Construction of Computer Network Security Information Leak-Proof Management System

Dong Z.

2nd International Conference on Forthcoming Networks and Sustainability in the IoT Era (FoNeS-IoT), ELECTR NETWORK, 8 - 09 January 2022, vol.129, pp.257-264 identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Volume: 129
  • Doi Number: 10.1007/978-3-030-99616-1_34
  • Page Numbers: pp.257-264
  • Keywords: Information leakage prevention, Network security, Information encryption algorithm, Network communication, Computer system
  • Istanbul University Affiliated: No


In recent years, computer network security has gradually penetrated into various industries in our society, and different companies and individuals have increased their efforts to prevent information leakage in terms of computer network security. This paper analyzes the importance of computer network information security at this stage, and through the establishment of network information security anti-leakage management system, the information received or transmitted is encrypted and improved, and the construction of computer network security information management system is improved. Based on the preliminary analysis results, a security management model based on the computer information leakage prevention system is designed. This model improves the original information encryption algorithm. After the improvement, both ends of the data transmission can be more secure than the original anti-information leakage model. The improved model can be used not only in the field of leakage prevention, but also in the construction of major computer network information security, realizing all-round management of computer network information leakage prevention. In order to ensure the normal operation of the network security information anti-leakage management system, it is necessary for the administrator to protect the security system and solve some problems that may arise in a timely manner. With the rapid development of high-amplitude construction of computer networks, the two classic encryption algorithms in computer network communication systems can effectively strengthen the security of network information leakage prevention.