The Security Technologies of Network and Information

发布者:黄允凯发布时间:2015-12-28浏览次数:47

Course Name

Chinese

网络与信息安全技术

English

The   Security Technologies of Network and Information

Course Number


Type of Degree

Ph. D


Master

Total Credit Hours

36

In Class Credit Hours

30

Credit

 2

Practice


Computer-using Hours


Course Type

  


Public Fundamental      Major Fundamental      Major Compulsory       Major Elective


School (Department)

School of   Electrical Engineering

Term

Autumn

Examination

  


A.PaperOpen-book     Closed-book  B.Oral  


C.Paper-oral   Combination                       D.√ OthersLarge-scale homework

Chief

Lecturer

Name

Xie jihua

Professional Title

Associate Professor

E-mail


Website


Teaching Language used in Course

Chinese

Teaching Material Website


Applicable Range of Discipline

Electrical Engineering

Name of First-Class Discipline

Electrical Engineering

Number of Experiment


Preliminary Courses

The Principle of Computer NetworkC Language Programming

Teaching Books

Textbook Title

Author

Publisher

Year of Publication

Edition Number

Main Textbook

The   Security Technologies of Network and Information

Zhu shangming

East China University of Science & Technology Press   

2009.1.

1

Main   Reference Books

The Security of Computer Network

Liu yunming

Qinghua University Press

2006

1

The principlealgorithm & protocol of Network security 

Man Young Rhee

Qinghua University   Press

2007

1





















I.Course Introduction (including teaching goals and requirements) within 300 words:

The course is mainly about the security function of network system and the security protection technology of network and information, which including data encryption, network entity security, the security of network operating system, firewall and VPN, inbreak inspecting and defense, database and data security and otherwise.

According to the course, students could get the systematic understanding of computer network and information security, command the applied principle of network and information security, practical skills of network security function and information security protection.


II.Teaching Syllabus (including the content of chapters and sections. A sheet can be attached):

The course has nine chapters, with two main parts of classroom teaching and broad work .The teaching content and demand are as follows:

1. The overview of computer network and network security

 Introduce the basic concept of computer network, network architecture, network security model and network security evaluation criteria.

2. Data encryption and authentication

 Introduce several password system of Data encryption, highlight related technologies of PKI system.

3. The Security of network

 Introduce interrelated moving security environment of Physical layer, including Temperature, humidity, electromagnetic radiation, grounding, lightning protection, fire protection, backup and so on.

4. The system security of network operating

 Introduce the operating system, which is general about Windows, Unix and Linux, lead into the basic concept of Trusted Computer.

5. The security of Internet

 Introduce IPSec , the security of Web and email.

6. The inspecting and defense of computer viruses

 Introduce the development and defense of computer viruses.

7. Firewall and Virtual Private Network

 Introduce commonly technology of firewall and VPN.

8. Inbreak inspecting and defense

 Introduce commonly intrusions and defense methods

9. Database and data security

 Introduce the security model, encryption technology of database , and other security questions.

III.Teaching Schedule:

Week

Course   Content

Teaching   Method

1

The overview of   computer network and network security

Lectures

2

Data encryption and authentication

Lectures

3

The Security of   network

Lectures

4

The system   security of network operating

Lectures

5

The security of   Internet

Lectures

6

The inspecting and   defense of computer viruses

Lectures

7

Firewall and virtual   Private network

Lectures

8

In break inspecting   and defense

Lectures

9

Database and data   security

Lectures

10