首页 | 本学科首页   官方微博 | 高级检索  
     

如何构建网络环境下的计算机信息安全体系
引用本文:孙登昕.如何构建网络环境下的计算机信息安全体系[J].网络安全技术与应用,2014(3):142-142,144.
作者姓名:孙登昕
作者单位:中国人民银行巨野县支行,山东274900
摘    要:计算机技术的不断发展,网络的不断普及,在给我们的工作,学习,生活,娱乐带来了极大的方便和好处同时,也给我们带来了新的威胁,那就是计算机系统安全问题。而我们的常常讨论的计算机系统安全包括计算机安全、网络安全和信息安全。其中信息安全是主线,它贯穿于计算机安全和网络安全之中。正是网络的广泛应用,在工作和生活中扮演如此重要的角色,如何来保障信息安全已经成为一个重要的问题。值得注意的是在实际应用中,由于操作系统的不同,网络拓扑技术的区别,连接介质的选择,网络接入技术的变化给实现计算机系统安全带来了复杂的操作性。根据参考资料,总结出3个层次的安全策略:技术安全,行为安全,意识安全。

关 键 词:构建网络环境  计算机信息  安全体系

How to build computer information security system under the network environment
Sun Dengxin.How to build computer information security system under the network environment[J].Net Security Technologies and Application,2014(3):142-142,144.
Authors:Sun Dengxin
Affiliation:Sun Dengxin
Abstract:the development of computer technology, network expansion, to our work, study, life, entertainment has brought great convenience and benefits at the same time, also brought us a new threat, that is computer system security.And we often discuss the computer system security including computer security, network security and information security.Information security is the main line, it through the computer security and network security.Internet is widely used in such an important role in the work and life, how to protect information security has become an important problem.It is worth noting that in actual application, because of the different operating systems, network topology technology, the difference between a connection medium choice, the change of network access technology to achieve computer system security complex interoperability.According to the resources, summarizes the three levels of security strategy: technology security, safety, safety consciousness.
Keywords:to build network environment  The computer information  Security system
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号