Abstract
With the continuous development of computer technology, network security problems are also exposed in the development of information technology. Especially the communication network, as the core part of the communication system, the security of the communication network has great significance for the whole system. At present, in the production and life, the network security problem has become an important hidden factor affecting the development of production and life. In order to strengthen the construction of information security and improve the network security, it is necessary to conduct in-depth analysis of communication network security technology, and on this basis, put forward targeted countermeasures. Based on the current situation of computer communication network, this paper discusses and analyzes the architecture of network security technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Research on the application of data encryption technology in computer network communication security. Comput Fan 2017(09):14
Xiali T (2016) Xiong Ying research on the current situation and development trend of computer network communication in the new era. Comput Program Skills Maintenance 24:72–73
Qilong Z, Yi R (2016) Wu Jiayi explore the application of data encryption technology in computer network communication security. Inf Comput (Theor Edn) 17:164–165
Juan Y (2019) computer network information security and protection strategy research. Bonding 40(09):184–187
Acknowledgements
This work was support in part by the ScienceProject of Hainan Province (No. 619QN193).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ren, D., Lin, Z. (2022). Analysis of Computer Communication Network and Its Security Technology Framework. In: Hung, J.C., Chang, JW., Pei, Y., Wu, WC. (eds) Innovative Computing . Lecture Notes in Electrical Engineering, vol 791. Springer, Singapore. https://doi.org/10.1007/978-981-16-4258-6_187
Download citation
DOI: https://doi.org/10.1007/978-981-16-4258-6_187
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-4257-9
Online ISBN: 978-981-16-4258-6
eBook Packages: Computer ScienceComputer Science (R0)