CN107347079A - Computer network means of defence - Google Patents
Computer network means of defence Download PDFInfo
- Publication number
- CN107347079A CN107347079A CN201710789186.7A CN201710789186A CN107347079A CN 107347079 A CN107347079 A CN 107347079A CN 201710789186 A CN201710789186 A CN 201710789186A CN 107347079 A CN107347079 A CN 107347079A
- Authority
- CN
- China
- Prior art keywords
- network
- computer
- protection
- carried out
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Abstract
The invention discloses a kind of computer network means of defence, specifically comprise the following steps:S1:Operating personnel open computer, S2:Network protection, S3 are carried out using encryption software:Establish multi-level backup mechanism and carry out network protection, S4:Network protection, S5 are carried out using intruding detection system:Network protection, S6 are carried out using vulnerability scanning system:Network protection, S7 are carried out by the security mechanism for improving operating system and application software:Network firewall is established to carry out network protection, S8:By carrying out network protection to packet automatic detection, the effect of multiple-protection is realized, effectively computer network is monitored, avoids illegal invasion behavior, ensure that computer is safe to use, traditional synchronous method further optimized and perfect.
Description
Technical field
The invention belongs to computer security technique field, more specifically, more particularly to a kind of computer network protection side
Method.
Background technology
With the continuous progress of technology, China Internet has formed scale, and the Internet, applications move towards diversification.Internet
More and more profoundly change the study, work and life style of people, or even affect entire society's process.Network security
Refer to that the data in the hardware, software and its system of network system are protected, do not meet with because of the reason for accidental or malice
Destroyed, changed, revealed, system is continuously reliably normally run, and network service does not interrupt.The safety of network refers to by adopting
With various technologies and control measures, make network system normal operation, so that it is guaranteed that the availability of network data, integrality and secrecy
Property.With the high speed development of internet, computer network protection is increasingly valued by people.
Now lack a kind of computer network means of defence, traditional computer network means of defence has great limitation
Property, do not possess the property of multiple-protection, it is necessary to which further optimization and perfect, this development to computer network security has very
Important meaning.
The content of the invention
The invention aims to solve shortcoming present in prior art, and a kind of computer network proposed protects
Method.
To achieve the above object, the present invention provides following technical scheme:A kind of computer network means of defence, is specifically included
Following steps:
S1:Operating personnel open computer;
S2:Network protection is carried out using encryption software, encryption software is installed in a computer, in the mistake of transmission important information
Cheng Zhong, using the Information hiding in encryption software, digital watermarking, data are embedded and capsule information are first hidden into text by fingerprint technique
In part, then pass through network delivery again;
S3:Establish multi-level backup mechanism and carry out network protection, carry out the trouble free service of the network information, for significant data and
Documentation is periodically backed up, in a network environment, by different level using network remote backup, server two-node cluster hot backup,
RAID mirror image technologies and software systems automated back-up mode carry out data backup work;
S4:Network protection is carried out using intruding detection system, intruding detection system is installed in a computer, is examined using invasion
Examining system detects to intrusion behavior;
S5:Network protection is carried out using vulnerability scanning system, vulnerability scanning system software is installed, utilizes vulnerability scanning system
Scanning computer, system for computer vulnerability scanning is come out, and software is repaired by system and repairs computer system, adopted in time
Take treatment measures to be repaired, effectively prevent the generation of intrusion event, establish walk away safety system, while establish corresponding peace
Full accessory system;
S6:Network protection, the operation of more new computer are carried out by the security mechanism for improving operating system and application software
System, operating system is kept renewal, rights management is carried out to network system boot disk and user data disk, utilizes network system
Function in terms of safety management, network manager ensure registration security by user name, networking password, by specify authorize and
Inherited rights are shielded to realize DRM operations, catalogue, file are read and write property by setting computer system to limit
It is fixed;
S7:Network firewall is established to carry out network protection, access rights are limited by network firewall;
S8:By to packet automatic detection carry out network protection, automatic detection module include NESS detection modules,
Strobe detection modules, SATAN detection modules and ISS detection modules, the detection content of the automatic detection module include configuration
File detection, protection mechanism detection and difference test, dangerous packet is isolated, anti-so as to carry out safety to computer network
Shield.
