Computer network security has become a hot research topic in today's information age. The following is what I have organized for you for your reference.
Hospital network security maintenance countermeasures Abstract: In recent years, with the development of the economy, computer network technology has been rapid development, and gradually to all walks of life in society. In modern society, all walks of life in all walks of life in the computer aided to enhance the efficiency of the work, the hospital work is also the same, which makes people feel gratified and happy. However, at the same time, it should be clearly recognized that computer network security is worrying, so how to maintain the hospital computing security has become a problem that people have been exploring. In the following, the author firstly analyzes the factors affecting the security management of hospital computer network, then clarifies the technology of computer network security management, and finally discusses the countermeasures to maintain the security management of hospital computer network in depth. Keywords: hospital; network security; maintenance countermeasures Computer network technology has brought great convenience to all walks of life, to enhance the efficiency of all industries, of course, hospitals are no exception. In the modern world, the hospital departments have been inseparable from the assistance of computer networks, such as the hospital registration fee system, consultation call system, medical records, hospital personnel management and other systems. Practice has shown that with the aid of computers, hospital departments have been transformed into information and digitalization, which effectively improves the efficiency of the hospital. However, along with the development of computer network technology, the security of computer network has been questioned and challenged. How to maintain the hospital computer network security has become a hot topic of discussion. 1, the main factors affecting the security of the hospital computer network 1, one of the main factors affecting the security of the computer network: computer-related factors 1 computer-related factors of the server As we all know, the server is the basis of the composition of the computer, the security of the computer network depends on the performance of the server. How does the server protect the security of the computer network? Usually, the server is through the database and computer terminal connection and control to achieve security functions, so the quality of the server needs to be focused on the gatekeeper. 2 computer-related factors of the network cabling to set up a computer network is an important part of the computer network cabling, standardized network cabling can not only enhance the performance of the entire computer network, but also greatly reduce the cost of the computer network. However, if the network cabling does not meet the specifications of the situation, such as computer network line breaks, line crossings, which will interfere with the computer network, interference signals and so on, which will have a serious impact on the work of the hospital departments. 3 computer-related factors of the central server room central server room is called the brain of the computer network, which plays a role in controlling the computer network, if the central server room there are security risks, then the computer network security risks. 2, the main factors affecting the security of the computer network two: human factors 1 human factors related to the misuse of the computer network system has the appropriate operating specifications and requirements, if there is a medical staff misuse of the computing network, it may lead to the failure of the computer network, and may even lead to the paralysis of the entire network of hospitals, such as diagnostic and treatment systems. 2 human factors related to the lack of network security awareness of the part of the medical staff will be network account lent to others to use or public **** use, such behavior may lead to hospital computer network has been damaged or attacked. 3 human factors related to the existence of network hackers with the continuous development of computer network technology, network hackers is a greater threat to the hospital computer network, they not only steal the hospital data information, but also destroy the hospital data information. Two, computer network security management technology With the development and popularization of computer technology, computer network security management technology is also constantly developing, I focus on the clarification of the two methods, one is the firewall technology, the second is the data encryption technology. 1, firewall technology What is a firewall? Firewall is actually a wall, is a kind of internal network and public network separated from the "wall". It allows you to consider safe people to enter the network, to prevent you from considering unsafe people to enter the network, to do everything possible to stop hackers. Since the birth of firewall technology, has been in the computer network security technology to play an important role. After practice, firewall technology can realize the protection of data according to the needs and settings of computer users. Hospitals as computer users are the same, through the firewall settings to protect the hospital computer network information. If the information is not safe, the firewall can prevent its entry to ensure the safety of the hospital computer network. 