Research on Enterprise Computer Network Security Protection Technology Based on Information Technology
As information technology slowly penetrates into people's daily lives, the application range of computer networks has become wider and wider, becoming one of the indispensable communication methods for people. The popularization of computer networks in the information age has brought great conv...
Saved in:
Published in | 2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE) pp. 488 - 491 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
20.11.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | As information technology slowly penetrates into people's daily lives, the application range of computer networks has become wider and wider, becoming one of the indispensable communication methods for people. The popularization of computer networks in the information age has brought great convenience to people on the one hand, but also has major hidden dangers that damage public privacy and safety. Enterprises must not only rely on computer networks and databases to share data, but also protect sensitive and valuable data from being stolen or tampered with. By trying to analyze the current status of information security protection strategies, this paper proposes an information security evaluation method in a complex network environment to guide information security protection work and provide a reference for evaluating the effectiveness of network protection. |
---|---|
DOI: | 10.1109/AUTEEE50969.2020.9315704 |