Computer information management graduation thesis: a preliminary study on computer information security management
Abstract: Nowadays, computers have become a part of people's daily life, and computer information security issues are always affecting people's nerves. This paper mainly discusses computer information security management in a comprehensive and detailed way, with a view to contributing to the development of network information security in China.
[Keywords:] computer; Information security; operate
Since 2 1 century, computer information technology has been closely linked with people's daily life, work and study. However, with the deepening of network technology in various fields, the threat of computer information security to our daily life and work is growing. The so-called computer information security is actually the management technical measures taken against the Internet, and the data security in the network environment is effectively guaranteed through corresponding measures.
1 computer information security issues
1. 1 Uncertainty of computer information itself. With the development of the Internet, we have entered the era of self-media. Everyone is a communicator and a receiver. Through the Internet, people send personal, collective or unit information to other netizens for reading. But the information dissemination on the Internet is anonymous, and the disseminator can spread any information on the Internet. Due to the uneven quality of netizens, there will be some false information or information with unknown content to confuse the audience. In addition, with the popularity of people using computers to store personal information, many criminals steal private information through unreasonable channels, which seriously infringes on citizens' privacy rights and brings huge losses to citizens' personal and property safety.
1.2 The design of security software is lagging behind. The appearance of computer provides a convenient way for all kinds of work and greatly improves the work efficiency. At the same time, with the combination of computer and network technology, the boundary between time and space has been broken, and people can almost know the news trends around the world by using computers, right? One machine in hand, knowing what's going on in the world? . However, in this process, computer systems are always infected by viruses or hacked from time to time, which has caused great losses to computer users. Moreover, the related anti-virus software always appears after the problem appears, which has a serious lag. In addition, in the process of using some normal software, due to unreasonable design or incomplete maintenance, once a large number of accesses occur, the machine will be paralyzed and bring inconvenience to users.
1.3 The computer hardware configuration is insufficient. With the development of science and technology, computers are getting smaller and smaller, and they have changed from desktop computers to notebooks. Judging from the current development trend, laptops, palmtops and mobile phones will fill people's lives for a long time to come. Many smart businesses saw this business opportunity and invested in this industry one after another. In order to improve their competitive advantage, every merchant spares no effort, and the price advantage can be said to be the biggest stimulus to customers. Under the condition of ensuring a lower sales price, in order to continue to safeguard their own interests, major businesses take cost reduction as a solution, which leads to the lack of many computer information security systems. There is also the use of a large number of pirated software and systems, which leads to the instability of computer information security protection, and it is easy to disclose users' information when there are a large number of loopholes in the system.
1.4 weak network system management. The start of computer application in China lags far behind that in Europe and America. At present, the foundation is still weak, and the management system of information security is not perfect, which is also a problem that is often exposed in the information security of computer networks in China. Safety accident? The main reason. The staff of the network management center themselves did not strictly filter the security of the network system during the execution of their work. Some staff deliberately leaked safety information for illegal purposes. This is mainly because under the gray industrial chain, there have always been interests, and some staff members can't stand the temptation of interests and sell important information such as computer information systems and databases to others privately, which directly leads to the emergence of network security problems.
2 computer information security management measures
2. 1 Improve computer information security awareness
Although computer technology has made great progress in China, there are still obvious deficiencies in the awareness of computer information security protection in both individuals and units. Under this disadvantage, information leakage occurs from time to time, ranging from the disclosure of some basic information such as personal name to the disclosure of important information such as account password and ID number, which has a bad influence. Therefore, it is very important to improve the safety awareness of individuals and units and increase the training of their computer information security knowledge. In addition, computer users can also fill in personal information as little as possible when using the computer to surf the Internet, even if they fill in it on an official website with certain credibility and authority; When using other people's computers in public places such as Internet cafes, you should delete the personal information left behind in time.
2.2 improve the relevant personnel training system
Establish and improve the network security personnel training system which focuses on higher education, supplemented by secondary vocational education and certification training of various disciplines. Higher vocational colleges should set up network security specialty according to social needs. Colleges and universities that do not have the conditions for the time being can selectively offer courses on network security, take courses on network security basics and firewalls, operating system security, data encryption, PKI technology, hold special lectures on network security, combine training and certification mechanisms, and introduce network security professional qualification certification (such as NCSE, CISP, CIW) to cultivate practical talents and make due contributions to China's network system security construction.
2.3 Using network technology to ensure information security
Firewall is the main barrier to prevent network hackers from illegally entering the organization network. It uses the edge of the internal network to isolate computers, other external networks and internal networks from each other, so as to prevent the illegal activities of hackers to the greatest extent. One of the main measures to prevent and protect the security of computer network system is access control, which mainly controls the network resources from being accessed by hackers. At present, the access control policies supported by technical conditions are mainly based on rules and roles. There are many access control strategies based on rule control, such as setting firewall, password authentication, identity authentication and certificate access control. Role-based is mainly aimed at some local area networks, mainly to control the role behavior, which is the most practical and safest. Other control measures include network server security control, attribute security control, directory-level security control, network port node security control and so on.
2.4 Further improve data confidentiality and data backup.
There must be a special person responsible for data backup, and additional inspections should be carried out to ensure the correct backup and archiving of data? . Check the original data regularly (weekly) to prevent the errors of the original data from spreading to the backup data. ? Record every backup by electronic document. ? Test the data backup and recovery scheme regularly (at least once a year) to ensure that the data can be recovered within a predetermined time, and improve the backup scheme according to the test results. Ensure reliable and correct access to data that may need to be backed up. Such as database, business data, etc. Verify and ensure that the process of obtaining backup data is reliable and the backup program is configured correctly. Backup drives (such as tape drives) should also be maintained regularly (monthly). Backup media should be checked regularly (weekly) and replaced regularly. Ensure that the reserve personnel are trained and have sufficient skills. When the backup staff is temporarily unable to work, someone else should be able to complete the backup work.
2.5 Strengthen the construction of information security system
20 12 the Ministry of industry and information technology issued "internet industry? Twelfth Five-Year Plan? Development planning and communication industry? Twelfth Five-Year Plan? Development plan ",put forward the strategic measures to vigorously promote the national economy and social informatization, at the same time, strengthen the construction of information network security system. Adhere to active defense and comprehensive prevention. Improve the information security protection capability in an all-round way, focus on ensuring the security of information networks and important information systems, and create a safe and healthy network environment. Guarantee and promote the development of informatization, protect the public and safeguard national security. Based on the national conditions, based on their own, both management and technology, overall planning, highlighting the key points. Finally, give full play to the enthusiasm of all walks of life and jointly build a national information security system.
3 Conclusion
In the era of rapid development of science and technology, computers have influenced people's life, work and study by virtue of their own advantages. If the computer network information security management is improper, it will lead to data loss, leakage and other problems, then the consequences are unimaginable. Therefore, in addition to the need for relevant departments to establish protective measures and constantly improve computer network information security management, the masses should also consciously establish a sense of self-protection of computer information security to avoid serious losses.
refer to
Li Hongfei. Research on Strategies to Improve Computer Information Security [J]. Southern Information and Computer (Theoretical Edition), 20 12(3).
[2] Travel. Research on Computer Information Security Management [J]. Scientific and Technological Innovation and Application, 20 13(3).
[3] Nan, on computer network security risk analysis and preventive measures [J] Computer knowledge and technology, 20 1 1, 29.
[4] Wei Jianbing, Computer Network Security and Prevention Research and Discussion [J] Silicon Valley, 20 1 1 No.22.
The second graduation thesis of computer information management major: on the teaching of computer information management in primary schools
To explore the teaching of computer information management course in primary schools, we must first correctly understand the significance of this course, adopt appropriate teaching methods, implement effective pre-class preparation, in-class strategies and extended teaching steps after class, pay attention to the training of basic operations, pay attention to students' cognitive rules, introduce games into teaching, and pay attention to the cultivation of quality and ability, which are the key links to cultivate all-round development of primary school students.
Keywords: cognitive law of primary school computer information management teaching
1. Re-understanding of the significance of computer information management teaching in primary schools
With the rapid development of modern society, information management technology has penetrated into all fields of society, and computers have become the basic ability that everyone must master, and primary school students are no exception. Proposed by the Ministry of Education? It will take five to ten years for information technology education to be basically popularized and fully implemented in primary schools across the country? School to school? Project, promote the modernization of education by informationization, and strive to realize the leap-forward development of basic education? .
The teaching of computer information management in primary schools is only the popularization of basic knowledge. Its purpose is to let children master the basic knowledge of computer software and hardware, such as computer usage, hardware structure and operating software system, and learn the most basic operating procedures through vivid multimedia teaching methods in a relaxed and happy learning atmosphere. At the same time, as an extension of quality education, it is necessary to cultivate primary school students' interest and awareness in learning computers, let them master some basic application technologies that will benefit them for life, develop their brain intelligence in the process of learning basic computer knowledge, and coordinate and improve their hands-on operation ability.
In specific teaching, as a computer teacher, how to stimulate and protect children's interest in learning computers in a scientific and entertaining way according to the knowledge structure of primary school students and the law of children's physical and mental health development, is a problem that teachers of computer information management courses in primary schools should consider.
Second, the effective teaching methods of computer information management in primary schools
(A) Task-driven approach
Task-driven method is a very effective teaching method widely used in computer information management classroom teaching. Teaching content design in practical tasks, the teaching process becomes a teacher leading primary school students to complete practical tasks on the computer, so that children can master new knowledge in the process of completing tasks. For the use of application software, it is not simply to explain the use of menus and commands. In that case, teachers will talk and students will play, which will lead to low teaching efficiency. After adopting task-driven teaching method, the role of students can be changed from? Let me learn? Become? I want to learn? .
(2) Task decomposition method
Pupils are young and have poor self-control ability. After a long time, their attention tends to be distracted. To this end, when I choose a task, I divide the big task into many small tasks, and then decompose each small task into several knowledge points. I explain a knowledge point in a small task in each class, and then start training immediately to enhance my interest and ensure the completion of the teaching task. In addition, for some boring content, it is not suitable for arranging big tasks. The task should be divided into long-term training in each class, such as fingering training.
Third, the effective teaching process of computer information management course
(A) preparation before class
Computer teaching is not only the same as other disciplines, but also different from other disciplines, so teachers also need to prepare lessons. However, what about here? Ready? But it contains software and hardware. Preparing software means preparing textbooks, preparing teaching methods and preparing students. When compiling textbooks, we should not only master all the contents of the textbooks in primary school, but also make clear the chapters, contents, characteristics, difficulties, emphases and difficulties of the textbooks in class. To prepare teaching methods, it is necessary to find out what methods are suitable in the course of class in order to achieve good teaching results. To prepare students is to fully understand their characteristics. Is there a third party in the teaching process? Computer participation. So it is also necessary to prepare, that is, hardware. A computer works normally, which means that every student can study normally. It is very important to improve the teaching efficiency of 40 minutes, prepare the computer, make the computer work normally in the classroom and serve the students well. Finally, a large number of media courseware should be prepared, so that the prepared lessons can be carried out smoothly and achieve the goal.
(B) there are strategies in the classroom
Preparing lessons is the premise, and attending classes is the key. How to prepare lessons well, efficiently and effectively depends on the law. The most direct way is to stabilize the teaching order, concentrate students' attention and stimulate their interest in learning.
In teaching, in addition to human factors, computer factors can not be ignored. Teachers' teaching and students' learning must be done through computers. Computer is not only the purpose of learning, but also the tool of learning, but it is the most prone to problems. When problems arise, we must learn to control them.
(3) Extension after class
After a well-prepared computer class, you will often find more or less problems. Because there are many classes in the same grade now, in order to avoid the same problems in the next class, teachers need to constantly reflect and improve after class, so as to continuously improve the teaching plan and achieve the best teaching effect.
Four, the primary school computer information management teaching should pay attention to the key links
(A) pay attention to basic operation training
Typing practice is the most basic course for computer information management major. All information and ideas must be entered into the computer program through the keyboard. In the process of radical practice, we can combine the stroke order teaching in the literacy stage of senior one Chinese class, split the words to be taught into parts by computer coding and display them on the screen, so that students can clearly see the stroke order of Chinese characters, stimulate their interest in learning, avoid the boring and rigid situation of stroke order teaching and enliven the classroom teaching atmosphere. In the practice of typing speed, children can input their thoughts or write a composition on the computer, which can stimulate their interest in the computer and let students master the operation skills skillfully in the practice of dealing with details flexibly.
(B) Primary school computer information management teaching should respect the cognitive laws of primary school students.
Pupils' physical and mental development has not yet been finalized, and they like to be praised. Primary school computer teachers should learn to use praise language when showing students' works, such as? Your layout is too generous? 、? Your little friend is great, isn't he? 、? Your fingering is too precise? 、? Can you type quickly and accurately? Wait a minute. Students' achievements are recognized, affirmed and praised by teachers. Seeing their achievements, they can be praised by teachers and admired by other students, which will inspire them to establish self-confidence, enhance their pride and stimulate their learning motivation. This will once again set off the climax of students' learning to catch up. In addition, it will enable students to enhance their learning effect and friendship through mutual help.
(C) the introduction of games in teaching
Only when primary school students have positive feelings about things can they be interested in learning, have a positive attitude towards things and actively participate in activities, thus achieving good teaching results.
Pupils are young, have short attention time and poor self-control ability. Their learning attitude depends entirely on their personal preferences. Only when they are interested in teaching can they have the excitement of learning and devote themselves to learning with the greatest enthusiasm. On the contrary, if students are not interested in learning, their enthusiasm for learning will gradually decrease, and even they will get bored, so it is certainly impossible to achieve good educational results.
In the teaching of computer information management, teachers should pay attention to the stimulation of students' interest in learning, and pay attention to the application of game teaching method in teaching, taking this as a starting point and using games as a means to stimulate students' interest in learning. Primary school students have a soft spot for games. The introduction of games in teaching caters to the active nature of primary school students, makes education interesting, and allows students to learn knowledge through playing. The teaching effect is twice the result with half the effort.
(D) Quality and ability training is the key to teaching.
The cultivation of students' quality and ability is the key. While cultivating primary school students' hands-on operation and thinking ability, develop their quality and intelligence.
Primary school students' standardized operation of computers is of great help to early education and helps to form good behavior habits and study habits; Moreover, the requirement of accuracy in fingering practice can also cultivate students' serious, meticulous and hardworking spirit; In the operation of software learning, some students cheered for winning the first place, and some students were depressed because of backwardness. At this time, teachers can teach them the truth of winning without arrogance and losing with grace, and cultivate their good psychological quality. Therefore, in teaching, students can fully develop themselves and show themselves as long as teachers seize the opportunity to guide them.
Verb (abbreviation of verb) abstract
The teaching of computer information management in primary schools is a modern education facing the future and an important way to cultivate children's computer awareness, popularize computer science and improve scientific and cultural quality. As primary school computer teachers, we will continue to explore new ways of computer teaching in primary schools under the guiding ideology of enlightenment-oriented, skill-oriented, respecting the psychological characteristics of primary school students, combining learning with application, step by step, based on popularization and moderate improvement, so as to lay a good knowledge foundation for the all-round development of talents needed by society.
References:
[ 1]
[2] Niu Meijing. On the Effective Teaching of Computer in Primary Schools [J]. The Golden Age (Ⅱ). 20 1 1 (9).
[3] Zhao Yan. On computer teaching in primary schools [J]. Weekly.2011(1).
[4] Hu Chunhua. Computer teaching mode and skills in primary schools [J]. New curriculum: primary school (middle school) .2011(12).
Graduation thesis of computer information management major Part III: Analysis of computer network information management.
This paper aims at expounding the information management of computer network. On the basis of introducing various problems existing in computer network, this paper expounds information management strategies such as setting computer network firewall, increasing computer network access strategy and encrypting computer network transmission data, so as to ensure the information security of computer network and lay a solid foundation for the safe and stable operation of the Internet.
Keywords: computer network information management; Firewall; Increase access policy; data encryption
I. Introduction
With the continuous development of communication technology and the continuous improvement of communication line manufacturing technology, optical fiber has become the main communication line in the next generation Internet, thus forming an information-telling expressway with rapid interactive data transmission of computer networks and rapid spread of information such as sound and images. Because of the openness and openness of the Internet, the information transmitted in the computer network is mixed, so special methods or technologies are needed to manage it in a unified way, so as to manage all aspects of the whole information activity, such as information resources themselves, operators, application technologies, network structures, etc., to realize the rational allocation of various network information resources and meet the service process of computer network information required by social development.
Second, the necessity of computer network information management
Computer network is a communication network system with a certain scale and function based on communication lines and communication equipment, according to the agreed communication protocol. By using the unique computer software in the equipment, communication service functions such as resource sharing, information exchange, online service, collaborative processing and distributed computing are realized in the computer network. Computer network has both advantages and disadvantages. Only by adopting correct methods and strengthening computer information management and network information supervision can we use computer networks correctly and efficiently. At the same time, we should use laws and policies to restrain and guide the network information market, enhance citizens' awareness of network information security and strengthen the construction of network information ethics, so as to effectively improve the network information management system, improve the operation level of the network information market and ensure the effective development and utilization of network information resources. Because the computer network is inundated with more and more information, and the content is becoming more and more complex, some people publish all kinds of harmful information through the Internet for personal gain, which makes the information management of the computer network more difficult and makes the Internet face various problems. We must take necessary measures to strengthen computer network information management to solve various problems in Internet information management.
Third, the information management of computer networks.
The information management of computer network mainly manages the information transmitted by the computer network itself and the service equipment in the network to ensure the normal operation of the computer network. Generally speaking, the information management of computer network includes the basic operation information management of IP address, domain name and autonomous system number as, the configuration and operation load of servers providing information services in the network, the server management of the availability and integrity of information services, and the user information management of computer network access users' names, identities, permissions and various network information resources, including information publishing, information filtering, indexing and navigation. However, due to human negligence and the defects of technology itself, the information management system of computer network can not completely resist all kinds of potential threats in the Internet, which leads to various problems in computer network. For example, the interconnection of computer networks makes it easier for computer viruses to spread through the Internet, and the imperfect protocol of the Internet itself makes it possible for criminals to invade the Internet. This leads to the existence of security risks in the computer network or enterprise intranet, which artificially causes the unclear rules of user rights distribution in the network and causes unnecessary security loopholes in the computer network. The defects and loopholes of the operating system itself open the door for hackers to invade the computer network, and the computer network is constantly threatened by security. Therefore, we must take necessary measures to reduce the security threats of computer networks and ensure the normal, stable and safe operation of the Internet.
(A) set up a firewall
A firewall is a device that restricts information transmission and helps ensure information security. Adopting network isolation is an effective measure to protect computer networks. Through intelligent selection, it allows or prevents external networks from requesting access to the computer network, and at the same time, it cooperates with corresponding antivirus software and strategies to protect all entrances and exits in the computer network, which can not only prevent malicious attacks from external visitors, but also protect the files and data security of the computer internal network. In addition, a network intrusion detection system (IDS) can be added to the computer network, which can scan all kinds of operations in the network at any time and automatically identify destructive code streams. When found, you can record and execute operations such as alarm, blocking communication connection or corresponding security policies, so as to ensure the information security of the intranet and increase the fault tolerance rate of the Internet.
(B) increase the data encryption strategy
For the information management of computer network, it can not be ignored to prevent information from being eavesdropped, tampered and leaked on the Internet. Using data encryption to transmit data, files, transmission passwords, control information and other information in computer networks can effectively increase the difficulty for intruders to decipher the transmitted information, thus protecting the security of computer network information transmission and reducing the possibility of intruders illegally operating information. Data encryption is a kind of data processing that uses different algorithms to process the original information according to specific algorithms and key values through special technologies. After the sender and receiver agree on the encryption algorithm and key, they can encrypt the information according to the agreed encryption algorithm and key pair, and then transmit the generated encrypted information through the computer network. After receiving the broadcast data, the receiver uses a decryption algorithm to decrypt it according to the agreed key, thus obtaining the original data, thus ensuring the information security of the computer network.
(c) increased access strategy
The setting of access rights can prevent visitors from accessing some protected files and data, and firewall mechanism is one of the access policy settings. Of course, we also need to increase the access strategy of computer network and set up multi-level access rights to ensure that computer network resources are not illegally accessed and used. First, you can assign permissions to visitors to the computer network. Internal users and external users have different access rights and scopes to resources in the network. At the same time, different internal users have different access rights to different directory levels of the computer network, which ensures the security and effectiveness of files and data. In addition, through the security control of network servers, network ports and nodes and network detection control, the effectiveness and security of information transmission are increased, and the information security of computer networks is ensured.
Four. conclusion