Exploration of Effective Application of Firewall Technology in Computer Network Information Security

Authors

  • Yurou Pan Shanghai Dianyi Network Technology Co., Ltd. Shanghai 200050

DOI:

https://doi.org/10.53469/jtpms.2025.05(6).11

Keywords:

Computer network, Information security, Firewall technology

Abstract

With the continuous development of information technology, computer network technology has been widely used in various fields such as people's lives, work, and learning.In the information age, the application of various information technologies has provided strong support for people's daily lives, which has also comprehensively increased the attention of various industries in China to data security.Firewall technology plays an important role in ensuring data security, so innovating and optimizing firewall technology is currently the most important research for computer network information security.Based on this, the article elaborates on the characteristics and concepts of firewall technology, and deeply analyzes the specific applications of firewall technology.

References

Pal, P. et al. 2025. AI-Based Credit Risk Assessment and Intelligent Matching Mechanism in Supply Chain Finance. Journal of Theory and Practice in Economics and Management. 2, 3 (May 2025), 1–9. DOI:https://doi.org/10.5281/zenodo.15368771

Peng, Qucheng, Ce Zheng, and Chen Chen. "Source-free domain adaptive human pose estimation." Proceedings of the IEEE/CVF International Conference on Computer Vision. 2023.

Pinyoanuntapong, Ekkasit, et al. "Gaitsada: Self-aligned domain adaptation for mmwave gait recognition." 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems (MASS). IEEE, 2023.

Zheng, Ce, et al. "Diffmesh: A motion-aware diffusion framework for human mesh recovery from videos." 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). IEEE, 2025.

Zhang, Shengyuan, et al. "Research on machine learning-based anomaly detection techniques in biomechanical big data environments." Molecular & Cellular Biomechanics 22.3 (2025): 669-669.

Fang, Z. (2025). Adaptive QoS‐Aware Cloud–Edge Collaborative Architecture for Real‐Time Smart Water Service Management.

Qi, R. (2025). Interpretable Slow-Moving Inventory Forecasting: A Hybrid Neural Network Approach with Interactive Visualization.

Wang, Y. (2025). RAGNet: Transformer-GNN-Enhanced Cox–Logistic Hybrid Model for Rheumatoid Arthritis Risk Prediction.

Zhou, Dianyi, et al. "Research on LSTM-driven UAV path planning." Fourth International Conference on Advanced Algorithms and Neural Networks (AANN 2024). Vol. 13416. SPIE, 2024.

Yang, W., Zhang, B., & Wang, J. (2025). Research on AI Economic Cycle Prediction Method Based on Big Data.

Tu, T. (2025). Log2Learn: Intelligent Log Analysis for Real-Time Network Optimization.

Ding, Y., Wang, X., Yuan, H., Qu, M., & Jian, X. (2025). Decoupling feature-driven and multimodal fusion attention for clothing-changing person re-identification. Artificial Intelligence Review, 58(8), 1-26.

Wang, Lizhe, et al. "Loading capacity prediction of the auxetic tubular lattice structures by multiscale shakedown analysis." Composite Structures 314 (2023): 116938.

Downloads

Published

2025-06-20

How to Cite

Pan, Y. (2025). Exploration of Effective Application of Firewall Technology in Computer Network Information Security. Journal of Theory and Practice of Management Science, 5(6), 58–62. https://doi.org/10.53469/jtpms.2025.05(6).11