Course name:
information security
Course code: 7 172
first part
The nature and objectives of the course
I. Nature and characteristics of the training course
"Information Security" is a specialized course of software engineering major in higher education self-study exam. Through the study of this course, students can fully understand the importance of information security and the basic concepts, methods and technologies related to information security, and apply them to practice.
This course mainly focuses on the theory and application of information security, including the basic theory and application of cryptography, network attack and protection, WEB security threats and prevention, computer virus prevention, and e-commerce security.
This scheme is compiled according to the guiding ideology and training objectives of the software engineering major (independent undergraduate course) in the higher education self-study exam, and is based on cultivating compound applied talents who apply information security technology to this field and industry. The content of the outline is as concise and practical as possible, which is convenient for teachers to operate and students to master.
Second, the curriculum objectives and basic requirements
Through the study and examination of this course, students can have a comprehensive understanding of information security knowledge and apply information security knowledge and technology to practice. The basic requirements of the course include:
1, to understand the basic concepts and related standards of computer security;
2, master the basic structure of computer virus and the basic methods of prevention and control;
3. Understand the basic concepts of cryptography, encryption and analysis methods of classical cryptography, Shannon cryptography theory and basic concepts of sequence cryptography;
4. Master modern encryption methods, including DES, Rijndael, RSA and other algorithms;
5. Master the application of cryptographic technology in information security;
6. Master network security technology, network system security strategy and design, network operating system security, database security, virtual private network security and firewall technology;
7. Understand the security threats and prevention technologies faced by the network and the security of e-commerce.
Third, the relationship with other courses in this major
Information security involves multidisciplinary knowledge. Before studying this course, you should first learn the computer network technology of this major, and have some knowledge of computer operating system and advanced mathematics.
The second part of the evaluation content and objectives
chapter one
foreword
First, the purpose and requirements of learning
Through the study of this chapter, we can understand the basic concepts of information security and the standards of network information security, and initially understand the importance and research content of information security.
Second, the assessment of knowledge and objectives
(A) the basic concept of information security (key)
Remember: the basic concept of information security, threats to information security, characteristics and protection technologies of network information security, and network information security and confidentiality.
(B) Network information security (key)
Remember: network information security framework, network information security mechanism and security standards.
Chapter II Overview of Computer Virus
First, the purpose and requirements of learning
Through the study of this chapter, I have an understanding of the concept, characteristics and anti-virus technology of computer virus, and mastered the detection and prevention methods of computer virus.
Second, the assessment of knowledge and objectives
(A) the occurrence and development of computer viruses (overview)
The origin and development history of computer virus.
(B) the causes of computer viruses (secondary focus)
Memory: the causes of computer viruses, typical viruses and their characteristics, and the basic techniques for preventing and treating viruses.
(3) Detection and removal of computer viruses (key)
Types and methods of computer virus detection.
Application: computer virus removal method.
Chapter III Introduction to Cryptography
First, the purpose and requirements of learning
Through the study of this chapter, we can master the basic concepts of information encryption and the encryption methods and analysis methods of traditional cryptography, and understand Shannon cryptography theory and the basic concepts of sequence cipher, Hill cipher and one-time encryption scheme.
Second, the assessment of knowledge and objectives
(A) the basic concept of information encryption (key)
Memory: the basic concept of information encryption.
(2) Traditional cryptography (key)
Memorization: the concepts of single table substitution password, multi-table substitution password, multi-letter substitution password and one-time encryption scheme.
Application: encryption methods and analysis methods of single table substitution password, multi-table substitution password and multi-letter substitution password.
(3) Shannon theory (general)
Memory: the definitions and related theorems of information quantity and entropy, and improve the concepts of secrecy and actual secrecy.
(4) serial password (universal)
Memory: the concept and classification of sequence cipher, the concept of key stream.
(5) Affine password (key)
Remembering: Hill cipher concept, addition cipher, multiplication cipher, affine cipher.
Understood: Hill cryptosystem.
Application: Hill encryption and decryption.
The fourth chapter encryption algorithm
First, the purpose and requirements of learning
Through the study of this chapter, we can understand symmetric encryption algorithm and public key encryption algorithm, data encryption standard DES algorithm and Rijndael algorithm, as well as RSA and other encryption algorithms.
Second, the assessment of knowledge and objectives
(1) block cipher (secondary key)
Memory: the concept and design principle of block cipher, the common functions in block cipher and the design of S-box.
Understand: How block ciphers work.
(2) DES and Rijndael algorithm (emphasis)
Memorization: the characteristics of DES, Rijndael and other algorithms.
Understanding: DES algorithm and Rijndael algorithm encryption and decryption.