2, data encryption Data encryption is a technology that is the cornerstone of computer network security technology. It can convert plaintext information into meaningless ciphertext by adding a golden key or encryption function, and the receiver can decrypt the received ciphertext by function or decrypt it by decrypting the golden key to get the plaintext information. As a key technology of computer network security, it is more often used to protect the security of network information, such as the transmission or storage process of network information. Hospitals belong to the sector that involves more critical information, so data encryption technology is suitable for hospital computer network. The use of data encryption technology is equivalent to the hospital data information plus a protective shell, even if the information is stolen, without decryption can not be decrypted information. Three, the maintenance of hospital computer network security management countermeasures to discuss 1, the establishment of a sound hospital computer network security management system is the basis Establishment of a sound computer network management system is the basis of computer network security management, the only way to ensure that there is a legal basis, can be resolved to address the human influence factors. First of all, a specialized computer management organization, specializing in special posts; secondly, a clear division of labor, the implementation of security responsibilities to the individual system; finally, the medical staff for computer specification operation training and network security awareness education. 2, the establishment of a secure central server room Through the above analysis of the factors affecting computer network security can be seen, to solve the computer-related factors affecting the establishment of a secure central server room. First, the server needs to focus on customs, procurement must be selected high-quality and better performance; second, the hospital network cabling should be in line with the norms and requirements of the network cabling, to avoid the emergence of the phenomenon of breaks, crosses, etc.; third, the selection of the hospital central computer room should pay attention to the temperature, humidity and power supply to ensure that the central computer room security; fourth, the hospital computers are all using the firewall technology. 3, improve data encryption With the development of computer technology, data encryption technology is also developing. Therefore, in order to protect the security of the hospital computer network, in order to protect the hospital's key information information, the hospital should continue to improve the data encryption technology, the use of data encryption technology with high technical content. Four, conclusion In summary, the computer network technology to the hospital's work has brought convenience, enhance the efficiency of health care workers. But at the same time, network technology also brings data information security risks, so the author analyzes the factors affecting the management of computer network security in hospitals, and on how to maintain hospital computer network security countermeasures are discussed. References [1] Liu Yunzhi. Analysis of computer network security technology and its problems[J]. Information Systems Engineering,2012,2:73-74. [2]Zhong Yujun. Exploration of network security management in hospital computer applications[J]. China Health Industry,2015,04:139-140. 《Computer Network Security Analysis 》 Abstract In order to further safeguard the security of the computer network, this paper carries out an in-depth analysis of the security risks that exist in the computer network and comprehensively describes the defense countermeasures of the computer network for the reference of peers. Keywords computer; network security; security risks; defense countermeasures; research With the development of society, the scale of the network is also gradually expanding, and its coverage of information resources are also more and more rich and large, which gives the user a great deal of convenience, but at the same time, a series of computer viruses, hacking and other insecurity, the user's distress is also becoming more and more serious, bringing trouble is also increasing. The trouble brought by them is also increasing. Therefore, to make the Internet can better serve the majority of users, we must first ensure that the computer network security. 1 Threats to computer network security Many factors will have an impact on the security of the computer network, there are intentional factors in these factors, there are unintentional factors, some of which are man-made, some of which are non-man-made, we can roughly computer network security risks are attributed to the following aspects: 1.1 Physical Destruction These factors include: electromagnetic attacks, military destruction, and fire. Electromagnetic attacks, military destruction, and fire strikes are the main physical destruction that threatens the security of computer networks, and they all belong to the hard kill threat. 1.2 Unintentional mistakes such as operators in the security configuration is not perfect, there are loopholes exist, the Internet users lack of sufficient security awareness, their own account arbitrarily transferred to the loan, or with other people *** enjoy an account, and so on, these behaviors will be unintentionally threatening to network security. 1.3 Hacker Attacks Hacker attacks are currently the main security threats facing many computer networks, in terms of past hacker attacks, we can broadly categorize these attacks into two types: network attacks and network reconnaissance, which network attacks mainly refers to hackers using a variety of ways to selectively undermine the validity and completeness of the user's information, while the reconnaissance is the use of Intercept, steal, decipher the way to the user's confidential information to steal, hackers in the process of reconnaissance will not affect the normal execution of the network, both attacks will cause serious harm to the computer network security. 