Research on Network Security Management Technology
DOI: 10.23977/acss.2023.070405 | Downloads: 3 | Views: 137
Yuan Yuan 1
1 Xinjiang University of Political Science and Law, Tumushuk, 844000, China
Corresponding AuthorYuan Yuan
Network security management technology mainly refers to a technical form to protect the data and information security of computer networks when transmitting and storing information. It has been widely used with the popularization of computers. However, in this context, computer networks have also encountered many security threats, which has gradually attracted people's attention to computer network security management technology to ensure computer network security. In view of this, this paper will analyze the computer network security management technology for your reference only.
KEYWORDSNetwork security, management technology, study
CITE THIS PAPER
Yuan Yuan. Research on Network Security Management Technology. Advances in Computer, Signals and Systems (2023) Vol. 7: 38-42. DOI: http://dx.doi.org/10.23977/acss.2023.070405.
 Yan Li. Application Analysis of Computer Information Management Technology in Network Security. Academic Journal of Engineering and Technology Science, 2019, 2(5).
 Jianlei Zhou. Discussion on the Technology and Method of Computer Network Security Management. IOP Conference Series: Materials Science and Engineering, 2017, 242(1).
 Wei Jiang. Study on the application of computing cloud technology in network security management system. Bio Technology: An Indian Journal, 2014, 10(13).
 Almorsy M., Grundy J., & Müller I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
 Catteddu D. (2009). Cloud Computing: benefits, risks and recommendations for information security. In Iberic Web Application Security Conference, Springer, Berlin, Heidelberg, 17-17.
 Dawoud W., Takouna I., & Meinel C. (2010). Infrastructure as a service security: Challenges and solutions. In the 7th International Conference on Informatics and Systems (INFOS), 1-8.