(c) Password attack method (secondary emphasis)
Memory: the concept of password attack.
Understanding: cryptographic attack forms, statistical analysis and decoding methods, and known plaintext attack decoding methods.
(d) Two-key cryptosystem (emphasis)
Memory: the basic concept and characteristics of double-key cryptosystem, and the background of public key cryptography.
Understanding: RSA cryptosystem and EIGamal cryptosystem.
Chapter V Password Application
First, the purpose and requirements of learning
Through the study of this chapter, we can understand the application of cryptography in information security, master the concepts of cryptography and security protocols, digital signature and identity authentication methods, as well as the related concepts and applications of CA and public key cryptography.
Second, the assessment of knowledge and objectives
(a) Digital signature system (key)
Remember: the concept of RSA signature, several special digital signatures, conventional cryptographic security protocols and advanced secure cryptographic protocols.
Understanding: RSA signature system and digital signature standard, undeniable digital signature scheme.
(2) Hash function (universal)
Memories: the concept of birthday attack.
Understanding: MD and SHA algorithms.
(3) Identification protocol (key)
The concept and function of identity recognition.
Understanding: schnonr authentication scheme and information hiding technology.
(D) CA and digital certificate (key)
Remember: the basic concept of CA, the process of applying for and revoking certificates.
(5) Public key infrastructure (secondary focus)
Memorization: the type and content of certificate, the relationship between CA, certificate subject and certificate user, the concepts of strong identity authentication and undeniable, and the concept and content of X.509 certificate system.
Chapter VI Computer Network System Integration Security Technology
First, the purpose and requirements of learning
Through the study of this chapter, we can master the network security strategy and design, firewall and intrusion detection technology, and understand the network operating system security and database security.
Second, the assessment of knowledge and objectives
(A) network system security strategy and design (key)
Network security system and security design.
Understanding: network system entity security and network security measures, PPDR- a model.
(B) Network operating system security (key)
Memory: security issues and access control of network operating system, design and implementation of secure operating system, database security protection, PKI technology content.
Understand: Windows
NT security, UNIX security, Linux security, VPN security technology, PKI engineering.
(3) Firewall technology (key)
Memorize: hacker attack characteristics and prevention technology, the concept and function of firewall, the limitations of firewall, network testing tools.
Understand: the architecture and combination form of firewall, and several main firewall technologies.
Intrusion detection (key)
Remember: the concept of intrusion detection and the classification of intrusion detection systems.
Application: process and technology of intrusion detection, selection and evaluation of intrusion detection system.
(5) Network security protection (key)
Application: multilevel network security protection and network security strategy.
Chapter VII Network Communication Security Technology
First, the purpose and requirements of learning
Through the study of this chapter, we can understand the types of network communication security technology, the requirements and types of security communication technology, the security measures of network communication encryption, network communication access and access control, e-mail security, IP security and Web security.
Second, the assessment of knowledge and objectives
(A) network communication security technology (secondary focus)
Reporter: Basic requirements of secure communication, information flow control of network communication and communication security technology.
(b) Cybersecurity (secondary focus)
Basic problems of network security.
Understand: SSL security technology, HTTP/SHTTP security.
(3) Security measures for network communication encryption (second-level key)
Remember: the concepts of encryption key distribution management, link encryption and end-to-end encryption.
Understand the principles and characteristics of network communication encryption form, link encryption and end-to-end encryption.
(d) Network communication access and access control (secondary focus)
Memory: communication access security mechanism and access security control.
Email Security (General)
Memory: PGP encryption scheme, PGP public key management.
(6) E-commerce security (secondary focus)
Remember: e-commerce security issues, typical electronic transaction protocols.
Understand: electronic payment system and SET security technology, e-commerce security strategy.
(vii) Intellectual property security (secondary focus)
Memory: the main content of intellectual property security
Understand: IP security technology
The third part is the explanation and implementation requirements.
First, the expression of the ability level of the evaluation target
The assessment objectives of this course are divided into three levels: memory, understanding and application. The relationship among them is progressive, and the latter must be based on the former. Its specific meaning is:
Memorization: it is a low-level requirement to know the meaning of related nouns, concepts and knowledge, and to understand and express them correctly.
Understanding: On the basis of memorizing, it is a higher level requirement to be able to fully grasp the basic concepts, principles and methods, and to master the differences and connections between related concepts, principles and methods.
Application: On the basis of understanding, it is the highest requirement to be able to analyze and solve related theoretical and practical problems by using basic concepts, basic principles and basic methods in combination with some knowledge points learned.
Second, teaching materials.
Network and information security course
Lin Bogang, Machinery Industry Press, July 2004, 1 version.
Third, the guidance of self-study methods.
1. Before reading a certain chapter of the specified textbook, read the knowledge points about the chapter, the requirements for the knowledge points' ability level and the assessment objectives in the outline, so as to be aware of it, focus on it, and be targeted when reading the textbook.
2. On the basis of understanding the contents of the examination syllabus, according to the examination knowledge points and requirements, when reading the textbook, we should carefully read paragraph by paragraph, scrutinize sentence by sentence, concentrate on thoroughly understanding every knowledge point, deeply understand the basic concepts, thoroughly understand the basic theories and methods, and form a complete knowledge system in our minds.
3. In the process of self-study, we should not only think about the problem, but also take reading notes and sort out the basic concepts, principles and methods in the textbook, which can deepen our understanding, understanding and memory of the problem, help highlight the key points, cover all the contents and continuously improve our self-study ability. At the same time, when learning each chapter by yourself, you can remember it on the basis of understanding, not by rote.
4. Completing homework and appropriate tutoring exercises after reading is an important link to understand, digest and consolidate what you have learned, and to cultivate and analyze problems, solve problems and improve your ability. Read the textbook carefully before doing the problem, master the content of the textbook according to the different levels required by the assessment objectives, review and exert what you have learned in the practice process, pay attention to integrating theory with practice, analyze specific problems, pay attention to cultivating logic when solving problems, discuss or deduce relevant knowledge points at different levels (steps), and clarify the logical relationship between levels (steps).
Fourth, the requirements for social assistance.
1, you should be familiar with the general requirements of the exam outline for the course and the knowledge points of each chapter.
2. We should grasp the required ability level of each knowledge point and deeply understand the assessment objectives of each knowledge point.
3. Counseling should be based on the examination syllabus and designated teaching materials. Don't add or delete content at will, so as not to be out of touch with the syllabus.
4, counseling, learning methods should be guided. Advocate the method of "reading textbooks carefully, studying textbooks assiduously, actively seeking help and self-learning".
5, counseling, we should pay attention to highlight the key points, the questions raised by candidates, do not ask and answer, we should actively inspire and guide.
6. Pay attention to the cultivation of candidates' ability, especially the cultivation of self-study ability, guide students to learn autonomous learning step by step, and be good at asking questions, analyzing problems and solving problems in the process of self-study.
7. Let candidates understand that the difficulty and ability level of the test questions are not the same thing. Each ability level has different difficulty questions.
8. Teaching hours: this course has ***4 credits. It is suggested that the total teaching hours be 72 hours, and the distribution of teaching hours is as follows:
return
time
inside
allow
study
time
chapter one
foreword
2
chapter two
Overview of computer virus
eight
chapter three
Introduction to cryptography
12
chapter four
encryption algorithm
12
chapter five
Cryptographic application
12
Chapter vi
Computer network system integrated security technology
12
Chapter VII
Network communication security technology
14
Total hours
Seventy two
Five, some provisions on the examination proposition
1. The contents and assessment objectives mentioned in each chapter of this outline are all examination contents. The test questions cover chapters and highlight key points appropriately.
2. The proportion of questions with different ability levels in the test paper is roughly: "memory" is 10%, "understanding" is 30%, and "application" is 60%.
3. The difficulty of the test questions should be reasonable: the ratio of easy, easy, difficult and difficult is 2: 3: 3: 2.
4. In each test paper, the proportion of various assessment scores is probably: key points account for 65%, sub-key points account for 25%, and general points account for 10%.
5. The basic questions used in the proposition of this course include noun explanation, multiple-choice questions, fill-in-the-blank questions, short-answer questions, application questions, calculation questions, etc.
6. The examination adopts a closed-book written test, and the examination time is 150 minutes. Score 100%, 60 points are qualified.
VI. Examples of problems
(1) Fill in the blanks
Computer virus consists of startup module, infection module and propagation module.
Modular composition.
(2) Multiple choice questions
Differential cryptanalysis is based on
Attack the method of optimizing block cipher.
First, known ciphertext attacks
B, known plaintext attacks
C, choose plaintext attack
D. selecting ciphertext attack
(3) Definition of nouns
Super killing
ARP deception
(4) Short answer questions
1, explain the implementation method of double signature?
2. Explain the main objectives of the SET protocol?
(5) Calculation problems
The known public key is e=5, n=35, and the ciphertext is c= 10.
(6) Application problems
Write the process of using SET protocol to realize user authentication of both parties.
Tianjin Higher Education Self-study Examination Curriculum Outline
Course Name: Information Security
Course code: 7 172