Chapter 1029 1029: Delayed Update - Ashen God - NovelsTime

Ashen God

Chapter 1029 1029: Delayed Update

Author: Just call the polar bear
updatedAt: 2026-01-14

Gastroenteritis hasn't improved; previously, I've been relying on Montmorillonite powder to persist. Today, I originally thought it was fine and stopped taking Montmorillonite powder, but once I stopped, I immediately began having diarrhea... I feel that my probability of getting stomach cancer as I age should be quite high.

Therefore, the update will be postponed a bit tonight, just refresh this chapter to see the update.

......

Abstract: To enhance the safety of computer network engineering, this paper conducts research on the security issues and solutions of computer network engineering, summarizing the essence of computer network engineering security. It explores computer network security issues from aspects such as operating systems, resource sharing, network protocols, and computer viruses, offering solutions and concluding that the security of computer network engineering should be ensured through multi-faceted approaches.

Keywords: computer; network engineering; security issues; solutions

In recent years, the rapid development of information technology in our country has enabled computer networks to play an irreplaceable role across various industries in society. People can efficiently and promptly transmit various information without leaving their homes through the operation of computer network systems, completing various tasks. However, the convenience brought by computer networks is built upon the security of network engineering. If users do not pay attention to the security risks within computer network engineering, it might offer opportunities for network infringements, threatening computer information safety. Therefore, this paper discusses the security issues and solutions of computer network engineering.

1 Overview of Computer Network Engineering Security

Currently, computer networks have been widely adopted across various domains in our society. When it comes to computer network engineering security, its specific meaning is quite rich. For instance, business operators believe their computer network engineering security protection system should meet the requirements to prevent their business information from being stolen. On the other hand, individual users tend to focus more on safeguarding their own privacy and data security. Generally speaking, the security of computer network engineering effectively ensures the safety, stability, integrity, effectiveness, and confidentiality of computer information systems in conducting various business activities [1]. In the current stage of computer networks, computer data is showing a noticeable trend of concentration, and the network environment is becoming increasingly complex, bringing numerous risk challenges to information security in computer network engineering. Especially during the initial construction phase of many computer network engineering projects, engineers only considered the adaptability and practicality of the network comprehensively, without deeply examining its security, which could lead to information security issues arising from unreasonable factors in design, configuration, or application during the late stage of usage. Therefore, when constructing computer network engineering, it should not only ensure the timely and comprehensive recording and storage of various information data but also provide sufficient network protection services, ensuring the security of computer network engineering technologically through hardware, software, and various data transmission media.

2 Existing Security Issues in Computer Network Engineering

2.1 Issues in Computer Operating Systems and Resource Sharing

The operating system is a crucial part of a computer and has an undeniable influence on the stable and safe operation of the computer overall, thus the operation status of the operating system is closely related to computer network security. If issues arise in the computer operating system's operation, they will pose significant security risks to the computer network. Currently, Microsoft's Windows operating system is widely used in computers, but its legitimate version is expensive, leading many businesses and individual users to use pirated versions of Windows as their computer operating system. These pirated operating systems often lack comprehensive security configurations, possibly leading to various network security risks, and issues such as system account management and port setting arise during the operation, negatively affecting the stable and secure operation of the computer system overall [2]. Computer resource sharing has a certain duality, offering continuous resources and providing adequate convenience to users while also posing security risks that seriously affect the safety of computer network operations. The concept of resource sharing is mainly through an open form to obtain various data information and resources, highlighting its openness, creating opportunities for trojans, viruses, and other internet security threats. Under the condition of computer information resource sharing, computer users have relatively low privacy settings, allowing malicious intruders to easily invade and destroy users' computer systems through illegal means, especially when targeting and disrupting the computer's servers, imposing significant security risks on the computer network. Furthermore, since resource sharing also manifests in computer hardware, software, and terminals, malicious intruders can even start from the terminals, using illicit means to sabotage the computer's hardware and software, preventing computer users from normally completing various information data transmissions, resulting in losses for the users.

2.2 Destruction Using TCP/IP Network Protocol

The coordinated operation of network protocols has an indispensable influence on the safety and stable operation of computer systems. Presently, in terms of the development of computer network technology, the application of the TCP/IP protocol is extremely widespread. However, when designing computer network systems, designers often do not comprehensively, thoroughly, or deeply consider the openness, interconnectedness, and security of computer networks, especially easily overlooking the security of computer networks by setting them as a trustworthy network environment, leading to insufficient security of the protocol itself, thereby creating security risks for computer networks and providing opportunities for malicious intruders [2]. Malicious intruders can use the computer's server to steal various important network resources, even maliciously tampering with various information data of computer users, resulting in computer users failing to accurately complete the dissemination of various information data, such as intercepting connections and stealing IP addresses.

2.3 Computer Virus Issues

Computer virus issues are a significant security hazard in computer networks. Computer viruses have some similarity to real biological viruses, that is, they attach to computer files and use self-replication to infect other files within the computer. This virus propagation has a certain level of concealment, often preventing computer users from discovering it promptly. Computer users may allow their computers to become infected with viruses upon receiving emails from unknown sources or browsing certain web pages. Once viruses enter a computer, they can infect other files of the user based on their self-replication, causing serious damage to the computer network. If computer users do not use antivirus software to promptly and effectively clean up the viruses, it may lead to the collapse of the computer network system. Currently, with the increasing technical proficiency of virus programmers, computer viruses are continually updating and upgrading, presenting severe challenges to the update and optimization of antivirus software as well as the security of computer network engineering.

