Font Size: a A A

University Network Security Problems And Countermeasures

Posted on:2016-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:X L ZhouFull Text:PDF
GTID:2308330482476872Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Nowadays, with the development of economy, the information technology also develops at a rapid pace, which is reflected in people’s life and work. It also made some changes in the way of living and working, becoming an indispensable part in our life. The scientific researchers focus on how to develop the network technology more rapidly, on the basis of healthy environment. With developments in network security,colleges and universities are using it to set up students’ information management and release school notices. The establishment of campus network also provides the teachers with a platform for teaching exchange. In this respect, the campus network is of great use for our work. However, from the other side, due to the net-openness of the campus network, the information and data in campus is in the risk of leaking.Therefore, it is necessary to pay attention to the security of campus network.It is the background of the network security, including how this technology is used in colleges and universities and the security problems in its application, which I shall described at the head of present treatise. Then I attempt to find out what was happening to the component of network in colleges and universities. At last, the author aims to put forward some corresponding measures to contribute to the computer network security.Practically, this thesis proposes some corresponding measures and solutions to safeguard network security in colleges and universities. On the other hand, the problems associated with the network security in universities also can use the experience of some relevant methods in this paper for reference, which will play an efficient role in strengthening its safety.
Keywords/Search Tags:Network Security, Security Strategies, Campus Network, Safe Application, Security Management
PDF Full Text Request
Related items