Research on Optimization Strategies of Computer Network Security Technology in the Era of Big Data
DOI: https://doi.org/10.62517/jbdc.202601209
Author(s)
Qiyi Liang, Yuqing Gong
Affiliation(s)
School of Computer Science, Zhuhai College of Science and Technology, Zhuhai, China
Abstract
With the continuous development of information technology, the challenges faced by computer network security also show a significant upward trend. How to protect computer network security more effectively, it is necessary to comprehensively analyze the current situation of computer network security under the background of big data, and formulate targeted optimization strategies to provide protection for computer network security. Based on the current situation of computer network security under the background of big data era, this paper analyzes the optimization strategy.
Keywords
Era of Big Data; Computer; Network Security Technology; Strategy
References
[1] Huang Lan. Thoughts on the Optimization of Computer Network Security Technology in the Era of Big Data[J]. Information Recording Materials, 2025, 26(06): 239-241.
[2] Zhang Chengting, Cheng Chao, Ye Wanxing, et al. Application Strategies of Computer Network Security Technology in the Era of Big Data[J]. Computer Knowledge and Technology, 2025, 21(06): 86-87+96.
[3] Zhu Hao. Analysis on Information Security Issues of Computer Network Technology and Its Prevention Strategies in the Era of Big Data[J]. Information Recording Materials, 2024, 25(09): 43-45.
[4] Zeng Haifeng. Optimization Strategies of Computer Network Security Technology in the Era of Big Data[J]. Cyberspace Security, 2024, 15(04): 232-235.
[5] You Xiaoge. Optimization Strategies of Computer Network Security Technology in the Era of Big Data[J]. Digital Technology and Application, 2024, 42(08): 78-80.
[6] Ma Xiumei. Optimization Strategies of Computer Network Security Technology in the Era of Big Data[J]. Digital Communication World, 2024(06): 201-203+206.
[7] Ye Dong. Optimization Strategies of Computer Network Security Technology in the Era of Big Data[J]. Network Security and Informatization, 2024(04): 124-126.