Analysis of Network Security in Daily Life

Jinliang Shen, Shiming Gong, Wencong Bao

Article ID: 408
Vol 1, Issue 1, 2018

VIEWS - 916 (Abstract) 571 (PDF)

Abstract


From the beginning of the new century to the rapid development of global information technology today, with the popularity of the Internet and the rapid construction of information technology, more and more people involved in the use of the Internet. Especially in the past two years, online surfing, e-commerce, online chat, e-government, Internet banking, online shopping transactions, online games, this series of network activities, has become a hot application of today's society. With the increasing reliance on the network and information technology in all aspects of society, the network has become an indispensable part of work and life for most people. The rapid development of the network brings closer the distance between real life and virtual world, changed the way people work, study and live. It can be sure that now the human life becomes more relaxed because of network. However, the network has brought us great convenience, but also brought some difficulties. Due to the design defects of the Internet itself and its complexity, openness and expanding of the software scale, the application is more and more complex, making the hidden danger of the network increased dramatically. Therefore, the security of the network has become one of the important factors hindering the process of information technology. Today, for many users, they know that they are facing a certain network threat. But from where, what will happen, are not very clear for many people. Generally speaking, ordinary network users mainly face Internet security issues. Computer viruses, cyber scams, data loss, botnets, phishing, privacy leaks, are a few example of network security threats. The recent impact of large events, such as: Panda burning incense virus, Trojan industry chain exposure, once macro virus, Trojan horse site-linked malware, makes the network security issues become the focus of attention, even to worldwide audience.

Full Text:

PDF


References


1. Wang Shujiang, ed. Super network management must learns: network security. Beijing Machinery Industry Press, 2007-9,

2. ISBN: 978-7-111-22273-6

3. Wang Peichang, ed. Computer virus secret and confrontation. Electronic Industry Press, 2011-10-1, ISBN: 978-7-121-14605-3

4. Liu Baoxu, Jiang Wenbao. Wang Xiaizhen, ed. Active defense on hacking. Beijing Electronic Industry Press, 2007-11 ISBN: 978-7-121-05103-6

5.

6. Wang Shan, Li Guangpeng, Shi Yanyan, ed. Internet age life security strategies. Mechanical Industry Press. 2011-1, ISBN: 978-7-111-32420-1

7. Shuai Qinghong, ed. Institutions of higher learning e-commerce professional planning teaching materials: online payment and

8. online banking. Mechanical Industry Press. 2010-4-1, ISBN: 978-7-111-30379-4

9. Du Weifeng, Liu Wenting, Wang Dada, ed. Enjoying electronic payments: A complete guide. China Railway Publishing House.

10. -2-1, ISBN: 978-7-113-13875-2

11. Wang Jigang, ed. Mobile phone virus exposure. Xi'an Jiaotong University Press. 2009-10, ISBN: 978-7-560-53220-2


Refbacks

  • There are currently no refbacks.




Creative Commons License

This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.