网络信息安全教学大纲(双语)(共11页).doc
《网络信息安全教学大纲(双语)(共11页).doc》由会员分享,可在线阅读,更多相关《网络信息安全教学大纲(双语)(共11页).doc(11页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、精选优质文档-倾情为你奉上课程编号:信息安全课 程 教 学 大 纲吉 林 财 经 大 学二五 年 八 月信息安全课程教学大纲(双语课)一、课程基本信息1课程编号:2英文名称:Information Security3课程模块:专业限选课4课程学时:总计 54 学时,其中,实验(践)10 学时5学 分:36先(预)修课程:计算机网络7适用专业:计算机科学与技术8修订时间:2015.8二、课程简介This course usually can be divided into three parts. First part: EncryptionThis part introduces Classi
2、cal encryption techniques and public-key encryption, such as RSA, DES, PGP, digital signatures and authentication protocols.Second part: Viruses and Intruders This part introduces Computer “Viruses” and related Other “Malicious Programs”, and introduces some attack techniques of network security in
3、detail. There are five steps of concealing IP address, scanning object computer, acquiring administrators authority, planting back door, and clearing invade trace.Third part: Network Security ApplicationsThis part introduces Security Concerns, Kerberos and X.509 Authentication Service, at the same t
4、ime, this part explains the defense technique of network safety, the safety project of Firewalls, IDS, and so on.三、课程教学目标Upon successful completion of this course, undergraduates should be able to: explain various insecurity factors in the network; understand some methods and technologies for networ
5、k attacks; be able to solve some ordinary problems on network security independently; be able to establish an appropriate safe strategy for protecting network security.四、教学内容与要求The course will include the following:First part: EncryptionChapter 1 Introduction【教学目的与要求】Upon successful completion of th
6、is chapter, undergraduates should be able to: remember Computer Security Concepts; master Security Attacks; master Security Services.【教学重点】1. Computer Security Concepts【教学难点】1. Security Attacks2. Security Services1.1 Computer Security Concepts1. A Definition of Computer Security Examples2. The Chall
7、enges of Computer Security3. The OSI Security Architecture1.2 Security Attacks1. Passive Attacks2. Active Attacks1.3 Security Services1. Authentication2. Access Control3. Data Confidentiality4. Data Integrity5. Nonrepudiation6. Availability Service1.4 Security Mechanisms1.5 A Model for Network Secur
8、ityChapter 2 Symmetric Encryption Message Confidentiality 【教学目的与要求】Upon successful completion of this chapter, undergraduates should be able to : remember Conventional Encryption Principles ; master Cipher Block Modes of Operation; understand Conventional Encryption Algorithms; understand Key Distri
9、bution Mechanism 【教学重点】1. Conventional Encryption Principles2. Conventional Encryption Algorithms【教学难点】1.Cipher Block Modes of Operation2. Location of Encryption Devices3. Key Distribution Mechanism.2.1 Symmetric Encryption Principles1. Cryptography2. Cryptanalysis3. Feistel Cipher Structure2.2 Symm
10、etric Block Encryption Algorithms1. Data Encryption Standard2. Triple DES3. Advanced Encryption Standard2.3 Random and Pseudorandom Numbers1. The Use of Random Numbers2. TRNGs, PRNGs, and PRFs2.4 Stream Ciphers and RC41. Stream Cipher Structure2. The RC4 Algorithm2.5 Cipher Block Modes of Operation1
11、. Electronic Codebook Mode2. Cipher Block Chaining Mode3. Cipher Feedback Mode4. Counter ModeChapter 3 Public-Key Cryptography and Message Authentication 【教学目的与要求】Upon successful completion of this chapter, undergraduates should be able to: understand Approaches to Message Authentication; master Sec
12、ure Hash Functions; understand Public-Key Cryptography Principles master Public-Key Cryptography Algorithms master Digital Signatures master Key Management. 【教学重点】1. Approaches to Message Authentication2. Secure Hash Functions;【教学难点】1.Public-Key Cryptography Principles2. Public-Key Cryptography Algo
13、rithms3. Digital Signatures4. Key Management.3.1 Approaches to Message Authentication1. Authentication Using Conventional Encryption2. Message Authentication without Message Encryption3.2 Secure Hash Functions1. Hash Function Requirements2. Security of Hash Functions3. Simple Hash FunctionsThe SHA S
14、ecure Hash Function3.3 Message Authentication Codes1. HMAC2. MACs Based on Block Ciphers3.4 Public-Key Cryptography Principles1. Public-Key Encryption Structure2. Applications for Public-Key Cryptosystems3. Requirements for Public-Key Cryptography3.5 Public-Key Cryptography Algorithms1. The RSA Publ
15、ic-Key Encryption Algorithm2. Diffie-Hellman Key Exchange3. Other Public-Key Cryptography Algorithms3.6 Digital Signatures Chapter 4 Key Distribution and User Authentication 【教学目的与要求】Upon successful completion of this chapter, undergraduates should be able to: understand Kerberos; understand X.509 A
16、uthentication Service【教学重点】1. X.509 Authentication Service.【教学难点】1.Kerberos;4.1 Symmetric Key Distribution Using Symmetric Encryption4.2 Kerberos1. Kerberos Version 42. Kerberos Version 54.3 Key Distribution Using Asymmetric Encryption1. Public-Key Certificates2. Public-Key Distribution of Secret Ke
17、ys4.4 X.509 Certificates1. Certificates2. X.509 Version 3Second part: Viruses and IntrudersChapter 5 The Computer “Viruses” and related Other “Malicious Programs”【教学目的与要求】Upon successful completion of this chapter, undergraduates should be able to: remember Computer “Viruses” definitions remember Co
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络 信息 安全 教学大纲 双语 11
限制150内