Chapter 1028 1028: Late-Night Update - Ashen God - NovelsTime

Ashen God

Chapter 1028 1028: Late-Night Update

Author: Just call the polar bear
updatedAt: 2026-01-14

Ever since contracting COVID-19, my memory has significantly declined, feeling as if I am experiencing premature dementia. My ability to write has truly deteriorated, and my speed has greatly reduced. Therefore, the update will be postponed today, probably until around one or two in the morning. By then, simply refresh this chapter to view the update.

......

Abstract: In order to enhance the security of computer network engineering, this article examines the security issues and solutions related to computer network engineering, outlines the connotations of computer network engineering security, and explores computer network security issues from the aspects of operating systems, resource sharing, network protocols, and computer viruses while providing solutions. The conclusion is drawn that security must be ensured from multiple aspects in computer network engineering.

Keywords: computer; network engineering; security issues; solutions

In recent years, with the rapid development of information technology in our country, computer networks play an irreplaceable role across various sectors of society. People can operate computer network systems to efficiently and promptly convey various information, completing tasks without needing to leave home. However, the convenience brought by computer networks is built upon network engineering security. If users do not pay attention to the security risks in computer network engineering, it could potentially offer opportunities for network intrusions, threatening computer information security. Hence, this article explores the security issues and solutions in computer network engineering.

1 Overview of Computer Network Engineering Security

Currently, computer networks have been widely adopted in all fields of our society. The specific meaning of computer network engineering security is rich. For instance, from the perspective of business operators, their view on computer network engineering security should meet the need to protect various business information from theft; whereas personal users may focus more on safeguarding their privacy and data security. Generally speaking, the security of computer network engineering is a strong assurance for the safety, stability, and integrity, effectiveness, and confidentiality of computer network information systems conducting various operations [1]. Considering the current status of computer networks, computer data shows an evident trend of centralization, and the network environment shows an evident trend of complexity, raising numerous risks to information security in computer network engineering. Particularly in the initial stage of constructing many computer network projects, engineers only generally consider the adaptability and practicality of the network, without delving deeper into its security aspects, which might lead to information security issues during late-stage usage due to unreasonable factors in the design, configuration, and application. Therefore, in constructing computer network engineering, not only should it enable timely, comprehensive recording and storage of various information data, but should also provide adequate network protection services, starting from various data transmission media like hardware and software, to technically secure computer network engineering.

2 Security Issues in Computer Network Engineering

2.1 Issues in Computer Operating Systems and Resource Sharing

The operating system is a crucial part of the computer, having a significant influence on the stable and secure operation of the computer overall, thus computer network security is closely related to the operational status of the operating system. If the computer operating system encounters issues in its operation, it poses major security risks to computer networks. Currently, Microsoft's Windows operating system is widely used in computers; however, due to the high cost of purchasing genuine versions, many enterprises and individual users opt for pirated versions of Windows as their operating systems. These pirated operating systems often lack comprehensive security configurations, potentially leading to network security risks. During operation, the operating system may encounter a variety of issues such as problems in system account management or port settings, negatively impacting the safe and stable operation of the computer system overall [2]. Computer resource sharing inherently has a duality, bringing continuous resources and ample convenience to computer users while also introducing security risks that severely impact the security of computer network operations. The concept of resource sharing mainly refers to the process of acquiring diverse information and resources through an open form, thus openness is its most salient feature. This provides opportunities for internet security threats such as Trojans and viruses. In scenarios of computer information resource sharing, users have lower privacy settings, making it easy for malicious attackers to use illegal methods to invade and disrupt the user's computer system, especially by attacking and compromising the computer's server, leading to significant security risks in computer networks. Additionally, since resource sharing may also be reflected in computer hardware, software, and terminals, malicious attackers can even start at the terminal to damage a computer's hardware and software using illegal methods, resulting in the computer user being unable to use the computer to normally complete various information data transmissions, causing losses to computer users.

2.2 Destruction using TCP/IP Network Protocol

The coordinated operation of network protocols has a crucial influence on the secure and stable operation of computer systems. Currently, the application of the TCP/IP protocol is widespread based on the development of computer network technology. However, in the process of designing computer network systems, the designers often fail to comprehensively, integrally, and deeply consider the openness, interconnectivity, and security of computer networks, especially tending to neglect the security aspect of computer networks, setting it as a trusted network environment, resulting in insufficient protocol security, thus introducing security risks to computer networks and providing opportunities for malicious attackers [2]. Malicious attackers can leverage the servers of computers to steal various important network resources, even maliciously altering the information data of computer users, causing computer users to be unable to accurately complete the transmission of various information data, like intercepting connections or stealing IP addresses.

2.3 Computer Virus Issues

The computer virus issue is a significant security risk within computer networks. Computer viruses share certain similarities with biological viruses in reality, as they attach themselves to computer files and spread by self-replication, infecting other files within the computer. This virus transmission is somewhat hidden, and computer users often fail to detect it promptly. Users may download viruses from unknown email attachments or visiting certain websites. Once the virus enters the computer, it can replicate itself and infect other files of the user, leading to severe destruction of the computer network. If users fail to timely and effectively clean the virus using antivirus software, it may result in the paralysis of the computer network system. Currently, as virus programmers continue to enhance their computer technology skills, computer viruses are continuously updated and upgraded, posing a serious challenge to the optimization of antivirus software and the security of computer network engineering.