1.4 Vulnerabilities in network software and "backdoor" Network software usually has certain defects and vulnerabilities, and it is precisely because of these defects and vulnerabilities to hacker attacks to provide an opportunity to take advantage of, in addition to the "backdoor" is the hacker's first choice for network attacks. In addition, "backdoor" is also the preferred target for hackers to carry out network attacks. The setting of "backdoor" is mainly set by the staff who carry out software program design, and the purpose of these program designers to set "backdoor" is mainly for their own convenience. The "backdoor" is rarely known to outsiders, but once the "backdoor" is utilized by hackers, it will definitely pose a serious threat to the entire network security. 2 computer defense countermeasures In accordance with the different scope of the network combat target, we can roughly divide the network combat model into three levels: entity level, network level, as well as the level of information, based on the different levels of confrontation, the computer network should have different defense countermeasures. 2.1 Entity level defense countermeasures Commonly the entity level of the computer network is considered to be: with the help of some conventional physical means, directly destroying the entity of the computer network system, in peacetime, administrative loopholes is the main way for hackers to destroy the entity of the computer network system, in wartime, the main point is that with the help of high-tech weapons, on the enemy's network nodes and communication information, we carry out entity defense. Direct destruction, we carry out the entity defense is mainly to protect the computer system, communication devices and network servers do not suffer man-made damage, to prevent the occurrence of various types of theft and illegal entry into the computer control room behavior. In the network set up, the actual structure of the network, cabling, routers and other scientific and reasonable settings to improve its anti-destructive capacity, connecting to the external network, the internal network structure using firewall masking, identity verification outside access, data filtering and so on. In addition, for some important parts of the network system, there should be a person responsible for guarding against natural or man-made damage. 2.2 Energy level of defense countermeasures For the energy level of computer network confrontation we can roughly divide it into the following two aspects, on the one hand, refers to the two hostile parties to the electromagnetic power as the center of the physical energy confrontation, the enemy uses a strong physical energy interference on the other party's information network suppression and embedded in the other party's information system to destroy. On the other hand, it also refers to the use of technical means to detect physical energy, to collect and analyze computer signals, and then illegally steal some secret information. For this level of computer network defense, can do a good job of computer facilities to prevent electromagnetic leakage and anti-electromagnetic pulse interference work class for defense, specifically some of the interferers can be installed in the network important parts of the defense, or the construction of the corresponding sheltered computer room and other measures to defend. 2.3 information level of defense countermeasures Information level of network security defense can be broadly divided into two categories, one is the protection of the peripheral radiation, specifically through the installation of some good performance filters in the power line and signal line, the transmission impedance and the cross-coupling between the wires as small as possible, as well as the installation of some of the electromagnetic shielding network in the network and so on. Another category is the defense of its own radiation, we can be divided into 2 types of such protective measures, one is with the help of a variety of shielding electromagnetic measures to defend, such as the metal part of the shielding device as well as a variety of external hangers, the other is the protection of the interference measures, the computer system for work, with the help of the interference device to form a kind of pseudo-noise radiated in the space, and then on the computer system's actual operating frequency as well as the information Characteristics of the computer system to mask. In addition, we often use the maintenance of computer systems network security measures are defense hacking, access control, firewall technology, information encryption technology and so on. 3 Conclusion In short, with the development of computer technology and communications technology, in industry, agriculture and national defense and other aspects of the application of computer networks will become more and more widely used, all areas of social life will have computer network penetration, so we must fully recognize the vulnerability of the computer network and the potential threat to the application of effective security strategies to maintain the security of the computer network. Computer network security, at the same time, because the computer network is currently also out of a state of vigorous development, its own inevitably have some defects, we must strengthen the technical research, attention to technological innovation, bold breakthroughs, only then can better guarantee the security of the computer network, in order to make the computer network better serve the community, service to mankind. References: [1] Ma Hui. Analyzing the Security Hazards of Computer Networks and Explaining Defense Countermeasures[J]. Modern Intelligence, 200506. [2]Xu Tianxiang. Computer network security analysis and firewall technology[J]. China Science and Technology Information, 201302. [3]Zhao Jing, Li Shuo. Computer