While computer technology brings convenience to people, various computer network security problems also arise, which seriously affects information security.
While computer technology brings convenience to people, various computer network security problems also arise, which seriously affects information security. Computer virus is a common security problem, and strengthening its prevention is the premise of reducing computer security problems. The following is what I arranged for you for your reference.
Chapter 1 "Computer Network Security and Application Analysis"
The arrival of the computer information age has broadened people's horizons and enriched people's lives, but the security and application of computer networks have become a major problem in front of people. The main content of this paper is to analyze the security and application strategy of computer network, so as to reduce the harm of network threats.
Keywords: computer; Network; Security; Harm; Sensitization technology; firewall
Computer network security has seriously threatened users' property and information security. In order to optimize the computer application environment, protect users' property and information security, and further enhance the value of computers to social production activities, effective preventive measures must be taken for computer network security.
1 Computer Network Security and Hazard Factors
Internet itself is a network system that is fully open to the outside world, and its wide use and convenient advantages provide convenience for information distortion. Throughout today's society, people's life, production and study are inseparable from computers and networks, so how to effectively do a good job in computer network security and application has become an urgent key issue.
1. 1 Computer Network Security Analysis
Computer network security mainly includes computer hardware protection, software maintenance and network system security management. Therefore, as long as we correctly and effectively grasp the law of computer network security, do a good job in computer protection and improve computer resistance, then all kinds of external violations can be effectively prevented.
1.2 Threatening factors of computer network security
Computer network security is a complex and comprehensive content. Generally speaking, it mainly includes human factors and accidental factors. Among them, human factors are the most threatening factors, such as tampering with computer internal information, stealing other people's resources, compiling computer viruses and so on. At the same time, the computer itself has some solid-state weaknesses. Because of the freedom and internationalization of the network itself, unauthorized users can often use the weakness of computers to access internal information, which eventually leads to serious problems. Specifically, the factors that threaten computer network security mainly include the following aspects:
1.2. 1 computer virus
Computer virus computer virus is the main factor that endangers network security, and it is highly concealed, contagious, latent and destructive. Hard disk, CD-ROM, USB flash drive and Internet are the main ways of virus transmission. It destroys computer resources, and at least it takes up resources and slows down the computer. At the same time, it destroys fields and data, damages computer hardware and causes irreparable losses. Judging from the development trend of virus, the manufacturing technology of virus has not changed fundamentally here in recent years, but the way and purpose of destruction have changed a little. Virus manufacturing has formed an assembly line and achieved modularization. There are more people involved in this assembly line, so the virus is made and spread faster. There is also a trend of zero-day attacks. At present, the mainstream method of virus manufacturing and spreading is to exploit vulnerabilities. In the past, only worms used vulnerabilities in the system to attack, but now more than 60% of viruses spread by using vulnerabilities in the operating system or application software. The first link in the virus industry chain is the vulnerability. Now, someone specializes in collecting loopholes. As soon as a loophole in a certain software comes out, someone finds this loophole and transfers it to another group of people for analysis, making corresponding viruses and Trojans. In this way, less than a day after the vulnerability came out, attacks and threats came out immediately, resulting in a zero-day attack.
1.2.2 hacker
The word hacker is a well-known word in today's society, which mainly refers to criminals logging into other people's network servers without their consent or permission to change and destroy the information inside the network. Usually, hackers mainly steal computer information and seize computer control through Trojan horse programs or virus implantation.
1.2.3 The computer protection mechanism is not enough.
Because the computer network itself has a strong openness and universality, there are certain security risks in information transmission itself. At present, most computers in China do not pay attention to security in data transmission, which leads to the lack of self-protection mechanism and information loss.
2 computer network security precautions
In the process of accelerating informatization, computer applications are becoming more and more popular, which also attracts people's attention to computer information security. How to better ensure the security, accuracy and integrity of information transmission under the computer network environment has become the focus of industry research. In order to better and more effectively ensure the security of computer network information, we currently use the following technologies.