Preferably, in the step S2, DEA has DES, AES, MD5, SH-1, IDEA, RSA and PGP.
Preferably, in the step S3, Backup Data is preserved on a different storage medium, periodically by necessary backup number
According to being burnt in CD, important data creating more than 2 copies and is stored in different places, ensures that data can after damage
To recover in time.
Preferably, in the step S4, the intruding detection system is by collecting and analysis computer network and computer
The information of key point in system, the sign for whether there is in network and system and violating the behavior of security strategy and being attacked is checked,
The event that the intruding detection system constantly occurs in supervisory computer system and network system, carries out safety according to rule and examines
Meter, is monitored to the operation conditions of network, system, so as to the various information with attack attempt and attack are carried out every
From to ensure the confidentiality, integrity, and availability of network system resources, the intruding detection system can using record of the audit
Any not dangerous information activities are identified, these activities are limited to protect the security purpose of system so as to reach.
Preferably, in the step S7, the network security of computer is protected by paying close attention to the safety of fire wall, it is all
Communication flows all carries out audits and compliance and preservation by fire wall.
The technique effect and advantage of the present invention:A kind of computer network means of defence of the present invention, combine soft using encrypting
Part carries out network protection, establishes multi-level backup mechanism progress network protection, utilizes intruding detection system to carry out network protection, utilize
Vulnerability scanning system carries out network protection, carries out network protection by improving the security mechanism of operating system and application software, builds
Vertical network firewall carries out network protection and the characteristics of by carrying out network protection to packet automatic detection, realized multiple anti-
The effect of shield, is effectively monitored to computer network, avoids illegal invasion behavior, ensures that computer is safe to use, to passing
The further optimization and perfect of the synchronous method of system.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with specific embodiment, to this
Invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, not
For limiting the present invention.Based on the embodiment in the present invention, those of ordinary skill in the art are not before creative work is made
The every other embodiment obtained is put, belongs to the scope of protection of the invention.
A kind of computer network means of defence provided by the invention, specifically comprises the following steps:
S1:Operating personnel open computer;
S2:Network protection is carried out using encryption software, encryption software is installed in a computer, in the mistake of transmission important information
Cheng Zhong, using the Information hiding in encryption software, digital watermarking, data are embedded and capsule information are first hidden into text by fingerprint technique
In part, then pass through network delivery again;
S3:Establish multi-level backup mechanism and carry out network protection, carry out the trouble free service of the network information, for significant data and
Documentation is periodically backed up, in a network environment, by different level using network remote backup, server two-node cluster hot backup,
RAID mirror image technologies and software systems automated back-up mode carry out data backup work;
S4:Network protection is carried out using intruding detection system, intruding detection system is installed in a computer, is examined using invasion
Examining system detects to intrusion behavior;
S5:Network protection is carried out using vulnerability scanning system, vulnerability scanning system software is installed, utilizes vulnerability scanning system
Scanning computer, system for computer vulnerability scanning is come out, and software is repaired by system and repairs computer system, adopted in time
Take treatment measures to be repaired, effectively prevent the generation of intrusion event, establish walk away safety system, while establish corresponding peace
Full accessory system;
S6:Network protection, the operation of more new computer are carried out by the security mechanism for improving operating system and application software
System, operating system is kept renewal, rights management is carried out to network system boot disk and user data disk, utilizes network system
Function in terms of safety management, network manager ensure registration security by user name, networking password, by specify authorize and
Inherited rights are shielded to realize DRM operations, catalogue, file are read and write property by setting computer system to limit
It is fixed;
S7:Network firewall is established to carry out network protection, access rights are limited by network firewall;
S8:By to packet automatic detection carry out network protection, automatic detection module include NESS detection modules,
Strobe detection modules, SATAN detection modules and ISS detection modules, the detection content of the automatic detection module include configuration
File detection, protection mechanism detection and difference test, dangerous packet is isolated, anti-so as to carry out safety to computer network
Shield.