system security and computer network security analysis[J]. Electronic Technology and Softwares Engineering, 201416. [4]Mo Yufeng. Analysis and prevention of computer network security based on network environment[J]. Silicon Valley, 201108. Study on Optimization Design Strategy of Computer Network Reliability Abstract: The development of network technology brings great convenience to people's lives, and in order to adapt to the requirements of technological development, the enhancement of the computer network reliability research and design has become the focus of people's attention. The paper takes the concept of network reliability as an entry point, analyzes the importance of its optimization design, and briefly introduces the basic principles, and finally gives a specific implementation strategy to enhance the network reliability optimization design to provide some reference. Keywords: computer; network; reliability; optimization design; strategy 1 computer network reliability definition Generally speaking, the computer network reliability refers to the network information system's specific functions under certain conditions, such as the performance requirements, the timeliness of the requirements of the functional characteristics of a certain standard. With the development of information technology, computer network reliability has become the most basic requirement for information systems to ensure that the information system to provide reliable services must comply with the design and implementation principles. According to industry standards, measuring the reliability of computer networks mainly includes three requirements: man-made or natural damage to the network under the conditions of destruction requirements, unpredictable conditions of the information system survivability and the effectiveness of the network information system to provide service requirements. Specifically, the network destruction resistance requirement under man-made or natural destruction conditions refers to the information system under man-made or natural destruction conditions, some of the network nodes or line failure, the information system's effective supply capacity and the ability to provide continuous ***, and its main focus is on the destruction of the network under the conditions of the reliability of the guarantee. In short, to improve the network information system destruction resistance can effectively cope with the event of widespread paralysis of the network. The survivability of the information system under unpredictable conditions is the guarantee of the reliability of the network information system under random damage conditions. Random damage mainly refers to the network device paralysis or damage and network line aging and other factors caused by the network topology changes, resulting in the existence of information systems continue to *** insufficient. The effectiveness of the network information system to provide services is more focused on specific network business requirements. To the common network information, for example, network information delay, information accessibility are specific performance. Usually computer network design and application personnel will information system reliability protection attributed to a variety of devices for the hardware protection, but ignored the reliability of the personnel reliability, software platform reliability protection, therefore, reliability protection is not only about the hardware devices, for personnel management and software platform management have put forward a certain requirement in the future system optimization and upgrading, as well as the platform protection should be given to a comprehensive consideration. 2 Study of the significance of computer network reliability 1 Enhancement of computer network services and damage resistance Computer network reliability research on the computer network itself, effectively guaranteeing the continuity of its network service requirements and damage resistance, which is the essence of the computer network information system requirements. Through certain means and optimization design strategy, can effectively enhance and cope with due to human destruction, natural disasters, device damage, hardware and software platform instability and other factors brought about by the information system network data delivery processing capacity and a variety of network-based data service continuity guarantee. As mentioned above, both in terms of survivability, destruction resistance requirements, or in terms of the effectiveness of the requirements of the network is based on the role of the network as a starting point for discussion, it can be seen that the significance of exploring the reliability of the computer network to be able to effectively enhance the information system network services and anti-destructive capabilities. 2 to deal with the current serious network information security important means Information security has become an important threat to the development of the current information system, from the Trojan horse virus rampant in the Internet world, to the world jaw-dropping "Prism Gate" event, and now hundreds of millions of information loss each year, the network information security has affected people's lives. Information security affects every aspect of people's lives. Strengthening network reliability research, can be in two aspects to deal with the current increasingly prominent information security issues, first, from the physical support, through certain redundancy devices and other design means, can provide a variety of network devices to provide relative security of electromagnetic environmental protection, effectively avoid the destructive nature of man-made or natural factors to bring the information system; on the other hand, the network reliability research is also through the integration of hardware and software platforms to provide information system protection, especially the integration of software and hardware platforms to provide information system security, especially the integration of software and hardware platforms to provide information system security. On the other hand, the network reliability research also through the integration of hardware and software platforms to provide information system security, especially for the software platform for some of the measures to enhance the integrity of the data, confidentiality and effectiveness of the security has a very positive effect. 