2. 1 Strengthen the firewall
Firewall is the main security measure of today's computer network. It is combined according to the requirements of different networks in specific settings, so as to protect computer network information, organize people who are not allowed to enter the computer from the outside, and effectively manage the access rights of computer networks.
2.2 Set computer access rights
Network resources mainly include * * * shared files, * * shared printers, network communication equipment and other resources that network users can use. The ownership of resources reflects the affiliation of different users to resources, such as creators, modifiers and members of the same group. Resource attributes represent the access characteristics of the resource itself, such as who can read, write or execute it. Access rights are mainly reflected in the user's availability of network resources. Using the owner, attribute and access right of specific network resources, the security of network system can be effectively controlled at the application layer.
2.3 Computer information encryption
Any good security system must include encryption! This has become an established fact. Digital signature is a method used by the receiver of data to verify whether the sender of data is correct, which is mainly realized by encryption algorithm and verification protocol.
2.4 virus prevention technology
Computer virus is one of the main factors that endanger network security. It is necessary to know the common viruses and master certain preventive measures, so as to find the viruses at the first time and deal with them quickly. We can take the following measures to prevent viruses: such as encrypting and executing programs, monitoring the system and controlling reading and writing.
2.5 to carry out computer network security education
Educate computer users in the legal system, so that users can clearly understand the rights and obligations of computer applications, so that everyone can abide by the information legal system and the principle of legal users, consciously fight against illegal and criminal acts, and consciously safeguard the security of network information. Computer network security is a complex system engineering, which cannot be effectively solved by a single technology or individual. Only by grasping it as a whole can management and technology be combined to jointly deal with the increasingly rampant computer crimes and computer viruses. For netizens, it is necessary to learn computer security knowledge and good online habits. Strictly do a good job of antivirus when starting, timely backup data, encryption prevention. By installing virus firewall, filtering in real time, scanning and detecting network files regularly, surfing the Internet healthily, learning network knowledge, and maintaining computer security to a higher degree, it is also a guarantee for your work and study.
3 Computer application
Due to the rapid development of computer network, the application of computer information is gradually popularized. However, if information is spread and enjoyed on the public network platform, it will be eavesdropped or stolen by some lawless elements, which will lead to the loss of customer information and bring unnecessary influence to people. If we reduce the use of the Internet due to security factors, it will bring great trouble to the current information development. Therefore, we must adopt a series of measures to enhance the security of computer networks to ensure the normal operation of the system. Computer identity authentication technology, computer encryption technology and firewall technology are the basis of protecting computer network security, while effectively improving network security. It is everyone's responsibility to maintain computer network security. For computer users, computers have their convenience and fragility, so we must conscientiously fulfill the obligations and responsibilities of a netizen. From the popularization of computer security knowledge to the rational operation of computer science, we can truly protect network information, put an end to network crimes, enhance political awareness and be a self-disciplined and legal computer user.
4 conclusion
In short, the widespread use of computers in today's society has brought us a lot of convenience, and at the same time, computer network security has also caused us many security risks. Only by constantly updating the technology can the computer network security be prevented from being infringed, and the improvement of the network management system is also an essential measure.
refer to
[1] Yang Yongxu. The present situation of firewall technology in network security application [J]. Gansu Science and Technology, 20 1424.
[2] Li Ren, Dai. On network security and defense [J]. Knowledge economy, 20 12 13.
[3] Feng Tiecheng. Computer Network Security Technology [J]. Friends of Chemical Industry, 20 13 1.
Chapter 2 "Research on Network Security Management of Hospital Information System"
With the development of computer network technology, the application of network technology is more and more extensive, and the development of network application of hospital information system is also changing with each passing day. The development of network technology is bound to be accompanied by security issues, and the network security management of hospital information system has been paid more and more attention. How to ensure the security of information system in the existing information society, and what measures can be taken to ensure the safe and reliable implementation of hospital information system network? From the perspective of network security, this paper discusses the current network security management of hospital information system and puts forward some countermeasures on how to strengthen network security management.
