Paper
1 June 2023 Research on information security protection technology of university office system
Jiangying Dong
Author Affiliations +
Proceedings Volume 12625, International Conference on Mathematics, Modeling, and Computer Science (MMCS2022); 126251J (2023) https://doi.org/10.1117/12.2670301
Event: International Conference on Mathematics, Modeling and Computer Science (MMCS2022),, 2022, Wuhan, China
Abstract
Under the background of the development of information technology, increasingly, information network not only has brought people convenience, also produced more safe hidden trouble, the hidden danger also affects the running quality of office system in colleges and universities, therefore in the college office network and information technology development, how to ensure the office of information security is to explore the main topic of administrative personnel. In this paper, based on the understanding of the changes of the office information environment in colleges and universities under the information environment, according to the current problems faced by the office information security in colleges and universities, deep discussion on how to build a standard information security protection system, clear practice and development can be used to protect technology. The final empirical results show that the information security protection system of university office system with computer as the core can better protect its own information security.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jiangying Dong "Research on information security protection technology of university office system", Proc. SPIE 12625, International Conference on Mathematics, Modeling, and Computer Science (MMCS2022), 126251J (1 June 2023); https://doi.org/10.1117/12.2670301
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Network security

Computer security

Data storage

Information technology

Safety

Security technologies

Back to Top