Teaching computer network security control system

A technology for teaching computer network and security control, applied in the field of network security, can solve problems such as low security, paralysis of teaching computers, hidden dangers of computer information security, etc., to achieve the effect of ensuring security

Inactive Publication Date: 2018-10-16
ZIBO VOCATIONAL INST
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of network technology, computers are an indispensable tool in people's work, life and study. Computer networks have developed rapidly in various fields of society, including the field of educational equipment. Modern education is increasingly inseparable from digital equipment. Teaching Using computers to network to obtain educational resources, during the operation of teaching computers, it is inevitable to suffer from various attacks on the network, which brings hidden dangers to computer information security
In order to better monitor the network security operation of the computer network, it is often necessary to design a special control device. When the traditional control device detects unsafe factors, it often cannot quickly isolate and alarm, and the security is low. Due to the teaching computer connection There are many teaching computers, once the teaching computers are poisoned or attacked, it is easy to cause a large number of teaching computers to be paralyzed, causing adverse consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Teaching computer network security control system
  • Teaching computer network security control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0018] Such as figure 1 with figure 2 As shown, a teaching computer network security control system includes a central processing unit 1, the central processing unit 1 is connected with a common hard disk 2, a network monitor 3 and a fault detection system 4, and the central processing unit 1 is connected with a relay through a relay driver 5 6. The relay 6 is connected with the network card 7 and the security hard disk 8 respectively. The network card 7 is connected with a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a teaching computer network security control system. The system comprises a central processing unit (CPU), the CPU is connected with a normal hard disk, a network monitor and afault detection system; the CPU is connected with a relay through a relay driver, the relay is respectively connected with a network card and a secret hard disk; the network card is connected with anetwork selector switch, the network selector switch is connected with at least two network communication units connected with the internet; and a signal end of the network selector switch is connected with the CPU. The CPU is connected with the relay through the relay driver, the relay is respectively connected with the network card and the secret hard disk, when the relay is in work, one of thenetwork card or the secret hard disk is connected with the CPU; through the arrangement of the relay, the secret hard disk of the computer stops running under the networking state, thereby guaranteeing the security of the secret data of the user.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a teaching computer network security control system. Background technique [0002] With the development of network technology, computers are an indispensable tool in people's work, life and study. Computer networks have developed rapidly in various fields of society, including the field of educational equipment. Modern education is increasingly inseparable from digital equipment. Teaching Using computers to network to obtain educational resources, in the course of the operation of teaching computers, is inevitably subject to various attacks on the network, which brings hidden dangers to computer information security. In order to better monitor the network security operation of the computer network, it is often necessary to design a special control device. When the traditional control device detects unsafe factors, it often cannot quickly isolate and alarm, and the securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24H04L12/26
CPCH04L41/06H04L43/08H04L63/02H04L63/1408H04L63/1433
Inventor 刘长骞
Owner ZIBO VOCATIONAL INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products