Vol 2, Issue 1





Table of Contents

Articles

by Stephanie Bert
218 Views, 267 PDF Downloads
The high and new technology,such as information technology and network technology,has been popularized and applied effectively in China,so that China has entered a new era of information development. And in the development of new environment,enterprises a

Articles

by Setlla Bowman
205 Views, 126 PDF Downloads

Computer communication network technology makes life colorful and work more efficient. However, computer communication network technology is not omnipotent, it will also produce security problems, security problems will not only make the computer network failure, but also make the communication network system paralyzed. The loss caused by computer network security is fatal. Only by strengthening the security performance of computer communication network can computer communication security problems be better served for us. Starting with the problems existing in the computer communication network, this paper analyzes the security threat factors of the unit network, and puts forward the security of the computer communication network. The purpose of this paper is to provide some reference for improving the security performance of computer communication network.


Articles

by Rupert Marion
188 Views, 119 PDF Downloads

With the construction and development of "new engineering subject" and the popularization of computer network, it is more and more important for non-computer major students to master certain computer network technology. Combined with the existing problems in the teaching of computer network courses for non-computer majors in colleges and universities under the background of the construction of "new engineering subjects", this paper probes into how to carry out the teaching effectively, and puts forward corresponding solutions.


Articles

by Burgess Austin
238 Views, 465 PDF Downloads

This paper holds that the revolution of information and network technology with the Internet as its core provides new opportunities for democracy to develop, and at the same time, it also brings about many negative impacts on democracy. To prevent the potential harm of Internet technology to democracy.


Articles

by Ali J Harriman
259 Views, 173 PDF Downloads
Because of the sensitivity, real-time and large scale characteristics of the actual computer network application, it is not convenient to carry out the research work directly on the computer network, and use the modeling and simulation method to study the network attack and defense safety of the calculating machine. It not only can avoid the influence and damage to the actual computer network, but also has the advantages of flexibility, repeatability and low cost efficiency ratio. It can provide an effective reference for the practical security of the computer network. This paper summarizes the modeling methods and characteristics of computer network attack and defense behavior based on graph analysis and network worm behavior analysis, and analyzes the analysis method of computer network attack and defense effect based on cascade failure. And computer network attack and defense modeling and simulation system for security evaluation. Finally, the difficulties and shortcomings of computer network attack and defense modeling are analyzed, and the development trend in the future is forecasted.