In the step S2, DEA has DES, AES, MD5, SH-1, IDEA, RSA and PGP, the step S3
In, Backup Data preserves on a different storage medium, periodically necessary Backup Data is burnt in CD, important data
Make more than 2 and copy and be stored in different places, ensure that data can be recovered in time after damage, in the step S4,
The intruding detection system by collect and analysis computer network and computer system in key point information, check network and
In system computer is constantly monitored with the presence or absence of the sign violated the behavior of security strategy and attacked, the intruding detection system
The event occurred in system and network system, security audit is carried out according to rule, the operation conditions of network, system is supervised
Depending on, so as to isolate to the various information with attack attempt and attack, with ensure the confidentiality of network system resources,
Integrality and availability, the intruding detection system can recognize that any not dangerous information activities using record of the audit,
Limit these activities so as to reach to protect the security purpose of system, in the step S7, by pay close attention to the safety of fire wall come
The network security of computer is protected, all communication flows all carry out audits and compliance and preservation by fire wall.
In summary:A kind of computer network means of defence of the present invention, combine using encryption software carry out network protection,
Multi-level backup mechanism is established to carry out network protection, carry out network protection using intruding detection system, using vulnerability scanning system enter
Row network protection, by improve operating system and application software security mechanism carry out network protection, establish network firewall come
Carry out network protection and the characteristics of by carrying out network protection to packet automatic detection, realize the effect of multiple-protection, effectively
Computer network is monitored, avoid illegal invasion behavior, ensure that computer is safe to use, traditional synchronous method is entered
One-step optimization and perfect.
In the present invention, unless otherwise clearly defined and limited, term " installation ", " connected ", " connection ", " fixation " etc.
Term should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected, or be integrally connected;It can be machine
Tool connects or electrical connection;Can be joined directly together, can also be indirectly connected by intermediary, can be two members
Connection inside part.For the ordinary skill in the art, above-mentioned term can be understood in this hair as the case may be
Concrete meaning in bright.
Finally it should be noted that:The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention,
Although the present invention is described in detail with reference to the foregoing embodiments, for those skilled in the art, it still may be used
To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic,
Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., it should be included in the present invention's
Within protection domain.
Claims (5)
- A kind of 1. computer network means of defence, it is characterised in that:Specifically comprise the following steps:S1:Operating personnel open computer;S2:Network protection is carried out using encryption software, encryption software is installed in a computer, in the process of transmission important information In, using the Information hiding in encryption software, digital watermarking, data are embedded and capsule information are first hidden into file by fingerprint technique In, then pass through network delivery again;S3:Establish multi-level backup mechanism and carry out network protection, the trouble free service of the network information is carried out, for significant data and file Data is periodically backed up, in a network environment, by different level using network remote backup, server two-node cluster hot backup, RAID Mirror image technology and software systems automated back-up mode carry out data backup work;S4:Network protection is carried out using intruding detection system, intruding detection system is installed in a computer, utilizes intrusion detection system System detects to intrusion behavior;S5:Network protection is carried out using vulnerability scanning system, vulnerability scanning system software is installed, scanned using vulnerability scanning system Computer, system for computer vulnerability scanning is come out, and software is repaired by system and repairs computer system, take place in time Reason measure is repaired, and effectively prevents the generation of intrusion event, establishes walk away safety system, while it is auxiliary to establish corresponding safety Auxiliary system;S6:By improve operating system and application software security mechanism carry out network protection, the operating system of more new computer, Operating system is kept renewal, rights management is carried out to network system boot disk and user data disk, utilizes network system security The function of management aspect, network manager ensure registration security by user name, networking password, authorize and shield by specifying Inherited rights realize DRM operations, and catalogue, file are read and write property by setting computer system to be defined;S7:Network firewall is established to carry out network protection, access rights are limited by network firewall;S8:By carrying out network protection to packet automatic detection, automatic detection module includes NESS detection modules, Strobe is examined Survey module, SATAN detection modules and ISS detection modules, the detection content of the automatic detection module include configuration file detection, Protection mechanism detects and difference test, dangerous packet is isolated, so as to carry out security protection to computer network.
- A kind of 2. computer network means of defence according to claim 1, it is characterised in that:In the step S2, data AES has DES, AES, MD5, SH-1, IDEA, RSA and PGP.
- A kind of 3. computer network means of defence according to claim 1, it is characterised in that:In the step S3, backup Data preserve on a different storage medium, periodically necessary Backup Data are burnt in CD, important data creating 2 Copy above and be stored in different places, ensure that data can be recovered in time after damage.