2.4 Security Issues Related to Cloud Computing

Users face certain security issues when applying or deploying different cloud computing service models. These issues can mainly be categorized into cloud vendor security issues and user security issues, but overall, not all problems are concentrated in either the cloud vendor or user aspect alone. Cloud vendors are primarily responsible for ensuring the stability and security of the cloud computing network infrastructure during this process, while users should establish reliable authentication passwords to safeguard their data and cloud applications' security. Users who store data or log into applications on a public cloud must ensure proper information hosting on the relevant cloud server. However, under the current context of increasing human conflicts and commercial competition, users' information security is facing heightened threats. From a technical security perspective, multi-user cloud environments can trigger severe computer network security issues. Although different users are generally isolated from one another, preventing mutual influence, in the rapidly developing cloud era, these users may still intentionally or unintentionally "visit" each other, leading to information leakage. Presently, all data maintenance work is handled by third-party platforms, such as cloud encryption and digital certificate encryption. Users can choose suitable encryption methods based on their data's importance to maintain the security of internet data transmission.

3 Solutions to Computer Network Engineering Security Issues

3.1 Constructing a Comprehensive Computer Network Security Defense System

Considering the existing security issues in computer network engineering, a complete computer network security defense system should be constructed. Specifically: (1) Establish a robust firewall to prevent hacker access. A comprehensive firewall system can provide strong protection for computer network engineering security. A firewall generally refers to a barrier composed of hardware and software devices, forming a protective screen at the public network interface from internal and external networks[3]. It is a typical network access control device that can build a security gateway between the Internet and Intranet, provide robust protection for the internal computer network, prevent hacker intrusion, and maintain computer network security. (2) Enhance intrusion detection systems. Intrusion detection systems are also vital components of the computer network security defense system. Computer users can use intrusion detection systems to promptly identify unwanted activities, impose certain restrictions on computer activities, and ensure safe operation of the computer network. Furthermore, users can adopt hybrid intrusion detection methods, establishing intrusion detection systems based on networks and hosts, making the active defense strategy of the computer network more comprehensive, and ensuring robust protection of the computer network. (3) Strengthen security scanning. After setting up a comprehensive firewall system and intrusion detection system, computer users should regularly perform security scans on their computers, enhancing the screening for vulnerabilities and security issues during computer system operations, swiftly eliminating all kinds of security hazards, repairing vulnerabilities, and ensuring computer network security. (4) Optimize the use of encryption technology. Encryption technology is also an indispensable first tier in the computer network security defense system. Its operating system security levels are C1 and C2, allowing for precision identification of computer users and effective control over their registrations, thereby maintaining computer network security. The large database management systems used in encryption technology are WindowsNT and Unix, enabling effective encryption of various sensitive data within the computer system. This ensures that computer vulnerabilities are not exploited by hackers or viruses, prevents illegal intruders from damaging databases, guarantees the accuracy of information data transmission, and thus ensures the security and stability of the computer network system.

3.2 Strengthen Computer Virus Prevention and Timely Repair of Vulnerabilities

Currently, under the backdrop of constantly evolving computer network technology, computer network security problems are also exhibiting a certain complexity trend, especially computer viruses, which show a distinct complexity trend. They can disguise themselves as difficult-to-identify files and URLs, inducing computer users to click and browse, thereby spreading the virus to other files within the computer. Due to the increasing complexity of computer viruses, the detection and removal challenges for antivirus software are also rising. Therefore, to effectively prevent computer viruses, users should start from themselves, enhance their virus prevention awareness, regularly update antivirus software, and avoid browsing suspicious websites or emails as much as possible, reducing the likelihood of computer virus invasion from the source. Currently, in China, mature computer antivirus software includes KV300, KILL, etc., and users can utilize virus prevention cards to monitor computer dynamics and promptly detect computer viruses. Additionally, upon detecting vulnerabilities in the computer network system, users should promptly repair the vulnerabilities. During routine use, they should also use antivirus software to scan the computer system, strive to identify and repair vulnerabilities promptly, preventing virus and hacker invasions in a comprehensive, multi-tiered manner, maintaining computer network security.

3.3 Utilizing Access Control Systems to Ensure Proper Data Storage and Backup

When addressing various security issues present within the computer network, users can leverage access control systems, utilizing authentication systems and access control gateway forms to effectively restrict information resources across all aspects of the computer network. Specifically, users must undergo identity authentication when accessing various information resources within the computer network to ensure the accuracy and efficacy of the resources they use. Users should employ effective methods to resolve various problems within the computer network, meticulously plan the usage traffic of computer networks, and continuously optimize and adjust according to real circumstances, thereby ensuring more comprehensive utilization of computer network resources[4].

Novel