3 for the development of new technologies to provide the necessary infrastructure support In addition to the above two aspects of the role of strengthening network reliability for the development of new technologies to provide the necessary infrastructure support. To the current very popular cloud computing big data processing technology, for example, first of all, should set up a certain host series, series of host data exchange based on the necessary physical network support, and then through the necessary software processing means to mask the differences between the various physical devices in order to provide massive data storage and computing services, it can be seen that the effectiveness of the network to ensure that the data are reliable *** payment is cloud computing big data processing In addition, mobile Internet technology, Internet of Things technology need reliable network support. Therefore, from the application of the development of new technologies, the provision of reliable network security to lay a solid physical support. 3 computer network reliability design and optimization strategy implementation principles 1 highlights the "standardized" design standardization Design is to follow the network system model, to achieve the network of various heterogeneous facilities platform interconnectivity based on the basic design of computer network reliability and optimization strategy. The principle of optimization. Whether it is the actual implementation of the TCP/IP network model, or the international standards organization OSI network model, which follows the standardization of the design concept, through the standardization of the network information platform design can make the network platform has a better adaptability and expandability, new technologies, new devices as long as they comply with the standardized network interface can be standardized application, which is a computer network continues to mature. This is a necessary requirement for the continuous maturity of the computer network, but also a guarantee for the continuous development of the network. In view of the above reasons, the optimization of the implementation of the network information platform should first follow the standardization of the design and implementation of the principles to achieve the system in the generality, expandability and other aspects of the requirements. 2 enhance the network "interoperability" ability to interconnect Optimization of interoperability design is also an important principle of computer network optimization design should be followed, on the one hand, for the different system platforms software platforms and hardware platforms in two aspects, should ensure that their information accessibility and smooth, on the other hand, for the different data On the other hand, different data transmission protocols should be better supported. In addition, various physical devices should also have strong fault tolerance. It should be noted that interoperability does not mean that any device must realize accessibility, sometimes for data security or data transmission efficiency and other requirements, through certain technical means or hardware design artificially block the accessibility of different network levels, common design such as the use of switching devices between different departments for the division of VLAN. The principle of improving interoperability is an important implementation design principle for network information platforms to meet user needs, improve network delivery capabilities, and safeguard the stability of network execution. 3 Enhance network resource manageability and effective utilization of existing resources to ensure the reliability of the network information platform Not only is the protection of a variety of physical device requirements, at the same time, the network resource manageability should also be a good design. On the one hand, the backbone network bandwidth requirements should be guaranteed, the common FTP services or access to data larger WEB services for a separate bandwidth supply, in order to achieve a high degree of responsiveness to the service capacity; on the other hand, the network line design, a variety of network device design, as well as the network management software should be in the system security, stability, reliability, serviceability for comprehensive consideration in order to optimize the design of the purpose. In addition, in order to enhance the network optimization design as much as possible the economic benefits, in the design and implementation of the existing resources should be reasonably integrated, through the original line transformation and other means to enhance the optimization process of the cost-effectiveness ratio. In addition, the computer network reliability design principles should also be in the advanced and universal, link cutoff and other aspects of optimization design, limited to the limitations of space, this paper will not be discussed one by one. The total optimization design and implementation strategy principles, should be from the scalability, security, access, economy and other aspects of the comprehensive consideration, so as to achieve a high degree of reliability of the network information platform requirements. 