摘要
Abstract
The article discussed the threats to computer network information security in depth,described the data encryption technology,firewall technology,intrusion detection and defense system,access control technology,security vulnerability scanning technology and other key protection technologies in detail,and analyzed the principles,characteristics and application scenarios of these technologies,with the aim of enhancing the level of information security protection of the computer network and guaranteeing the stable and reliable operation of network information systems.关键词
计算机/信息安全/防护技术/防御系统/安全漏洞Key words
computer/information security/protection technology/defense system/security vulnerability分类
信息技术与安全科学