- A kind of 4. computer network means of defence according to claim 1, it is characterised in that:It is described in the step S4 Intruding detection system checks network and system by collecting the information with key point in analysis computer network and computer system In with the presence or absence of the behavior and the sign attacked for violating security strategy, the intruding detection system constantly supervisory computer system With the event occurred in network system, security audit is carried out according to rule, the operation conditions of network, system is monitored, from And the various information with attack attempt and attack are isolated, to ensure the confidentiality of network system resources, complete Property and availability, the intruding detection system can recognize that any not dangerous information activities using record of the audit, so as to Reach and limit these activities to protect the security purpose of system.
- A kind of 5. computer network means of defence according to claim 1, it is characterised in that:In the step S7, pass through The safety of fire wall is paid close attention to protect the network security of computer, all communication flows all pass through fire wall and carry out audits and compliance and guarantor Deposit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710789186.7A CN107347079A (en) | 2017-09-05 | 2017-09-05 | Computer network means of defence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710789186.7A CN107347079A (en) | 2017-09-05 | 2017-09-05 | Computer network means of defence |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107347079A true CN107347079A (en) | 2017-11-14 |
Family
ID=60257796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710789186.7A Withdrawn CN107347079A (en) | 2017-09-05 | 2017-09-05 | Computer network means of defence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107347079A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108111503A (en) * | 2017-12-15 | 2018-06-01 | 安徽长泰信息安全服务有限公司 | Based on the information safety protection host machine for accessing limitation |
CN108337231A (en) * | 2017-12-26 | 2018-07-27 | 海尔优家智能科技(北京)有限公司 | Isolation network remote deployment method, apparatus, equipment and storage medium |
CN108462714A (en) * | 2018-03-23 | 2018-08-28 | 中国人民解放军战略支援部队信息工程大学 | A kind of APT systems of defense and its defence method based on system resilience |
CN108710793A (en) * | 2018-05-25 | 2018-10-26 | 马鞍山市润启新材料科技有限公司 | A kind of computer network means of defence and system |
CN108875347A (en) * | 2018-07-12 | 2018-11-23 | 上海常仁信息科技有限公司 | The automatic protection method of hacker attacks and control is prevented based on robot identity card |
CN109005182A (en) * | 2018-08-15 | 2018-12-14 | 钟百成 | A kind of computer network management system |
CN109101818A (en) * | 2018-08-14 | 2018-12-28 | 齐鲁工业大学 | A kind of computer network security detection method |
CN109450892A (en) * | 2018-11-05 | 2019-03-08 | 日照职业技术学院 | A kind of computer network detection method |
CN109933983A (en) * | 2019-01-23 | 2019-06-25 | 秦皇岛职业技术学院 | A kind of information security of computer network management system |
CN110460614A (en) * | 2019-08-21 | 2019-11-15 | 小胡杨信息技术(武汉)有限公司 | A kind of working method of computer information system auxiliary security guard system |
CN113132412A (en) * | 2021-04-30 | 2021-07-16 | 南京林业大学 | Computer network security test and inspection method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701777A (en) * | 2013-12-11 | 2014-04-02 | 长春理工大学 | Remote network attack and defense virtual simulation system based on virtualization and cloud technology |
US9208335B2 (en) * | 2013-09-17 | 2015-12-08 | Auburn University | Space-time separated and jointly evolving relationship-based network access and data protection system |
CN206164589U (en) * | 2016-11-15 | 2017-05-10 | 滁州市拓海信息科技有限公司 | Computer network safety monitoring device |
CN206237439U (en) * | 2016-12-04 | 2017-06-09 | 浙江易网科技股份有限公司 | A kind of embedded webpage server selfloop detection apparatus |
-
2017
- 2017-09-05 CN CN201710789186.7A patent/CN107347079A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9208335B2 (en) * | 2013-09-17 | 2015-12-08 | Auburn University | Space-time separated and jointly evolving relationship-based network access and data protection system |