4 computer network reliability implementation 1 enhancement of network device redundancy design redundancy Design and implementation of the program is mainly through the increase in the number of devices as well as the number of lines to achieve a high degree of reliability of the network, which is currently a common means of design and implementation. Redundancy design process involves more devices, whether it is the power supply device, the core layer of the network data exchange device, or data processing terminal host device can be redundant processing, to the common standby power supply device and server disk array, for example, through the failure of the power supply system in time to switch and data disk multi-level backup can effectively improve the reliability of the network, in addition to the network device In addition, the redundant design of network devices and lines can enable other communication lines when a line or node has problems, thus realizing the effectiveness of data transmission. In addition, through the implementation of redundancy, for the enhancement of the processing side of the data fault tolerance also has a positive significance, of course, with the enhancement of the redundancy of various devices, to deal with the reliability of the security and economic benefits of the balance is also very important aspects worth noting. 2 Do a good job of network system layering Design layering is an important aspect of computer network reliability processing and optimization of the design, which is mainly based on the network model, respectively, in order of the physical layer, data link layer, network transmission layer and application layer. The physical layer corresponds to the data requirements of various physical interfaces and electrification standards, the data link layer is the process of packaging IP data frames from the network transmission layer, and the process of 01 code conversion of the data frames under the realization of the network transmission layer focuses on the process of UDP and TCP transmission of IP data, and the application layer is the process of packaging the data of different applications. Different network levels for data reliability requirements are not the same, and the focus of each level of difference is also very obvious, therefore, in the implementation of specific network system optimization in accordance with the network model for the hierarchical design and testing, so that each level can achieve the pre-designed purpose is to achieve the reliability of the network is an important means of guaranteeing. 3 Strengthen the network architecture design The network architecture optimization design for the reliability of the information platform also has an important impact. In general, the network architecture includes network operating system, such as the common WindowsServer operating system, Linux/Unix operating system platform, the network operating system usually provides some of the functions of network management, is the center of the entire internal network control; network control devices, such as the common routing devices, switching devices, such devices to expand the network structure, to achieve the Different regions of the host interconnectivity, and provides a certain degree of security management, such as access control management, data exchange within and outside the network, etc.; network hosts, which is the end-user work platform, the user uses a variety of software to complete all kinds of office tasks; network servers, such as a variety of file servers, WEB servers, mail servers, etc., to achieve a variety of functions of the network services. Optimize the design structure of these four types of devices, server devices and network operating systems placed in the network nodes with relatively sufficient bandwidth resources, and a reasonable configuration of routing, firewall devices can enhance network reliability. 4Reasonable use of "trial-and-error" method of optimization Trial-and-error is through a number of feasible options for multi-level, multi-angle comparisons, selecting a higher comprehensive advantage of an optimization program. Trial-and-error is a common means of implementation of optimization, coupled with the current advanced software simulation tools, can be faster cost, availability, reliability comparison, through a comprehensive trade-offs to achieve the most optimal solution. Therefore, the information platform optimization focuses on the reasonable use of trial-and-error methods. 5 Summary In summary, the reliability of the computer network is to provide reliable user services, to cope with information security and adapt to the requirements of technological development of the important guarantee, this paper introduces the concept of reliability, analyzes the importance of its significance, and summarizes the optimization of the design of the computer network as well as the implementation of the protection of specific measures. By strengthening the layered design, network system design, redundancy design, and the effective use of trial-and-error methods to achieve the high reliability requirements of the network information platform. References: [1] Li Jiayin, Yu Ziwei, Zhao Dian. Research on the optimization design problem of computer network reliability[J]. Electronic Technology and Softwares Engineering,20149:46. [2]Yingbang Wang,Chunli Kong. Analysis of reliability optimization design problem in computer network[J]. Network Security Technology and Application,201512:26,28. [3]Zhanke. Research on optimization design problem of computer network reliability[J]. Information and Computer: Theoretical Edition,20162:169,171. [4]Cui Cheng. Research on the problems related to the optimal design of computer network system reliability[J]. Digital World,20158:9-10. Related Recommendations: