Ideological construction(1 hour)
Key points: realize the organic integration of professional knowledge teaching and moral education; to make students realize that information security is also nation security, and inspire the students' patriotic struggle spirit of "making the country prosperous by doing" . Introduction to Information Security (1 hours)
(1) Understanding of information security (2) Information security threats (3) The security of the Internet (4) Information security architecture Key points: the types and manifestations of information security threats; information security architecture. Difficulties: information security architecture. The Basis of Cryptography (5 hours)
(1) Basic knowledge of cryptography (2) Classical password (3) Symmetric key password (4) Public key password (5) Message certification (6) The applications of cryptography: brief introduction to Blockchain Key points: affine ciphers and DES in symmetric key crypts; Diffie-Hellman and RSA in public key cryptography; principles of message authentication and digital signatures; Blockchain diagram. Difficulty: Diffie-Hellman and RSA in public key cryptography. Physical Security (1 hour)
(1) Overview (2) Equipment safety and protection (3) Anti-information disclosure (4) Physical isolation (5) Fault tolerance and disaster recovery Key points: the principle of electromagnetic leakage and protection of knowledge; physical isolation methods; fault tolerance, disaster recovery principles and measures. Difficulties: physical isolation and logic isolation. Identity Authentication (2 hours)
Overview
(2) Certification agreement (3) PKI Key points: the basic idea of the authentication protocol; the working principle of Kerberos; the basic idea of the public key infrastructure PKI. Difficulty: the working principle of Kerberos. Access Control (2 hours)
(1) Overview (2) Access control model (3) Access control for Windows systems Key points: access control model. Difficulties: active directory and group policy. Network Threat (2 hours)
(1) Overview (2) Computer viruses (3) Network intrusion (4) The type of lure threat Key points: the characteristics of computer viruses and precautions; network intrusion characteristics and precautions. Difficulties: the principle of network intrusion attack. Network Defense (2 hours)
(1) Overview (2) Firewall (3) Intrusion detection system (4) Network defense new technology Key points: the main firewall technology; IPtables firewall technical principles; intrusion detection technology principles. Difficulty: the technical principle of intrusion detection Snort system. |