Application Security: Systems and Design应用安全课设

应用安全课设

英文名称:
课程类型:选修
学分: 2   总学时: 60
面向对象:信息安全类本科生
先修课程:计算机网络、网络攻击与防护
考核形式: 平时成绩+考试
课程简介:

《应用安全课设》课程是面向信息安全专业开设的一门选修课程,共60学时。

网络空间安全学科是一个涉及计算机、通信、数学、物理、法律、管理等学科的交叉学科,培养能够从事计算机、通信、电子商务、电子政务、电子金融等领域的网络空间安全高级专门人才。虽然我国的信息化发展速度惊人,但随之而来的网络空间安全问题也日益突出,专业人才的缺口较大,特别是缺乏具有实际动手能力的实践型人才。

本课程以实践型教学为主要特色,面向信息安全专业高年级本科生开设。在学生掌握信息内容安全、数字取证、数据安全与隐私保护、信息隐藏等应用安全基础知识的基础上,以实践教学为抓手,通过设置60学时的课程实践环节,培养具有实际动手能力的实践型人才。为学生从事企业应用安全相关工作奠定基础。

本课程依据学生的特点,以总体结构为主线,选择网络信息获取技术、网络信息清洗与索引技术、网络信息隐藏技术、网络信息过滤技术、网络信息推荐技术、网络信息舆情分析技术作为主要内容,讨论应用安全技术相关的方法和原理。除了学习知识外,还要学习自顶向下、自底向上、递归求解、模块化等典型方法;给学生提供参与设计实现颇具规模的复杂系统的机会,培养其工程意识和能力。

推荐教材或主要参考书:

  • 赖英旭,刘思宇,杨震,刘静,叶超等(编著). 计算机病毒与防范技术(第2版). 北京:清华大学出版社,2019年12月
  • 张茹,刘建毅(编著). 数字内容安全. 北京:北京邮电大学出版社,2017年10月

Application Security: Systems and Design

Course Type: Optional course
Credit: 2            Total Credit Hours: 60
Students: Undergraduate students majoring in information security
Prerequisites: Computer network, Network attack and protection
Evaluation Method: Course participation + written exams
Course Description:

The course “Applied Security ” is an optional one of 60 class hours  for information security majors.

Cyberspace security discipline is an interdisciplinary discipline related to computer, communication, mathematics, physics, law, management and other disciplines. It is aimed at cultivating cyberspace security specialists  who  serve in such fields as computer, communication, e-commerce, e-government, and e-finance. With fast development of IT-application in China comes the increasing challenge for  cyberspace security, resulting in a great demand for network security specialists, especially those with practical skills.

The course is aimed in cultivating in learners’ practical capacity based on their’ grasp of the basic theoretical knowledge in information content security, digital forensics, data security and privacy protection, information hiding, etc. It is characterized by its strength in practice-oriented instruction over 60 class hours for undergraduates majoring in information security in their third or fourth year.

In this course, learners will explore methods and principles related to the application of security technology base on such topics as network information acquisition technology, network information cleaning and indexing technology, network information hiding technology, network information filtering technology, network information recommendation technology, and network information public opinion analysis technology. In addition, learners will also study typical methods such as top-down, bottom-up, recursive solving, and modularization. Finally learners will be provided with opportunities to participate in the design and implementation of large-scale complex systems for  cultivation of their engineering awareness and ability. All of these will pave way for learners’ effective involvement in security application in enterprises.

Recommended Textbooks/References:

  1. Lai Yingxu, Liu Shiyu, Yang Zhen, Liu Jing, Ye Chao, et al. (ed.).Computer Virus Research and Defense (second edition). Beijing: Tsinghua University Press,December 2019.
  2. Zhang Ru, Liu Jianyi (ed.). Information content security, Beijing: Beijing University of Posts and Telecommunications Press, October 2017.

网上授课平台

发表评论

电子邮件地址不会被公开。 必填项已用*标注