• Abstract
  • Keywords: Computer; Firewall; Network security. 1. Introduction
  • Research on firewall technology and its application in computer network security strategy Peihong Wang




    Download 234,35 Kb.
    Pdf ko'rish
    bet1/13
    Sana28.01.2024
    Hajmi234,35 Kb.
    #147542
      1   2   3   4   5   6   7   8   9   ...   13
    Bog'liq
    Research on firewall technology and its applicatio



    Frontiers in Computing and Intelligent Systems 
    ISSN: 2832-6024 | Vol. 2, No. 2, 2022 
    42 
    Research on firewall technology and its application in 
    computer network security strategy 
    Peihong Wang
     
    Honghe Hani and Yi Autonomous Prefecture Public Resources Trading Center, Mengzi 661199, Yunnan, China 
    Email: 501376056@qq.com
    Abstract:
     Computer network is a double-edged sword, which brings convenience to people's life and work, but also brings 
    hidden dangers, and even suffer losses, especially in recent years, the unscrupulous elements use computer network 
    vulnerabilities to steal important data and seek improper benefits, which has caused serious network security problems. Among 
    them, focus on the application of firewall technology can effectively prevent and supervise the existence of network security 
    threats in the computer, control access to the Internet, and ensure the safe operation of computer networks. In this paper, from 
    the importance of firewall, we explore the main functions, technical principles, architecture and use scenarios of cloud firewall, 
    and propose the application in the computer network security strategy for reference. 
    Keywords: 
    Computer; Firewall; Network security. 
    1. Introduction 
    With the vigorous development and wide application of 
    computer technology, the application of information network 
    technology represented by the Internet is becoming 
    increasingly popular, and the application field has gradually 
    expanded from small business systems to large and medium-
    sized key business systems. The computing model has also 
    undergone a dramatic change from the initial centralized 
    delivery to large processing machines, to network-based 
    distributed task processing, to today's on-demand cloud 
    computing approach, with security increasingly becoming an 
    important factor affecting network effectiveness. According 
    to a report released by the FBI, victims of BEC fraud lost $2.4 
    billion in 2021, while the average cost of data breach in 2022 
    has exceeded $4.35 million, a record high, and cybercrime has 
    become the largest type of business crime; in China, 
    cybersecurity is closely related to national security, and huge 
    economic losses are incurred every year due to hacking and 
    virus damage. How to strengthen network security awareness, 
    improve network security skills, build a secure network 
    management system, and efficiently protect the safety of 
    information and property in the network, has become urgent. 
    Among many measures, the most significant is the application 
    of firewall technology, which not only provides a safe and 
    reliable operating environment for computer networks, but 
    also protects against external intrusion and influence, and is 
    gradually recognized by people. 

    Download 234,35 Kb.
      1   2   3   4   5   6   7   8   9   ...   13




    Download 234,35 Kb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Research on firewall technology and its application in computer network security strategy Peihong Wang

    Download 234,35 Kb.
    Pdf ko'rish