Keyword information system; Network technology; safety management
At present, with the continuous development of computer technology, the use of computer information systems has penetrated into various fields. The hospital information system is also developing constantly, from the initial stand-alone to the later regional network, and then to the current regional network, and has established contacts with various medical institutions in China through the WAN. This is also to better integrate and share medical information resources, which is convenient for management and improves the efficiency of the hospital. However, although the use of information systems has many benefits, it still cannot avoid some problems, and network security is one of the most important issues. We need to discuss this problem, find out the problem and solve it.
1 Overview of network security of hospital information system
1. 1 network security and network management
1. 1. 1 network security
Network security refers to the problem that the network system and the data information in the system will not be changed, destroyed or leaked, which can effectively ensure the contact reliability of the whole system.
1. 1.2 network management
Network management, as its name implies, refers to the supervision and control of network communication information to ensure the stability and reliability of network system implementation and solve problems in network implementation in time.
1.2 The importance of network security
The network security of hospital information system is the most important, including system security and information security, both of which depend heavily on computer system, so network system is the key to ensure the stability and security of hospital information system. Once there is a problem with the network, it may cause the hospital information system to fail to operate normally, making the hospital's various businesses unable to carry out normally. Due to the serious network failure, data loss will cause serious losses to the hospital.
2. Security problems faced by hospital information system
2. 1 natural disasters
The damage caused by natural disasters is mostly physical damage to computer equipment. The main natural disasters are fire, flood and earthquake.
2.2 man-made destruction
Man-made destruction can be divided into false destruction or subjective destruction. Equipment failure caused by human misoperation or data loss caused by virus intrusion will also pose a threat to network security; Man-made subjective destruction, such as some hacker attacks, data transactions, etc.
2.3 Technical risks
Hospital information system itself is not a simple technical activity, because the instability of the system caused by its own defects or imperfect applications is also a common failure factor, and some external factors, such as computer room environment and site conditions, may also bring security threats to the network, which requires effective technical support.
2.4 Management issues
Management problems mainly include: improper management control, unclear rights and responsibilities, and lack of a sound management system. These problems need to be paid attention to by hospitals, and relevant security and confidentiality systems should be established to restrain them and strengthen safety management.
3. Measures to strengthen the network management of hospital information system
3. 1 Security Maintenance of Network Equipment
The security of equipment is the basis of the implementation of network information system. The information system of the hospital network center has strict requirements on the working environment, so maintaining the safety of equipment is an important guarantee to ensure the reliability and security of the information system. On this basis, it is necessary to strengthen the regular inspection and maintenance of core equipment and upgrade the software regularly to effectively ensure the accuracy of network information.
3.2 Strengthen technical support
3.2. 1 Install antivirus software.
We can provide technical support for computers and software by using anti-virus software to clean up the virus regularly, mostly adopting preventive strategies and updating the virus database in time, which can further strengthen the security and reliability of the network and nip in the bud.
3.2.2 Strengthen firewall settings
The firewall is set to ensure that the internal and external networks will not be invaded by others at will, which plays the role of isolation and is also a security barrier. The firewall strengthens the audit control of visiting users and avoids the damage or interference caused by some hackers' illegal entry.
3.3 Network Access Protection
The protection of network access is increased by restricting the permission right, and the information operators are effectively regulated by controlling the permission right, so the management is more targeted. By standardizing the operation of users' access rights, misoperation can be better avoided, thus ensuring the security of the network.
3.4 Develop a strict management system
The hospital has formulated a set of perfect network security management system, standardized information operation flow, computer room management, data protection, network supervision and other systems, and put them in place. By emphasizing the importance of network security to hospital employees, we can further improve their awareness of network security and consciously abide by various rules and regulations.
3.5 plus? A href ='' target =' _ blank'> Cough? /p & gt;
Employees' operation of information system can be regarded as man-machine dialogue. In order to ensure the accuracy of man-machine dialogue, employees need to operate correctly. Therefore, hospitals need to train employees on computer system knowledge regularly, so that employees can be familiar with the operation process of the system and improve the related operation level and network use safety awareness.
4 conclusion
To sum up, we can know that the hospital network information system is a very important part of the whole hospital management system, and its stability and security will directly affect the overall level of the hospital. Of course, the hospital also needs to establish a set of information system suitable for itself according to its own conditions, formulate the overall security management strategy in line with its own hospital network according to the actual situation of the network, and put it in place, so as to improve the security of the hospital network information system and ensure the stable implementation of the hospital network system and the security of core data. As far as information systems are concerned, there is no absolute security, only relative security. Only by making full use of advanced technology, paying attention to the construction of single point failure, strengthening safety awareness and strengthening network management can we ensure the safe implementation of hospital network.
refer to
Luo Xiaolin. On the network security and management of hospital information system [J]. Fujian Brain, 20 1 1, 274:495 1.
[2] Huang Wei. Network security and management in hospital information system [J]. Network security technology and application, 20 10 12: 22 ~ 24.
[3] Liu Xiaozhen. On the Network Security of Hospital Information System [J]. Science and Technology Innovation Guide, 20 1 124: 23.
[4] Song Yingjie and Yu Mingzhen. Network Security Management and Maintenance of Hospital Information System [J]. China Modern Doctor, 2007,4517:104,10.
Shen Kun, Song Yang. Safety construction and management of hospital information system [J]. China Medical Devices, 20 1 1, 266: 67 ~ 69.
Chapter III "Analysis of Wireless Network Security in Secondary Vocational Schools"
Campus network is an important part of campus study and life. The application of campus network improves the informatization level of secondary vocational schools and contributes to the development of education. However, with the gradual realization of campus wireless network coverage, school education and teaching have been greatly facilitated, but there are also some network security risks, and many potential network security problems have gradually emerged. In view of these problems, this paper analyzes and discusses the campus wireless network security of secondary vocational schools.
Keywords: secondary vocational school; Wireless network; Network security
1 Current situation of campus wireless network in secondary vocational schools
1. 1 wireless network overview
Wireless LAN is an extension of traditional wired network. It is a huge information carrier with resources, which connects computers and electronic communication equipment through wireless technology. It is a very convenient data transmission system, which replaces the traditional twisted-pair copper cable and uses radio frequency. Radio frequency technology constitutes a regional network. Wireless LAN is the supplement and extension of wired LAN. The development of wireless local area network makes it possible for communication to be mobile and personalized.
1.2 the necessity of wireless network application in secondary vocational schools
1.2. 1 modern teaching needs
Using wireless network in secondary vocational schools is the need to realize modern teaching. In the current school teaching, the use of information technology resources has received great attention. Through inquiry learning, students can enhance their autonomous learning ability while mastering the knowledge content. In the teaching process, teachers use the Internet to add some animation, audio, video, web pages and other files, and combine these pictures, words, sounds, videos, animation and other multimedia elements to assist the teaching process and reserve teaching resources, thus improving students' practical operation ability.
1.2.2 Need to study professional courses.
Using wireless network in secondary vocational schools is the need for students to study professional courses. Students in secondary vocational schools require strong hands-on ability, so many of their professional courses are arranged in the training room or outdoors, and the use of wired networks in these areas is restricted, so it is impossible to realize interactive teaching between teachers and students. Therefore, it is necessary to use the wireless campus network. Using wireless network, all kinds of mobile devices can connect to WiFi anytime and anywhere, and surf the Internet easily anytime and anywhere, which is convenient for course learning.
1.2.3 to meet the needs of mobile office.
Using wireless network in secondary vocational school campus is the need to realize mobile office. With the continuous development of communication technology, more and more people have mobile phones, tablet computers and notebook computers. Especially on campus, the usage rate of these electronic products is very high. Through the use of wireless network, teachers can carry out mobile office, get the required resources and information anytime and anywhere, send and receive e-mails and carry out remote control, thus realizing mobile office and improving work efficiency.
1.2.4 temporary activity needs
In the process of running a school, secondary vocational schools have always carried out various exchange activities with relevant schools and conducted inspection and exchanges. At the same time, many activities have been organized in the school, such as various seminars and student activities. Holding large-scale activities needs to be held in public places on campus, where the use of wired networks will be restricted, which requires the use of wireless networks on campus. By using wireless network technology, the original wired network will be further expanded, and network signals will cover the whole campus to ensure the smooth progress of various activities.
1.3 Application advantages of wireless network in secondary vocational schools
1.3. 1 Easy installation and low cost.
The process of installing wireless network is relatively simple, and it will not be limited by the location of wiring, without large-scale operation and without damaging buildings. Generally, the installation of wireless network can only be completed by installing appropriate AP access point equipment to make the network cover the whole area or building. Once the network fails, it is only necessary to check the situation of the signal receiver and transmitter, and there is no need to find the line that may fail. Moreover, the installation time of wireless network is short, which is 1/3 of the installation time of wired network, so it is convenient to use and saves cost.
1.3.2 has a high transmission rate.
At present, the amount of information in Internet resources is increasing, which requires the network to have a high transmission rate. Wireless network has the advantages of fast transmission speed, strong anti-interference ability and good data confidentiality, and has great transmission advantages. At present, the data transmission rate of WLAN can almost reach 300Mbit/s, and the data transmission distance can reach more than 5 kilometers. Wireless network can basically meet the requirements of campus users in terms of network speed. Campus wireless networks transmit mostly multi-directional or bi-directional multimedia information. 802. 1 1b standard wireless transmission technology can reach the network transmission speed of 1 1Mbps, so it can meet the requirements of campus users in terms of network speed and ensure the use speed of campus network.
1.3.3 is extensible and flexible.
Wireless networks use relay networks, point-to-point and central modes. Users can flexibly choose the networking mode according to their needs, serve several or thousands of users, and freely enter and leave the wireless network. The layout of various network devices and ports in wired networks is fixed, and their movement will be restricted. At the same time, the placement position will also be affected by the location of network information points, and the installation of wireless networks is rarely limited by space. At the same time, the network can be accessed anywhere in the wireless coverage area, and the cable network is flexible in use, wide in transmission range and stable in signal.
2 secondary vocational campus wireless network security issues
In the years of school education informatization construction, the informatization level of school education has been greatly improved, among which the application and development of campus network technology is the most remarkable. Wireless network has the advantages of convenient installation, low cost, high transmission rate, extensible package and flexibility. The application of wireless network in campus has promoted the informatization level of secondary vocational schools to a new level. However, wireless network has been widely used in secondary vocational schools, which brings great convenience to education and teaching. At the same time, there are also some network security risks, and many potential network security problems are gradually emerging, which are more complicated than wired network problems. The security threats of campus wireless network mainly exist in the following aspects:
2. 1 wireless key cracking
Because the wireless network has the characteristics of easy access and openness, it also makes the wireless Internet vulnerable to attacks. According to the monitored wireless communication speed and network signal, illegal users can capture the network data packet in AP signal by cracking the key, and violently crack the WEP key, so that the wireless network encryption key is threatened.
2.2 Illegal user invasion
Wireless network has the characteristics of easy access and openness, which is an open access. Once invaded by illegal users, campus network resources will be used by illegal users, and wireless channel resources will be occupied, which will increase broadband costs and greatly reduce the quality of service used by legitimate users. If illegal users violate the rules or use the Internet illegally, it may involve some legal problems in the school.
