网络信息安全教学大纲(双语).doc
《网络信息安全教学大纲(双语).doc》由会员分享,可在线阅读,更多相关《网络信息安全教学大纲(双语).doc(46页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Four short words sum up what has lifted most successful individuals above the crowd: a little bit more.-author-date网络信息安全教学大纲(双语)网络信息安全教学大纲(双语)课程编号:3001430400信息安全课 程 教 学 大 纲吉 林 财 经 大 学二五 年 八 月信息安全课程教学大纲(双语课)一、课程基本信息1课程编号:30014304002英文名称:Information Security3课程模块:专业限选课4课程学时:总计 54 学时,其中,实验(践)10 学时5学 分
2、:36先(预)修课程:计算机网络7适用专业:计算机科学与技术8修订时间:2015.8二、课程简介This course usually can be divided into three parts. First part: EncryptionThis part introduces Classical encryption techniques and public-key encryption, such as RSA, DES, PGP, digital signatures and authentication protocols.Second part: Viruses and I
3、ntruders This part introduces Computer “Viruses” and related Other “Malicious Programs”, and introduces some attack techniques of network security in detail. There are five steps of concealing IP address, scanning object computer, acquiring administrators authority, planting back door, and clearing
4、invade trace.Third part: Network Security ApplicationsThis part introduces Security Concerns, Kerberos and X.509 Authentication Service, at the same time, this part explains the defense technique of network safety, the safety project of Firewalls, IDS, and so on.三、课程教学目标Upon successful completion of
5、 this course, undergraduates should be able to: explain various insecurity factors in the network; understand some methods and technologies for network attacks; be able to solve some ordinary problems on network security independently; be able to establish an appropriate safe strategy for protecting
6、 network security.四、教学内容与要求The course will include the following:First part: EncryptionChapter 1 Introduction【教学目的与要求】Upon successful completion of this chapter, undergraduates should be able to: remember Computer Security Concepts; master Security Attacks; master Security Services.【教学重点】1. Computer
7、 Security Concepts【教学难点】1. Security Attacks2. Security Services1.1 Computer Security Concepts1. A Definition of Computer Security Examples2. The Challenges of Computer Security3. The OSI Security Architecture1.2 Security Attacks1. Passive Attacks2. Active Attacks1.3 Security Services1. Authenticatio
8、n2. Access Control3. Data Confidentiality4. Data Integrity5. Nonrepudiation6. Availability Service1.4 Security Mechanisms1.5 A Model for Network SecurityChapter 2 Symmetric Encryption Message Confidentiality 【教学目的与要求】Upon successful completion of this chapter, undergraduates should be able to : reme
9、mber Conventional Encryption Principles ; master Cipher Block Modes of Operation; understand Conventional Encryption Algorithms; understand Key Distribution Mechanism 【教学重点】1. Conventional Encryption Principles2. Conventional Encryption Algorithms【教学难点】1.Cipher Block Modes of Operation2. Location of
10、 Encryption Devices3. Key Distribution Mechanism.2.1 Symmetric Encryption Principles1. Cryptography2. Cryptanalysis3. Feistel Cipher Structure2.2 Symmetric Block Encryption Algorithms1. Data Encryption Standard2. Triple DES3. Advanced Encryption Standard2.3 Random and Pseudorandom Numbers1. The Use
11、of Random Numbers2. TRNGs, PRNGs, and PRFs2.4 Stream Ciphers and RC41. Stream Cipher Structure2. The RC4 Algorithm2.5 Cipher Block Modes of Operation1. Electronic Codebook Mode2. Cipher Block Chaining Mode3. Cipher Feedback Mode4. Counter ModeChapter 3 Public-Key Cryptography and Message Authenticat
12、ion 【教学目的与要求】Upon successful completion of this chapter, undergraduates should be able to: understand Approaches to Message Authentication; master Secure Hash Functions; understand Public-Key Cryptography Principles master Public-Key Cryptography Algorithms master Digital Signatures master Key Manag
13、ement. 【教学重点】1. Approaches to Message Authentication2. Secure Hash Functions;【教学难点】1.Public-Key Cryptography Principles2. Public-Key Cryptography Algorithms3. Digital Signatures4. Key Management.3.1 Approaches to Message Authentication1. Authentication Using Conventional Encryption2. Message Authent
14、ication without Message Encryption3.2 Secure Hash Functions1. Hash Function Requirements2. Security of Hash Functions3. Simple Hash FunctionsThe SHA Secure Hash Function3.3 Message Authentication Codes1. HMAC2. MACs Based on Block Ciphers3.4 Public-Key Cryptography Principles1. Public-Key Encryption
15、 Structure2. Applications for Public-Key Cryptosystems3. Requirements for Public-Key Cryptography3.5 Public-Key Cryptography Algorithms1. The RSA Public-Key Encryption Algorithm2. Diffie-Hellman Key Exchange3. Other Public-Key Cryptography Algorithms3.6 Digital Signatures Chapter 4 Key Distribution
16、and User Authentication 【教学目的与要求】Upon successful completion of this chapter, undergraduates should be able to: understand Kerberos; understand X.509 Authentication Service【教学重点】1. X.509 Authentication Service.【教学难点】1.Kerberos;4.1 Symmetric Key Distribution Using Symmetric Encryption4.2 Kerberos1. Ke
17、rberos Version 42. Kerberos Version 54.3 Key Distribution Using Asymmetric Encryption1. Public-Key Certificates2. Public-Key Distribution of Secret Keys4.4 X.509 Certificates1. Certificates2. X.509 Version 3Second part: Viruses and IntrudersChapter 5 The Computer “Viruses” and related Other “Malicio
18、us Programs”【教学目的与要求】Upon successful completion of this chapter, undergraduates should be able to: remember Computer “Viruses” definitions remember Computer “Viruses” definitions Phases understand Computer “Viruses” Structure understand Antivirus Approaches understand Advanced Antivirus Techniques u
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络 信息 安全 教学大纲 双语
限制150内