Abstract
Abstract
The host computer is an important part of the computer, which is the basic location for users to store data directly. Therefore, we must strengthen the host security, which will protect the security and privacy of user information. However, hackers, Trojans, worms and other network security threats often attack the computer, which has become an important threat to the application of network security. Therefore, we must strengthen the host network security protection, which will protect the host information from illegal network behavior. By ensuring the security of user host information, we can reduce the waste of resources. In the network security attack defense confrontation, both sides have natural asymmetry, which requires us to deal with network security threats. Through a variety of processing measures, we can protect the computer host security. Firstly, this paper analyzes the decision-making framework of network security threats and protection. Then, this paper puts forward the common types of network security threats. Finally, this paper puts forward the current mainstream treatment measures.
Subject
General Physics and Astronomy
Reference8 articles.
1. Network security threats and Countermeasures of cloud computing [J];Fan;Science and technology communication,2015
2. Definition of Cyberspace Security [J];Fang;Journal of network and information security,2018
3. Overview of network security situation awareness [J];Gong;Acta software,2017
4. How to effectively improve the level of computer network security in the information age [J];Ma;Computer Engineering,201l
5. Analysis and Simulation of network deception defense strategy based on signaling game [J];Shi;Journal of system simulation,2016
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Study on Host-based Security System Advancement in ICT-Enabled Smart Cities;2023 International Conference on Emerging Research in Computational Science (ICERCS);2023-12-07
2. The application of data encryption technology in computer network security;2023 International Conference on Networking, Informatics and Computing (ICNETIC);2023-05
3. Network attack detection model based on Linux memory forensics;2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA);2022-01