2.3 data security
Because the wireless network has the characteristics of easy access and openness, it also makes the wireless Internet vulnerable to attacks. Illegal users can crack the key according to the monitored wireless communication speed and network signals, so that illegal users can access the campus user network, and their data may be maliciously tampered with. Illegal users may use AP to attack and cheat middlemen, or they may double cheat AP or authorized clients, thus threatening the security of data and information, such as being tampered with or stolen.
2.4 Telephone interception and address deception
In the use of campus wireless network, the threat of public telephone interception and address deception is also a very common wireless network security problem. Illegal users will eavesdrop or monitor the wireless network, illegally obtain detailed information such as the user's IP address and MAC address, and then use these information to conduct irregular behaviors such as session interception, address deception, network deception, and network attack, thus threatening the data security of network users.
2.5 denial of service
In the use of campus wireless network, denial of service is a very serious wireless network security problem. Denial of service mainly includes two kinds of attacks. One is that illegal users flood AP to make it refuse to serve. Another attack method is to run out of resources, attacking a node to keep forwarding packets, and finally running out of resources to make it unable to work. Of these two attacks, the first is more serious.
3 secondary vocational campus wireless network security risk prevention measures
With the widespread use of wireless network in secondary vocational schools and the gradual realization of full coverage of wireless network, education and teaching have been greatly facilitated, but there are also some network security risks, and many potential network security problems are gradually emerging, which are more complicated than wired network problems. In view of the above security problems, we can guard against the security risks of wireless network in secondary vocational schools from two angles of management and technology.
3. 1 wireless network management and protection countermeasures
In order to prevent the security risks of wireless networks in secondary vocational schools, network administrators in secondary vocational schools should first construct a wireless network management mechanism to ensure the safety of campus wireless networks, standardize the management of campus wireless networks, and establish and improve the wireless network management system in combination with relevant laws and regulations, so that campus network administrators can effectively manage wireless networks. Then, the security response mechanism of wireless network is constructed. Relevant management departments of campus network establish some standardized processes to detect wireless network signals and information transmission in real time, and deal with wireless network security problems in time, thus effectively solving the unexpected situation of campus wireless network security.
3.2 Wireless Network Technology Protection
3.2. 1 Use encryption technology.
In order to prevent the wireless key from being cracked, one of the effective encryption technologies is WPA encryption technology. WPA is a new encryption method, which can effectively solve the problem of insufficient WEP security in the network, and then use TKIP algorithm to dynamically form 128-bit password, which greatly improves the security of wireless network.
3.2.2 Use professional intrusion detection technology.
In order to prevent the invasion of illegal users, we should use professional wireless network intrusion detection system to control the network, collect data and transmit information in time, improve the detection and monitoring level of campus wireless network users, ensure the safety of important information of legitimate users, and prevent them from being stolen and tampered with by illegal users.
3.2.3 Using user authentication mechanism
In order to prevent illegal users from occupying network resources and effectively protect the security of campus wireless network, user authentication can be used. One method is Web authentication, which assigns addresses to users. When users visit some websites, the relevant authentication systems will be displayed on the page, and users need to enter their user names and passwords to access them. Another way is classified authentication. Because they don't have high security requirements for wireless networks, they can use DHCP+ mandatory portal authentication to connect to campus wireless networks.
refer to
Thank you, Wang Yachao. A New Network Security Situation Awareness Method [J]. Journal of Beijing University of Posts and Telecommunications, 20 14.
[2] Su Junjie. On campus wireless network security [J]. Computer CD-ROM software and application, 20 12, 9:56-57.
[3] Cai Xiangyang. Research on campus wireless network security protection [J]. Journal of Jiujiang Vocational and Technical College, 2014,2302:13-17.
[4] Yang Rongqiang. On the security of campus wireless network [J]. Fujian Computer, 2014,344:14-115.92.
Related suggestions: