Current location - Education and Training Encyclopedia - University ranking - What does "information security" learn in university?
What does "information security" learn in university?
What does "information security" learn in university? Information security professional courses:

During school, students are not only emphasized to master basic knowledge, but also to cultivate their professional quality and ability. In addition to the basic courses of science and engineering, students mainly study advanced mathematics, linear algebra, calculation methods, probability theory and mathematical statistics, computers and algorithms, C++ language programming, data structures and algorithms, computer principles and combinatorial languages, database principles, operating systems, college physics, set theory and graph theory, algebra and logic, cryptography principles, coding theory and logic.

In addition to the above majors, a large number of professional elective courses are also offered, including: data communication principle, introduction to information security, computer network security management, digital identification and authentication system, network security detection and prevention technology, firewall technology, virus mechanism and protection technology, network security protocols and standards, etc. In addition to completing various experiments and course designs at different levels of the information security system, students will also receive strict training in graduation design.

Through study, you will have the following abilities:

1. firewall, the first security barrier of enterprise network;

2. Intrusion detection system can effectively resist external intrusion events and monitor illegal behaviors within the network;

3. Security assessment and analysis tools, auditing and analyzing the user environment based on security policies, and finding security risks in time;

4. Anti-virus system, eliminating virus harm, preventing virus events and realizing complete intelligence of anti-virus;

5. Server protection system to protect the data security of important servers of the enterprise;

6. Deploy and maintain enterprise information management (OA, Exchange) system and UNIX system;

7. Professional data backup and recovery system to protect the most critical data and resources of enterprise users;

8. Be able to use enterprise core routers, switches, various operating systems (Linux, Windows) and database products at all levels (SQL SERVER, Oracle) to design a secure domain environment, and formulate strict security policies and personnel security requirements according to the differences of different business needs.

What does the information security department in the university study? Many students who study network information security have opened mathematics and computer courses, and their future work cannot be separated from computers.

What do you major in information security? Freshman, right? I was also admitted to the information security major in the university. I didn't know it before, but I knew it online. Great major, love it!

Information security specialty is an interdisciplinary subject in computer, communication, physics, mathematics and other fields. To cultivate information security professionals with all-round development in morality, intelligence, physique and beauty. The graduates of this major have the systematic theory and practical application ability of information security and computer science and technology, strong English language ability, good humanistic quality and innovative spirit. The study period of this major is four years, and the students have completed all the courses specified in the teaching plan and passed the examination, and are awarded the bachelor's degree in engineering.

Main courses: foreign language, advanced mathematics, linear algebra, discrete mathematics, mathematical foundation of information security, electronic technology foundation, computer composition principle and architecture, C++ programming, data structure, operating system, combined language programming, information security, network security, operating system security, information theory and coding, computer network, interface and communication technology, PKI principle and technology, computer virus and its prevention technology, intrusion detection technology.

This major attaches importance to the cultivation of practical ability, determines the training direction according to the needs of enterprises and fields, and constantly adjusts the professional direction according to the needs of the industry, forming a flexible curriculum system and dynamic teaching plan. A large number of courses adopt original English textbooks and bilingual teaching, and offer Japanese, Korean and other second foreign languages.

Adaptation scope of graduates: graduates will mainly serve enterprises and institutions in the information industry or other national economic management departments, schools and military departments, and engage in research, design, development, teaching, industry, management and engineering technology application of various information security systems and computer security systems.

At present, the information security majors of some first-class universities such as Wuhan University are very good!

What should we learn about network security? 1. firewall (correct configuration and daily application)

2. System security (security reinforcement for servers, security reinforcement for WEB codes, establishment of various application servers, such as WEB MAIL FTP, etc. ).

3. Security audit (intrusion detection. Log tracking)

4.CCNA course (basic knowledge of network. Troubleshooting and construction of common faults in regional networks)

5. Experience accumulation.

What does chemoinformatics take? : Wen Ku. Baidu, please. /view/b0cbadaed 1f 34693 daef 3 e 2c。 This is the hope in Baidu library, which is helpful to you.

Excuse me, what is the course information retrieval in university? Haha ~ that's the point, we just finished the exam ~

We studied indexing, classification and indexing, thesaurus, classification table and so on in archival information retrieval.

We also have a course "Computer Retrieval", which teaches how to make full use of online search engines, periodical networks and other tools to accurately query the required information and improve the query efficiency ~

What is the main content of intelligent information processing? Signal and system circuit analysis automatic control principle microcomputer principle and interface Digital electrical module electricity is a basic course,

Generally speaking, it can be divided into classical artificial intelligence, computational intelligence and other intelligence theories. More importantly, artificial neural network, fuzzy logic technology and evolutionary computation in computational intelligence, search technology and Apriori algorithm in classical artificial intelligence, rough set theory and clustering analysis method in data mining are all very promising!

What does information security mainly involve? Information security mainly includes the following five aspects: the need to ensure the confidentiality, authenticity and integrity of information, unauthorized copying and the security of parasitic systems.

What does information security include? Information security mainly involves three aspects: the security of information transmission, the security of information storage and the audit of information content transmitted through the network.

distinguish

Authentication is the process of verifying the subject in the network, and there are usually three ways to verify the identity of the subject. One is secrets that only the subject knows, such as passwords and keys; Second, the items carried by the subject, such as smart cards and token cards; Third, only the subject has unique features or abilities, such as fingerprints, voices, retinas or signatures.

Password mechanism: Password is a code agreed by both parties, assuming that only users and systems know it. Passwords are sometimes selected by users and sometimes assigned by the system. Usually, the user enters some kind of logo information, such as user name and ID number, and then the system asks the user to enter a password. If the password matches the password in the user file, the user can enter the access. There are many kinds of passwords, such as one-time passwords. The system generates a one-time password list. You must use X the first time, Y the second time, Z the third time, and so on. There are also time-based passwords, that is, the correct password for access changes with time, and this change is based on time and a secret user key. So the password changes every minute, and it's harder to guess.

Smart card: Access requires not only a password, but also a physical smart card. Check whether you are allowed to touch the system before you are allowed to enter the system. A smart card is as big as a credit card and usually consists of a microprocessor, a memory and input/output devices. The microprocessor can calculate the unique number (ID) of the card and the encrypted form of other data. The ID ensures the authenticity of the card and the cardholder can access the system. In order to prevent the smart card from being lost or stolen, many systems need to use both smart card and PIN. If you only have a card and don't know the PIN code, you can't get into the system. Smart card is superior to the traditional password method for authentication, but it is inconvenient to carry and the cost of opening an account is high.

Subject feature identification: The method of personal feature identification has high security. At present, the existing equipment includes: retina scanner, voice verification equipment and hand recognizer.

Data transmission security system

The purpose of data transmission encryption technology is to encrypt the data stream in transmission to prevent eavesdropping, leakage, tampering and destruction on communication lines. According to the communication level of encryption, encryption can be realized in three different communication levels, namely link encryption (encryption below OSI network layer), node encryption and end-to-end encryption (encryption before transmission and encryption above OSI network layer).

Commonly used are link encryption and end-to-end encryption. Link encryption focuses on communication links, regardless of source and destination, and provides security protection for confidential information by using different encryption keys in each link. Link encryption is node-oriented, transparent to network high-level subjects, and encrypts high-level protocol information (address, error detection, frame header and frame tail), so data is ciphertext in transmission, but it must be decrypted at the central node to get routing information. End-to-end encryption means that information is automatically encrypted by the sender, encapsulated in TCP/IP packets, and then passed through the Internet as unreadable and unrecognizable data. Once the information reaches its destination, it will be automatically reassembled and decrypted into readable data. End-to-end encryption is oriented to advanced network subjects. It does not encrypt the information of the low-level protocols. Protocol information is transmitted in clear text, and user data does not need to be decrypted at the central node.

Data integrity authentication technology At present, for dynamically transmitted information, many protocols mostly ensure the integrity of information by receiving errors, retransmitting and discarding subsequent data packets. However, hacker attacks can change the contents of data packets, so effective measures should be taken to control the integrity.

Message authentication: Similar to CRC control in the data link layer, the message name field (or domain) is combined into a constraint value through certain operations, which is called the message integrity check vector ICV(Integrated Check Vector). Then it is encapsulated with the data for encryption. In the transmission process, because the intruder cannot decrypt the message, it is impossible to modify the data and calculate the new ICV at the same time. In this way, the receiver can decrypt and calculate the ICV after receiving the data. If it is different from the ICV in plaintext, the message is considered invalid.

Checksum: One of the simplest and easiest integrity control methods is to use checksums to calculate the checksum value of this file and compare it with the last calculated value. If they are equal, the file has not changed; If not, it means that the file may have been changed by unconscious behavior. The checksum method can check for errors, but it cannot protect data.

Encrypted checksum: divide the file into small files, calculate the CRC check value of each block, and then add these CRC values as checksum. As long as the appropriate algorithm is used, this integrity control mechanism is difficult to break. However, this mechanism has a large amount of calculation and high cost, and it is only suitable for the situation with high integrity protection.

MIC (Message Integrity Code): Use a simple one-way hash function to calculate the message digest and send the message to the receiver. The receiver recalculates the digest and compares it to verify the integrity of the information during transmission. The characteristic of this hash function is that no two different inputs can produce two identical outputs. Therefore, modified files cannot have the same hash value. One-way hash function can be effectively implemented in different systems.

Undeniable technology includes proof of origin and destination. The common method is digital signature, and a certain data exchange protocol is adopted, so that both parties can meet two conditions: the receiver can identify the identity claimed by the sender, and the sender cannot deny the fact that he sent the data in the future. For example, the communication parties adopt public key system, the sender encrypts information with the public key of the receiver and his own private key, and the receiver can read it only after decrypting it with his own private key and the public key of the sender, and so does the receipt of the receiver. In addition, the methods to prevent non-repudiation include: using the token of trusted third party, using time stamp, using online third party, combining digital signature and time stamp, etc.

In order to ensure the security of data transmission, data transmission encryption technology, data integrity authentication technology and undeniable technology need to be adopted. Therefore, in order to save investment, simplify system configuration and facilitate management and use, it is necessary to choose integrated safety technical measures and devices. The equipment should be able to provide encryption service for the host or key server of large-scale network system, provide secure digital signature and automatic key distribution function for application system, support a variety of one-way hash functions and check code algorithms, and realize data integrity authentication.

Data storage security system

The information stored in computer information system mainly includes pure data information and various functional file information. For the security protection of pure data information, database information protection is the most typical. Terminal security is very important for the protection of various functional files.

Database security: to provide security protection for data and resources managed by the database system, which generally includes the following points. First, physical integrity can protect data from physical damage, such as power failure and fire. ; The second is logical integrity, which can maintain the structure of the database, for example, the modification of one field will not affect other fields; Third, the integrity of elements, including the accuracy of information in each element; Fourth, data encryption; 5. User identification, ensuring that every user is correctly identified and avoiding the invasion of illegal users; 6. Accessibility means that users can usually access the database and all authorized materials; Auditability, which can track who has accessed the database.

To realize the security protection of the database, one option is to secure the database system, that is, the design, implementation, use and management of the system should follow a complete set of system security policies; The second is to build a security module based on the functions provided by the existing database system in order to enhance the security of the existing database system.

Terminal security: it mainly solves the security protection problem of microcomputer information, and its general security functions are as follows. Authentication based on password or (and) password algorithm to prevent illegal use of the machine; Autonomous and compulsory access control to prevent illegal access to files; Multi-level authority management to prevent unauthorized operation; Security management of storage devices to prevent illegal floppy disk copying and hard disk startup; Encrypted storage of data and codes to prevent information from being stolen; Anti-virus, anti-virus attack; Strict audit tracking makes it easy to trace the liability accident.

Information content audit system

Real-time content audit of information entering and leaving the internal network to prevent or track possible leakage. Therefore, in order to meet the requirements of national security law, this system should be installed and used in some important or confidential networks.

-The above is reproduced from infosec.gov, China Information Safety Network.