into people's daily lives, the application range of computer networks has become wider and wider, becoming one of the indispensable communication methods for people. The popularization of computer networks in the information age has brought great conv...

Full description

Saved in:
Bibliographic Details
Published in2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE) pp. 488 - 491
Main Authors Guo, Yue, Xu, Jie, Yuan, Hui, Zhuang, Yan, Zhu, Guowei, Zhang, Yintie
Format Conference Proceeding
LanguageEnglish
Published IEEE 20.11.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:As information technology slowly penetrates into people's daily lives, the application range of computer networks has become wider and wider, becoming one of the indispensable communication methods for people. The popularization of computer networks in the information age has brought great convenience to people on the one hand, but also has major hidden dangers that damage public privacy and safety. Enterprises must not only rely on computer networks and databases to share data, but also protect sensitive and valuable data from being stolen or tampered with. By trying to analyze the current status of information security protection strategies, this paper proposes an information security evaluation method in a complex network environment to guide information security protection work and provide a reference for evaluating the effectiveness of network protection.
DOI:10.1109/AUTEEE50969.2020.9315704