Abstract

With the continuous development of computer information technology, data storage and processing methods have changed, which has a great impact on information security. This paper describes the work done in this field at home and abroad. In combination with the emergence of new technologies such as network technology and cloud computing in the current era, it provides us with convenient conditions. At the same time, it also discusses how to apply these new science and technology to reality, and puts forward corresponding measures for reference and suggestions. This paper first introduces the data storage and processing methods of computer information technology and related concepts, and then briefly describes and analyzes computer information technology and information security. An encryption technology model for security vulnerabilities is designed to test the encryption technology performance of the model. The test results show that when the key is public key encryption, the running time is less than that of private key encryption, which means that with the increase of the number of files, the computational complexity increases at a relatively fast linear speed.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call