CN103701777A (en) * | 2013-12-11 | 2014-04-02 | 长春理工大学 | Remote network attack and defense virtual simulation system based on virtualization and cloud technology |
CN206164589U (en) * | 2016-11-15 | 2017-05-10 | 滁州市拓海信息科技有限公司 | Computer network safety monitoring device |
CN206237439U (en) * | 2016-12-04 | 2017-06-09 | 浙江易网科技股份有限公司 | A kind of embedded webpage server selfloop detection apparatus |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108111503A (en) * | 2017-12-15 | 2018-06-01 | 安徽长泰信息安全服务有限公司 | Based on the information safety protection host machine for accessing limitation |
CN108337231A (en) * | 2017-12-26 | 2018-07-27 | 海尔优家智能科技(北京)有限公司 | Isolation network remote deployment method, apparatus, equipment and storage medium |
CN108337231B (en) * | 2017-12-26 | 2021-09-24 | 海尔优家智能科技(北京)有限公司 | Isolation network remote deployment method, device, equipment and storage medium |
CN108462714A (en) * | 2018-03-23 | 2018-08-28 | 中国人民解放军战略支援部队信息工程大学 | A kind of APT systems of defense and its defence method based on system resilience |
CN108710793A (en) * | 2018-05-25 | 2018-10-26 | 马鞍山市润启新材料科技有限公司 | A kind of computer network means of defence and system |
CN108875347A (en) * | 2018-07-12 | 2018-11-23 | 上海常仁信息科技有限公司 | The automatic protection method of hacker attacks and control is prevented based on robot identity card |
CN109101818A (en) * | 2018-08-14 | 2018-12-28 | 齐鲁工业大学 | A kind of computer network security detection method |
CN109005182A (en) * | 2018-08-15 | 2018-12-14 | 钟百成 | A kind of computer network management system |
CN109450892A (en) * | 2018-11-05 | 2019-03-08 | 日照职业技术学院 | A kind of computer network detection method |
CN109933983A (en) * | 2019-01-23 | 2019-06-25 | 秦皇岛职业技术学院 | A kind of information security of computer network management system |
CN110460614A (en) * | 2019-08-21 | 2019-11-15 | 小胡杨信息技术(武汉)有限公司 | A kind of working method of computer information system auxiliary security guard system |
CN113132412A (en) * | 2021-04-30 | 2021-07-16 | 南京林业大学 | Computer network security test and inspection method |
CN113132412B (en) * | 2021-04-30 | 2023-07-11 | 南京林业大学 | Computer network security test and inspection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107347079A (en) | Computer network means of defence | |
Greenberg et al. | Mobile agents and security | |
CN101729545B (en) | Secure consultation system | |
Gerić et al. | Information system security threats classifications | |
CN101895578A (en) | Document monitor and management system based on comprehensive safety audit | |
Siegel et al. | Cyber-risk management: technical and insurance controls for enterprise-level security | |
EP2761528A2 (en) | Secure integrated cyberspace security and situational awareness system | |
WO2018164503A1 (en) | Context awareness-based ransomware detection | |
AU2012315742A1 (en) | Secure integrated cyberspace security and situational awareness system | |
CN101098224A (en) | Method for encrypting/deciphering dynamically data file | |
CN115314286A (en) | Safety guarantee system | |
Xu et al. | Network security | |
Kiser et al. | Ransomware: Healthcare industry at risk | |
CN108881260A (en) | A kind of novel computer network protection method | |
Belmabrouk | Cyber Criminals and Data Privacy Measures | |
Yang et al. | Analysis of Computer Network Security and Prevention Technology | |
Okonkwo et al. | Surveying Security Policies and Infrastructure for Ransomware Attacks (2022) | |
EP4365742A1 (en) | Computer-implemented system and method for recovering data in case of a computer network failure | |
Zhang et al. | Design of Information Security Protection System for Cloud Business System | |
Li | Security Management Measures for Library Computer Network | |
CN117714093A (en) | Network security protection method and system for information management system | |
Thu | Types of Cyber Attacks and Incident Responses | |
Süß et al. | Data Center Security and Resiliency | |
Salman et al. | Vulnerable Data Center and Developing of On-line Protection | |
Muxammadqul o‘g‘li | INFORMATION SECURITY AND PREVENTION IN DIGITAL DIPLOMACY |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20171114 |