2.4 Cloud Computing-Related Security Issues

Users may encounter certain security issues when applying different cloud computing service models or deploying cloud computing service models, mainly divided into the security issues of the cloud vendor and the user. However, overall, not all problems are concentrated solely on the cloud vendor or the user. The primary responsibility of the cloud vendor in this process is to ensure the stability and security of the cloud computing network infrastructure, while users should set reliable authentication passwords to secure their own data and cloud applications. When users store data or log into applications on the public cloud, they should ensure the information is well hosted on the corresponding cloud server, but under the current backdrop of increasing personal conflicts and commercial competition, the user's information security faces more severe threats. From a technical security perspective, multi-user cloud environments are prone to serious computer network security issues, where different users are mostly isolated from each other without mutual influence, yet in the increasingly developing background of the cloud era, these users may still inadvertently or deliberately "visit", causing information leakage. For this part, currently, all data maintenance tasks are handled by third-party platforms, such as cloud encryption and digital certificate encryption, and users can choose appropriate encryption methods based on the importance of their own data to maintain the safety of internet data transmission.

3 Solutions to Computer Network Engineering Security Issues

3.1 Establish a Complete Computer Network Security Defense System

In response to the security issues existing in current computer network engineering, a complete computer network security defense system should be further established. Specifically: (1) Setting up a complete firewall to prevent hackers. A complete firewall system can be a powerful guarantee for computer network engineering security. A firewall generally refers to a protective barrier composed of hardware and software devices, forming at the interface of public networks from internal and external networks [3]. It is a typical network access control device that can build a secure gateway between the Internet and Intranet to achieve strong protection of the computer internal network and prevent hacker intrusion, access to computer internal networks, thereby maintaining computer network security. (2) Strengthening the intrusion detection system. The intrusion detection system is also an integral part of the computer network security defense system. Computer users can use intrusion detection systems to timely identify unwanted activities, impose certain restrictions on various computer activities to ensure the safe operation of computer networks. Computer users can also adopt a hybrid intrusion detection approach, establishing intrusion detection systems based on network and host foundations to make the computer network security active defense system more three-dimensional and achieve strong protection of computer networks. (3) Enhancing security scanning. After setting up complete firewall and intrusion detection systems, computer users should also regularly complete security scans of the computer to strengthen the screening of vulnerabilities and security issues that exist in computer system operations, promptly eliminating various security risks, repairing vulnerabilities, and ensuring network security. (4) Optimizing the use of encryption technology. Encryption technology is also an indispensable part of the computer network security defense system, with its operating system security level as C1, C2, able to implement precision recognition of computer users and effectively control their registration to maintain network security. The large database management system used for encryption technology is Windows NT and Unix, capable of effectively encrypting various sensitive data in the computer system, ensuring computer vulnerabilities are not exploited by hackers and viruses, preventing illegal intruders from destroying databases, ensuring the accuracy of information data transmission, thereby ensuring the security and stability of computer network systems.

3.2 Strengthening the Prevention of Computer Viruses and Timely Repair of Vulnerabilities

Currently, against the backdrop of constant iterations of computer network technology, computer network security issues also showing a certain trend of complexity, especially that of computer viruses which have a noticeable trend of complexity, capable of disguising themselves as unidentifiable files and URLs, enticing computer users to click and browse, thereby spreading viruses to other files within the computer. The increasing complexity of computer viruses also increases the difficulty of detection by antivirus software. Therefore, to realize effective prevention of computer viruses, computer users should start from themselves, raising virus prevention awareness, regularly upgrading antivirus software, and avoiding browsing various suspicious web pages and emails as much as possible to reduce the possibility of computer virus intrusion from the source. Currently, in China, more mature computer antivirus software includes KV300 and KILL, etc., with users able to use anti-virus cards to realize dynamic monitoring of computers and timely discover computer viruses. Furthermore, upon detecting vulnerabilities within the computer network system, computer users should repair the vulnerabilities immediately and use antivirus software in daily usage to conduct thorough scans of the computer system, aiming to timely discover and fix vulnerabilities and multi-level prevention of virus and hacker intrusion, maintaining computer network security.

3.3 Using Access Control Systems to Effectively Store and Back Up Data

In dealing with various security issues within computer networks, computer users can use access control systems, namely certification systems and access control gateways, to effectively restrict information resources of all aspects of the computer network. Specifically, when using various information resources in the computer network, computer users must pass authentication, ensuring the accuracy and validity of the resources used by computer users. Computer users should adopt effective methods to solve existing problems within the computer network, carefully plan the usage of computer network traffic, and continually optimize and adjust based on actual situations, ensuring computer network resources are fully utilized [4]. Moreover, they can also implement adjustments to connection points with ACL functionality, use IP address restrictions for users, conduct regular modifications using administrator passwords to prevent the computer network system from being threatened while operating.

Novel