Research Project
Research Project
With the development of society and the improvement of people's living standards, the
application of computer network information has not only promoted the progress of society
but also the increasing maturity of computer network technologies has made it easier to
connect various networks. Our lifestyle is also quietly changing with the growth of the Internet
of Things (IoT) and 5G. While people are enjoying the convenience of the Internet, it is easy to
take the security of the network and its possible impact lightly. Therefore, the network has
become an inseparable part of our lives. As network technology develops, its openness grows
and its influence on society increases day by day, but network security threats such as viruses,
network hacking, and remote eavesdropping have also become an increasingly serious social
issue.
Keywords: Information Security, Firewall, Encryption, Digital Signature
Introduction
In the era of information technology with the rapid development of the network, the security of
network information has become a more concerning issue. In this literature, we will focus on
the importance of studying network security technology and the specific analysis of the
technical means of network security in practical applications. Finally, we discuss the current
situation and development trend of network security and security products research.
Overview/ Background
With the rapid development of network information technology, we have entered the
information age. The Internet has brought great convenience to our life and changed the
channels through which we perceive and understand the world, but at the same time, due to
the diversity of Internet connections, the wide distribution of terminals, and the openness of
the network, it also poses a threat to our information security. Network information security is
a comprehensive discipline that includes computer application technology, network
communication technology, cryptographic information technology, information security
technology, applied engineering mathematics, number theory, information methodology, and
other technologies. To be able to propose a complete, systematic, and collaborative processing
plan, we have to accumulate knowledge on the above disciplines in normal times, only then we
can ensure the effective sharing and relative security of information. In general, network
information security can be simply summarized as the following three aspects.
1. Availability of Network Services
Availability of network services means that all resources can be accessed by authorized parties
at the right time to prevent "denial of service" (DoS) of network systems due to computer
viruses or other human factors, which aims to prevent computers or networks from providing
normal services. The most common DoS attacks are computer network bandwidth attacks and
connectivity attacks. By increasing the control of network information access, we can effectively
prevent the occurrence of "denial of service". "Firewall" is one of the important technologies of
network security in recent years, it is the throat of network information communication, only
through the security policy related information is allowed to pass through the firewall, if the
network is added to the firewall, our network environment will become relatively safe.
However, the security of the network environment is often in contradiction with the flexibility,
openness, and convenience of the Internet. Although the blocking function of the firewall plays
a positive role in strengthening the security of the internal local area network, it also hinders
the effective exchange of information between the internal network and the external network
information.
2) Asymmetric type encryption: It is characterized by two keys: a public key and a private
key. The public key is public and is used to encrypt the metadata, and the private key is
owned by the individual alone. To complete the whole encryption and decryption
process, both must be used in combination. After using this encryption method, we
have to pay attention to effective management and how to confirm the authenticity and
legitimacy of the public key.
3) Irreversible encryption: Its characteristic is that no key is used in the whole encryption
process, and once the data is encrypted, it cannot be decrypted, and the same
encrypted data can only be obtained by the same irreversible encryption algorithm with
the same input data. This encryption algorithm does not have the problem of key
distribution and management, but its encryption calculation work is exceptionally
complicated, and it is only suitable for encrypting a small amount of data.
Discussion - Network information security and security products research status and
development trend
Network information security is one of the research projects focused on information security,
and it is also the current research hotspot in the field of information security. The research
content includes the main technologies and solutions of network information security, the
research, and development of network security products, etc. Network information security
includes physical security and logical security. Physical security refers to the physical protection
of network information in communications, computer equipment, and related facilities from
damage, loss, etc. Logical security contains information integrity, confidentiality, non-
repudiation, availability, etc. It is a matter that involves all aspects of network security,
operating systems, databases, application systems, human factors, etc., and must be
considered comprehensively.
At present, the more popular in the market, and can represent the future direction of
development of security products are roughly the following categories: firewalls, security
routers, virtual private networks (VPN), security servers, electronic visa agencies - user
authentication products, intrusion - CA and PKI products, security management centres,
detection systems (IDS), security databases and security operating systems. In all of the above
major directions of development and product categories, the application of cryptography is
included and is very basic. The integration of cryptography with communication technology,
computer technology, and chip technology is becoming increasingly close, and the lines of
demarcation between their products are becoming increasingly blurred and inseparable from
each other. The solution to network security is a comprehensive problem involving many
factors, including technology, products, and management [6].
Conclusion
The issue of network information security has become a worldwide problem. It is not only
applied to ordinary electronic commerce but also applied to the government and military,
which is related to the economic security and national defence security of the whole country.
Information technology has become an important basis for the development of the entire
society and economy, and occupies an inestimable position in the national economy and
people's livelihood; in addition, government authorities, national defence construction of
information technology security, stability, maintainability, and developability put forward more
and more urgent requirements, therefore, from the perspective of social and economic
development and national security, increase the development of information security
technology is a long-term and arduous in our future task.
References
1. Bai Shuo, Prevention of computer viruses under network conditions [J]. Network Security
Technology and Applications, 2002.
2. Zhang Zhen Guo, Building a perfect virus protection system [J]. Network Security Technology
and Applications, 2002.
3. Wu, Haiyan, Shi Lei and Li Qingling, An overview of network information security technology
[J]. Computer Knowledge and Technology, 2005, 12: 55-57.
4. Liu Hong Yue, Advances in access control technology research [J]. Small Microcomputer
Systems, 2004, 25(1): 56-59.
5. http://baike.baidu.com/view/1148666.htm.
6. Qin Xiao Yun, Research status and development trend of information security technology [J].
Journal of Guangxi Medical University, 2008, S1: 93-94.
7. Zeng Fan Ping, Network Information Security [M]. University of Science and Technology of
China, 2003
8. Wu S. Z., Jiang S. Q., Peng Y. Fundamentals of Information Security Assurance. Aviation
Industry Press, 2009.7
9. Storin (U.S.) by Xiao Xiang Studio translation: elements of network security: applications and
standards [M]. Beijing: People's Post and Telecommunications Publishing House, 2003.01
10. Tao An et al. eds: Network Management and Maintenance [M]. Shanghai: Shanghai Jiao
Tong University Press, 2003.05
11. Bu Shan Yue, Zhang You Dong. Computer Security Technology. Higher Education Press,
October 2005
12. Li G, Zhang W. Reflections on technical issues of strengthening network information security
[J]. Software (Education Modernization) (Electronic Edition), 2013, (7): 98-98.
13. Mei Xiu Hua. Exploration of network information security and technology [J]. Science and
Technology Information Development and Economy, 2008, 18(4): 171-173.
14. Xie Xing Guo, Zhu Qing Wei. An introduction to network information security and technology
[J]. Science and Wealth, 2011, (2): 102.
15. Wang Hong Yu, Discussion on computer network information security in the new situation
[J]. Digital Technology and Applications, 2016(02):214.