Security Risks in Computer Networks and Application of Data Encryption Techniques

Authors

  • Jode Glen

DOI:

https://doi.org/10.54097/x4eym481

Keywords:

data encryption techniques, computer networks, security, algorithms

Abstract

With the rapid development of science and technology, people through the computer network for the transmission and exchange of information and data is more and more convenient. This paper analyzes the current situation of computer network security, hidden dangers and the principle of data encryption technology, and discusses the application of data encryption technology in computer network security.

References

Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet computing, 16(1), 69-73.

Dawoud, W., Takouna, I., & Meinel, C. (2010, March). Infrastructure as a service security: Challenges and solutions. In 2010 the 7th International Conference on Informatics and Systems (INFOS) (pp. 1-8). IEEE.

Rosegrant, M. W., & Cline, S. A. (2003). Global food security: challenges and policies. Science, 302(5652), 1917-1919.

Reddy, G. N., & Reddy, G. J. (2014). A study of cyber security challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.

Barnett, J. (2003). Security and climate change. Global environmental change, 13(1), 7-17.

Levy, M. A. (1995). Is the environment a national security issue?. International security, 20(2), 35-62.

Li, X., Wang, X., Chen, X., Lu, Y., Fu, H., & Wu, Y. C. (2024). Unlabeled data selection for active learning in image classification. Scientific Reports, 14(1), 424.

Liang, Y., Wang, X., Wu, Y. C., Fu, H., & Zhou, M. (2023). A Study on Blockchain Sandwich Attack Strategies Based on Mechanism Design Game Theory. Electronics, 12(21), 4417.

Lee, Zhitong, Ying Cheng Wu, and Xukang Wang. "Automated Machine Learning in Waste Classification: A Revolutionary Approach to Efficiency and Accuracy." Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition. 2023.

Guo, H., Ma, Z., Chen, X., Wang, X., Xu, J., & Zheng, Y. (2024). Generating Artistic Portraits from Face Photos with Feature Disentanglement and Reconstruction. Electronics, 13(5), 955.

Wang, X., Wu, Y. C., Ma, Z. (2024). Blockchain in the courtroom: exploring its evidentiary significance and procedural implications in U.S. judicial processes. Frontiers in Blockchain, 7, 1306058.

Lehtinen, R., & Gangemi Sr, G. T. (2006). Computer security basics: computer security. " O'Reilly Media, Inc.".

Landwehr, C. E. (1983). The best available technologies for computer security. Computer, 16(07), 86-100.

Richards, N. M., & Solove, D. J. (2010). Prosser's privacy law: A mixed legacy. Calif. L. Rev., 98, 1887.

Hsiao, D. K., Kerr, D. S., & Madnick, S. E. (2014). Computer security. Academic Press.

Downloads

Published

14-05-2024

Issue

Section

Articles

How to Cite

Glen, J. (2024). Security Risks in Computer Networks and Application of Data Encryption Techniques. Computer Life, 12(1), 5-7. https://doi.org/10.54097/x4eym481