《信息安全课程设计》教学大纲
课程代码 | 045101851 |
课程名称 | 信息安全课程设计 |
英文名称 | Information Security Curriculum Design |
课程类别 | 集中实践课 |
课程性质 | 必修 |
学时 | 总学时:2周 |
学分 | 2 |
开课学期 | 第六学期 |
开课单位 | 计算机科学与工程学院 |
适用专业 | 信息安全 |
授课语言 | 中文 |
先修课程 | 信息安全专业前五学期的必修课程 |
课程对毕业要求的支撑 | 本课程对学生达到毕业要求有如下贡献: 1.(工程知识)掌握信息安全技术和工具,能够将工具应用于解决复杂的计算机安全问题。 2.(问题分析)能够应用信息安全的基本原理和技术,并通过文献研究分析复杂的安全问题。 3.(设计/开发解决方案)能够设计针对复杂信息安全问题的解决方案,或设计解决安全问题的工具。 4. (研究)能够针对信息安全现状进行研究,提取和解决问题。 |
课程目标 | 本实践环节是信息安全类专业重要的必修实践课程,主要要求学生掌握信息安全相关的原理和技术以及在信息安全实践中的应用。本课程设计的目的如下: 1. 培养学生掌握文献检索、资料查询及运用现代信息技术获取信息安全相关知识和信息的基本方法; 2. 使学生在真正理解和掌握信息安全的相关理论知识基础上,动手编写安全程序,通过系统和网络的安全性设计,加密算法、计算机病毒、恶意代码的分析与设计等实践锻炼,解决一些实际信息安全应用问题,同时了解本专业的前沿发展现状和趋势; 3. 使学生具备设计和实施信息安全相关实验的能力以及相应的程序设计能力,具备 对实验结果进行分析,进而进行安全设计、分析、配置和管理的能力。 4. 通过该课程,加强学生对学校专业的认同和对行业的认同。 |
课程简介 | 信息安全课程设计是一门实践性非常强的课程,通过小组的形式完成课题,能帮助学生巩固信息安全的理论和应用知识,了解信息安全领域的发展动态,培养学生的综合能力。 |
教学内容与学时分配 |
重点:实现专业知识教学与立德树人教育的有机融合;激发学生“实干兴邦”的爱国奋斗精神。 (二)分组和选题阶段, 3学时 通过前期的知识积累和对信息安全领域前沿的了解,完成资料查阅和分组,并选定与信息安全相关的题目。要求提交分组和选题报告。 (三)完成中期任务,8学时 完成课程设计的部分内容,对选题的研究现状和进展有所掌握,并完成选题方案的初步设计。要求提交中期考核报告。 (四)完成课程设计,12学时 完成课程设计的全部内容,设计出选题的方案,并对方案进行编程实现,提交课程设计报告并进行答辩。 课程设计报告中,要求程序代码总量不少于500行(其中不包括编译器自动生成的代码),关键代码必须有合理注释;课程设计报告正文字数不少于2500汉字,概念及逻辑清楚、叙述正确、内容完整、书写规范;课程设计中必须按指导书要求,综合应用所学的信息安全知识解决实际问题,有必要的理论分析,设计要有合理的依据。 |
实验教学(包括上机学时、实验学时、实践学时) | 无 |
教学方法 | 课程设计 |
考核方式 | 总成绩按如下阶段占比: 1.选题阶段(15%) 2.中期考核阶段(30%) 3.课程设计报告提交及答辩(55%)。 |
教材及参考书 | [1]孙夫雄,《Windows信息安全实践教程》,清华大学出版社,2015 [2]李剑,《信息安全实验》, 电子工业出版社,2009 [3]王清贤,《网络安全实验教程》, 电子工业出版社,2016 |
制定人及制定时间 | 徐玲玲,2019年4月10日 |
“Information Security Curriculum Design” Syllabus
Course Code | 045101851 |
Course Title | Information Security Curriculum Design |
Course Category | Practice Course |
Course Nature | Compulsory Course |
Class Hours | 2 weeks |
Credits | 2 |
Semester | Sixth Semester |
Institute | School of Computer Science & Engineering |
Program Oriented | Information Security |
Teaching Language | Chinese |
Prerequisites | Other Compulsory Courses oriented Information Security Program |
Student Outcomes (Special Training Ability) | This course has the following contributions to students' graduation requirements:
(4) Research: propose and solve problems after analyzing the research status of information security. |
Course Objectives | This practice is an important compulsory practice course for information security majors, which requires students to master the principles and techniques related to information security and their application in information security practice. The purpose of this course design is as follows: (1) to train students to master the basic methods of literature retrieval, data inquiry and the use of modern information technology to obtain relevant knowledge and information about information security; (2) enable students to truly understand and master the information security based on the theory of knowledge, writing security procedures, through the system security design and network, encryption algorithm, computer viruses, malicious code analysis and design practice, to solve some practical application problems of information security, and understand the current situation and development trend of Frontier the professional; (3) to enable the students to have the design and implementation of information security experiment ability and the corresponding ability of program design, with the analysis of experimental results, and the ability of safety design, analysis, configuration and management. (4) Through this course, strengthen the students' identity to the university and profession. |
Course Description | The information security curriculum design is a practical course. By completing the course in the form of project group, students can consolidate the knowledge of information security, understand the development of information security and improve the comprehensive ability. |
Teaching Content and Class Hours Distribution | No.1 Ideological construction, 1 hour Key points: realize the organic integration of professional knowledge teaching and moral education; Inspire the students' patriotic struggle spirit of "making the country prosperous by doing" . No.2 Topic selection stage, 3 hours Through prior knowledge accumulation and knowledge of the frontier in the field of information security, select topics related to information security. Submission of topic selection reports is required. No.3 Completion of mid-term tasks, 8 hours Complete part of the curriculum design, master the research status and progress of topics, and complete the preliminary design of topics. Submission of mid-term assessment report is required. No.4 Complete the course design, 11 hours Complete the whole content of course design, design the scheme of topic selection, program the scheme, submit the curriculum design report and reply. In the course design report, the total amount of program code is not less than 500 lines (excluding the code automatically generated by the compiler), and the key code must be reasonably annotated; the number of the main text of the course design report is not less than 2500 Chinese characters, the concept and logic are clear, the description is correct, the content is complete and the writing is standard; in the course design, the information security learned must be applied comprehensively according to the requirements of the guide book. To solve practical problems, it is necessary to make theoretical analysis and design with reasonable basis. |
Experimental Teaching | No |
Teaching Method | course design |
Examination Method | The total scores are as follows: 1. Topic selection stage (15%) 2. Mid-term assessment stage (30%) 3. Course design report submission and reply (55%). |
Teaching Materials and Reference Books | [1] Sun Fuxiong, Guidance of Windows information security experiments, Tsinghua University press, 2015 [2] Li Jian, Information security experiments, Electronic Industry Press, 2009 [3]Wang Qingxian, Network security experiments, Electronic Industry Press,2015 |
Prepared by Whom and When | Xu Lingling, 10th April 2019 |