About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Application of Big Data, Blockchain, and Internet of Things for Education Informatization. Second EAI International Conference, BigIoT-EDU 2022, Virtual Event, July 29–31, 2022, Proceedings, Part I

Research Article

Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm Education

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-23950-2_66,
        author={Meng Teng},
        title={Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm Education},
        proceedings={Application of Big Data, Blockchain, and Internet of Things for Education Informatization. Second EAI International Conference, BigIoT-EDU 2022, Virtual Event, July 29--31, 2022, Proceedings, Part I},
        proceedings_a={BIGIOT-EDU},
        year={2023},
        month={1},
        keywords={Computer network Information security Protection strategy},
        doi={10.1007/978-3-031-23950-2_66}
    }
    
  • Meng Teng
    Year: 2023
    Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm Education
    BIGIOT-EDU
    Springer
    DOI: 10.1007/978-3-031-23950-2_66
Meng Teng1,*
  • 1: Hunan Foreign Language Vocational College of China, Changsha
*Contact email: tmeng123@sina.com

Abstract

Computer network information security management is an important problem to be solved in China. The effective protection of computer network information security depends on the perfect deployment of computer network security information protection strategy. Computer network security information protection strategy is one of the key research projects in China. According to the relevant standards and regulations, this paper analyzes the current situation of computer network information security protection strategies, studies several common security protection strategies and the evaluation algorithm of relevant computer network information security insurance, so as to guide and prevent the security management of public network information system.

Keywords
Computer network Information security Protection strategy
Published
2023-01-12
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-23950-2_66
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL