1.1 Factors threatening computer information security
1.2 Contents of computer information security research
1.2.1 Computer external security
1.2. 2 Computer internal security
1.2.3 Computer network security
1.3 OSI information security system
1.3.1 Security service
1.3. 2 Security mechanism
1.4 Security strategy of computer system
1.4.1 Security strategy
1.4.2 Relationship between people, system and technology
1.5 Reliability of computer systems
1.5.1 Fault avoidance and fault tolerance
1.5.2 Fault-tolerant design
1.5.3 Fault recovery strategy< /p>
Exercise 1 2.1 Overview of cryptography technology
2.2 Classical encryption method
2.2.1 Substitution cipher
2.2.2 Transposition cipher
p>
2.2.3 Symmetric encryption system
2.3 Data encryption standard DES
2.3.1DES algorithm description
2.3.2DES algorithm encryption process
p>
2.3.3DES algorithm decryption process
2.3.4 Triple DES algorithm
2.4 Advanced Encryption Standard AES
2.4.1 Mathematical basis of AES algorithm< /p>
2.4.2AES algorithm overview
2.4.3AES algorithm encryption process
2.4.4AES algorithm decryption process
2.4.5AES algorithm security
2.5 Public key system
2.6 RSA algorithm
2.6.1 Mathematical basis of RSA algorithm
2.6.2 Basis of RSA algorithm
2.6.3 RSA algorithm process
2.6.4 RSA algorithm security
2.7NTRU algorithm
2.7.1 Mathematical basis of NTRU algorithm
< p>2.7.2NTRU algorithm description2.7.3NTRU algorithm example
2.8 Comparison of symmetric encryption system and public key system
2.9 Information hiding technology
2.10 Digital Watermark
2.10.1 General Model of Digital Watermark
2.10.2 Main Characteristics of Digital Watermark
2.10.3 Classification of Digital Watermark< /p>
2.10.4 Typical digital watermark algorithm
2.10.5 Digital watermark application
2.10.6 Digital watermark attack
Exercise 2 3.1 Digital Signature Overview
3.1.1 Digital Signature Principle
3.1.2 Digital Signature Standard DSS
3.1.3 PGP Email Encryption
3.2 One-way hash function
3.2.1 Characteristics of one-way hash function
3.2.2MD5 algorithm
3.2.3SHA algorithm
3.2.4 Comparison of SHA-1 and MD5
3.3Kerberos authentication
3.3.1 What is Kerberos
3.3.2 How does Kerberos work
< p>3.4 Public key infrastructure PKI3.4.1 Digital certificate
3.4.2 Basic components of PKI
3.4.3 Performance requirements for PKI
p>3.4.4 PKI standards
3.5 User ID and password mechanism
3.5.1 User authentication ID
3.5.2 Insecure password< /p>
3.5.3 Security password
3.5.4 Password attack
3.5.5 Improvement plan
3.6 Biometric identification technology
3.6.1 Biometric identification system composition
3.6.2 Fingerprint recognition
3.6.3 Iris recognition
3.6.4 Other biometrics
Identification Technology
3.7 Smart Card
Exercise 3 4.1 Overview of Computer Viruses
4.1.1 Definition of Computer Virus
4.1.2 Computer Virus Characteristics
4.1.3 Causes of computer viruses
4.1.4 Transmission routes of computer viruses
4.1.5 Classification of computer viruses
4.1.6 Symptoms of computer viruses
4.1.7 General composition of computer virus programs
4.2 Computer virus production technology
4.3 Computer anti-virus software Production Technology
4.4 Worm Analysis
4.5 Trojan Horse
4.5.1 Hacker Program and Trojan Horse
4.5.2 Trojan Horse Basic principles
4.5.3 Trojan horse startup method
4.5.4 Trojan horse port
4.5.5 Trojan horse hiding
4.5.6 Trojan Horse Classification
4.5.7 Trojan Horse Detection
4.6 Prevention of Computer Viruses and Hackers
Exercise 4 5.1 Network Security Vulnerabilities
p>
5.2 Target detection
5.2.1 Content of target detection
5.2.2 Method of target detection
5.3 Concept and principle of scanning
p>
5.3.1 Scanner Concept
5.3.2 Common Port Scanning Technology
5.3.3 Preventing Port Scanning
5.4 Network Monitoring
p>
5.4.1 Principle of Network Monitoring
5.4.2 Detection and Prevention of Network Monitoring
5.4.3 Introduction to Sniffer
5.5 Buffering Area overflow
5.5.1 Principle of buffer overflow
5.5.2 Buffer overflow attack method
5.5.3 Preventing buffer overflow
< p>5.6 Denial of Service5.6.1 Denial of Service DDoS
5.6.2 Distributed Denial of Service DDoS
5.6.3 Steps of DDoS Attack
5.6.4 Strategies to prevent DDoS attacks
5.7 Spoofing attacks and prevention
5.7.1 IP spoofing attacks and prevention
5.7.2 IP address theft and prevention Prevention
5.7.3DNS Spoofing and Prevention
5.7.4Web Spoofing and Prevention
5.8 Network Security Service Agreement
5.8.1 Safety Set Connection layer protocol SSL
5.8.2 Transport layer security protocol TLS
5.8.3 Secure channel protocol SSH
5.8.4 Secure electronic transaction SET
5.8.5 Internet Protocol Security IPSec
5.9 Wireless Network Security
5.9.1 IEEE802.11b Security Protocol
5.9.2 IEEE802.11i Security Protocol
5.9.3 WAPI security protocol
5.9.4 Spread spectrum technology
Exercise 5 6.1 Firewall overview
6.1.1 The concept of firewall
6.1.2 Main functions of firewalls
6.1.3 Basic types of firewalls
6.2 Firewall architecture
6.2.1 Filter router structure
6.2.2 Dual-homed host structure
6.2.3 Shielded host gateway structure
6.2.4 Shielded subnet structure
< p>6.3 Firewall technology6.3.1 Packet filtering technology
6.3.2 Proxy service technology
6.3.3 Circuit layer gateway technology
< p>6.3.4 Stateful detection technology6.4 Distributed firewall
6.4.1 Traditional border firewall
6.4.2 Overview of distributed firewall
6.4.3 Distributed firewall composition
6.4.4 Distributed fire protection
How the wall works
6.5 Firewall security strategy
6.5.1 Firewall service access strategy
6.5.2 Firewall design strategy
6.6Windows XP Firewall
Purchase of 6.7 Firewall
6.8 Introduction to Personal Firewall Programming
Exercise 6 7.1 Overview of Intrusion Detection System
7.2 Intrusion General steps of detection
7.3 Classification of intrusion detection systems
7.3.1 Classification based on objects detected by the system
7.3.2 Classification based on data analysis methods
7.3.3 Classification based on architecture
7.4 Key technologies of intrusion detection systems
7.5 Introduction to intrusion detection system models
7.5.1 Distributed intrusion Detection system
7.5.2 Mobile agent-based intrusion detection system
7.5.3 Intelligent intrusion detection system
7.6 Standardization of intrusion detection system
< p>7.6.1 Intrusion Detection Working Group IDWG7.6.2 Common Intrusion Detection Framework CIDF
7.7 Intrusion Detection System Snort
7.8 Purchase of Intrusion Detection Products
Exercise 7 8.1 Overview of digital forensics
8.2 Electronic evidence
8.2.1 Concept of electronic evidence
8.2.2 Electronic evidence Features
8.2.3 Electronic evidence in common electronic devices
8.3 Digital forensic principles and processes
8.3.1 Digital forensic principles
8.3.2 Digital Forensics Process
8.4 Network Forensics Technology
8.4.1 Overview of Network Forensics
8.4.2 Network Forensics Model
8.4.3IDS forensic technology
8.4.4 Honey trap forensic technology
8.4.5 Fuzzy expert system forensic technology
8.4.6SVM forensic technology
8.4.7 Malicious code technology
8.5 Common tools for digital forensics
Exercise 8 9.1 Security of operating system
9.1.1 Security of operating system Function
9.1.2 Operating system security design
9.1.3 Operating system security configuration
9.1.4 Operating system security
< p>9.2Windows Security Mechanism9.2.1 Overview of Windows Security Mechanism
9.2.2 Active Directory Service
9.2.3 Authentication Service
9.2.4 Encrypted file system
9.2.5 Security template
9.2.6 Security account manager
9.2.7 Other aspects
< p>9.3Windows security configuration9.4UNIX security mechanism
9.5Linux security mechanism
9.5.1PAM mechanism
9.5.2 Security Audit
9.5.3 Mandatory access control
9.5.4 User and file configuration
9.5.5 Network configuration
9.5.6Linux Security module LSM
9.5.7 Encrypted file system
9.6Linux security configuration
Exercise 9 10.1 Overview of data backup
10.2 System data Backup
10.2.1 Disk Array RAID Technology
10.2.2 System Restore Card
10.2.3 Clone Master Ghost
10.2. 4 Other backup methods
10.3 User data backup
10.3.1Second Copy 2000
10.3.2File Genie 2000
10.4 Network data backup
10.4.1 Network backup system
10.4.2DAS direct connection storage
10.4.3NAS network
Network Attached Storage
10.4.4 SAN Storage Network
10.4.5 IP Storage Technology
10.4.6 Data Migration Technology
10.5 Data Recovery
10.5.1 Data Recovery Overview
10.5.2 Hard Drive Data Recovery
10.5.3EasyRecovery
10.5.4FinalData
Exercise 10 11.1 Overview of software protection technology
11.2 Static analysis technology
11.2.1 File type analysis
11.2.2W32Dasm
11.2.3 Introduction to IDA Pro
11.2.4 Executable file code editing tool
11.2.5 Executable file resource editing tool
11.3 Dynamic analysis technology< /p>
11.3.1SoftICE debugger
11.3.2OllyDbg debugger
11.4 Common software protection technology
11.4.1 Serial number protection mechanism< /p>
11.4.2 Warning (NAG) window
11.4.3 Time limit
11.4.4 Time period limit
11.4.5 Registration Protection
11.4.6 Function Limitations
11.4.7 CD Software Protection
11.4.8 Software Dog
11.4.9 Floppy Disk Protection Technology
11.4.10 Anti-tracking technology
11.4.11 Network software protection
11.4.12 Patch technology
11.5 Software Packing and unpacking
11.5.1 The concept of "shell"
11.5.2 Loading of "shell"
11.5.3 Introduction to software packing tools
p>
11.5.4 Software unpacking
11.6 Suggestions for designing software protection
Exercise 11 Experiment 1 Encryption and hiding
Experiment 2 Cracking password< /p>
Experiment 3 Network Vulnerability Scanning
Experiment 4 "Glacier" Hacking Tool
Experiment 5 Network Monitoring Tool Sniffer
Experiment 6 Personal Firewall Configuration
Experiment 7 Intrusion Detection Software Settings
Experiment 8 Windows 2000/XP/2003 Security Settings
Experiment 9 System Data Backup
Experiment 10 User data backup
Experiment 11 data recovery
Experiment 12 software static analysis
Experiment 13 resource editing tool
Experiment 14 software dynamic analysis