Factors Affecting Privacy Protection of Computer Network Applications and Countermeasures

Factors Affecting Privacy Protection of Computer Network Applications and Countermeasures

With the continuous development of computer network, the convenience of the network has brought immeasurable optimization to people's lives. But at the same time, the problem of privacy leakage caused by computer applications can not be underestimated. Privacy protection is directly related to the disclosure of privatization information such as pictures, files, application data and IP addresses in users' own computers during data transmission, so attention should be paid to the protection of computer application privacy. Based on this background, this paper studies several factors that affect privacy protection, and on this basis, analyzes the preventive strategies of privacy protection, aiming at further improving the security of computer network applications.

Computer network security is now closely related to our lives, and preventive measures should focus on prevention, effectively preventing physical security and logical security, so that users will not have the threat of privacy disclosure when using computer application software. This paper focuses on the privacy protection of computer network applications, and studies its influencing factors and preventive strategies. The report is as follows:

First, the factors affecting privacy protection

(A) hackers use software to invade

Although the probability of contact with hackers in normal daily life is very small, the word hacker is not uncommon in the development of computers. Usually, hackers are classified as high-tech people. Through the application of computer network, hackers can use the loopholes in the application to achieve certain purposes, such as obtaining user information, understanding the status of commonly used software, intercepting files and so on. [1]. In severe cases, it may also cause the disclosure of important files or the tampering of data, which will seriously affect the security of computer networks. After the computer network is hacked, the hacker will intercept and obtain the required data and information, and explore the database in the computer and application during the operation. When hackers invade, computer applications will not only have serious data leakage, but also may cause users' data to be stolen or directly attacked, which will lead to the computer's failure to operate normally.

(2) Forcibly sending spam.

Judging from the current situation of people using computers in our country, the sending of spam and junk information has been repeatedly banned, which has caused some troubles to users. On the surface, these spam messages will not directly destroy computers like hackers or viruses, nor will they infringe on the security of their own data or files, but they are still bad factors that we may ignore at ordinary times. Because e-mail, chat software messages, software system messages and other information. It will be sent directly to the computer, and the sending form is in a continuous state. Some spam messages are sent in large quantities, and users may not be able to refuse for a long time, so there is a situation of compulsory acceptance. After users click to open some junk information, the computer network system may be affected to a certain extent, such as slow control and operation, black screen, jam, crash and so on. In addition, after clicking on these spam messages, personal information and IP addresses may also be leaked, affecting users' privacy.

(3) Various viruses emerge in an endless stream.

In the application of computer network, downloading data is inevitable. At this time, due to the smoothness and openness of the network, the virus may be directly implanted into the computer with the downloaded files, or even spread through the network for the second time. Viruses belong to the important damage category of computer application security, and belong to artificially written codes. But the code is malicious, which will lead to file leakage or form stubborn software, and even lead to the direct paralysis of the computer. Virus intrusion is usually destructive and contagious, and some viruses may also be displayed in text form, which users will find to be video files after clicking. Although this virus invasion will not cause damage to user's computer files or data leakage, these video files will occupy memory, and if the computer is started directly, it may also lead to abnormal computer startup, such as system jamming or sudden system crash during computer operation. Virus intrusion cannot spread by itself, but mainly spreads to other computers through e-mail, application software, message transmission and file reception.

Second, privacy protection and prevention strategies

(A) the government to strengthen intervention

Behind the unsafe factors are often linked to interests. Some criminals just use loopholes to achieve their own goals, such as obtaining user files, intercepting files, understanding user privacy data, stealing pictures and so on. In order to achieve the bad purpose of money or reputation. Therefore, government departments should intervene in the privacy protection of computer applications and restrict criminals through legislation. At present, China's network security maintenance belongs to the management of multiple departments, but the technology and information between departments have not been shared in real time, so there is a certain lag in management. In most cases, security incidents are dealt with after they appear, rather than being prevented in advance. Government departments can set up relevant maintenance units to comprehensively evaluate and guarantee the security protection of communication infrastructure, information and infrastructure, so as to ensure that the coping capacity reaches the pre-treatment state. Taking the forced sending of spam in privacy protection as an example, government departments can investigate the units that send spam and give a warning. If the warning is invalid, administrative measures shall be taken to stop it. Users can also report to government departments to create a good privacy protection environment.

(2) Backup of important data

Computer users should back up important files on their personal computers to avoid losing files when they are attacked by hackers or viruses, which will adversely affect their work, life and study. Information backup is an important way to avoid information loss. Users can make a backup system according to the purpose of their own files, and make a habitual backup after each operation on the network system, so that the backup can be processed regularly [4]. You need to save the changes in the computer system, so that even if hackers invade, you don't have to worry about the data being tampered with or lost at will. You only need to use backup files to restore the data, which can reduce the loss caused by privacy leakage or loss to some extent.

(3) Strengthen computer protection

Privacy protection not only requires users to take preventive measures in the process of connecting to the network, downloading data and transmitting data, but also needs to install relevant software in the computer to protect the daily use of the computer. The vulnerability of computer network security cannot be solved overnight, so it is very important to strengthen the ability of network system to resist bad invasion. Users can enhance the defense function of the network system by setting the firewall mode, use the firewall to resist the bad attacks in the network, and protect the key links of the computer at multiple levels, such as strengthening the protection of computer operation, computer services, computer hosts, computer files and computer applications.

Three. Concluding remarks

To sum up, the application of computer network security in privacy protection has been widely concerned at present. Relevant researchers should focus on the factors that affect privacy protection, give priority to prevention, provide a safe network environment for computer users, and improve the effectiveness of privacy protection.

;