Font Size: a A A

Teaching Experimental System Of Network And Information Security

Posted on:2008-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:C Z WangFull Text:PDF
GTID:2178360242460253Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Nowadays more and more open and professional hacker technology leads to increasingly frequent attacks on computers, rapidly overrunning computer viruses and manifoldly fatal network security events. Thus the averting awareness of computer users is improved fast, and at the same time the market demand for network information security becomes a good deal larger. Many colleges and universities begin to open the major of Internet Information Security, but now the Internet Information Security in China is still at the exploring stage, with fewer complete sets of experiment system.According to the actual teaching conditions of Internet Information Security in colleges and universities in china ,the Internet Information Security Teaching Experiment System designed in this thesis is a teaching product ,meeting the requirements in the Technology criterion of Educational Resources Construction by ministry of education.With a complete set of solutions for teaching experiments, the system explain and analyze every branches of different Internet Information Securities in detailed, which helps students study deeply all aspects of the knowledge of network information securities and understand its theories. Also , this project provides new means and method for the teaching of the network information securities.This system consists of two virtual machines—Windows and Linux in which the Internet Information Security Experiment Platform is installed separately .The Experiment Platform concludes courseware and experiment tools consisting of independently developed information security toolbox, protocol analyzer and all kinds of hacker tools etc.The aim of the Internet Information Security Experiment Platform is to get unification of the Windows and Linux, by using Java as developing tool, adopting XML technology to achieve the cross-platform and good expansibility. The Experiment Platform includes experiment base, Basic theory, experiment steps and relative tools. The Information Security Tool Kits (CISStudio) assembles encoding, decoding, PKI tool, monitor, flood attacker and decoder etc.The system designs twelve experiments and thirty five exercises including:Cryptography and its applications mainframe securityinternet attack and defendVirus and Trojan horseFirewall and IDSVPN technologyThe key technologies in the system are:independent design of the system hardware , bring the best of the system into play to meet the experiment demands in different net environments;the server applies Fedora Core 5 ,which is steady and safe and provides automatic collocation and restore tool;use virtual machine to control and simulate the true experimental environment;conform the various software to the unified flat form ;supervise the system completely and display the whole process of the system safety ;reconstruct the control of the virus, Trojan horse and other dangerous technologies;The technological difficulties include:the preparation and restore of the environmentthe cross-flat experimentsthe display of the processthe reconstruction of the control of the viruses and Trojan horse Characters of the system:Design of the hardware is integrated.The hardware of the system is designed by our company independently, it has fulfilled the optimum performance and it adapts to various networks.The software design is standardized.The design of the system follows the principles of software engineering and concerns the maneuverability and humanization.The contents of the experiments are extensive.The contents involve cryptography, mainframe security, network attack and defense and conclude the two main operating system: Windows and Linux.The experimentation platform is powerful.It combines the operating system with the information security software.The design of the experimentation is compact. The simple but clear ideas of experimentation design minimize the students'preparation for the lesson.The form of the experiment is clear. Visualize the process of attack and defense work.The system is completely safe and controllable.There's no risk, the cost of the experiment environment control and maintenance is low.During the whole development process of the system, all the procedures are carried out to meet the criterion of ISO9001 and follow the principles of software engineering. The design of the system applies the technique of OOD and analysis technology, with Rational Rose as its assisting modeling tool. At the same time, it uses the new techniques and approaches of software development, Such as XML, Object Orient Generic Patterns, and Test-driven Development.The system provides new teaching strategies for the teaching of Network Information Security, actively promoting the teaching reforms. It shows its functions in the following aspects:The system provides a new method for improving the teaching quality and cutting the teaching expenses. The teaching experimental system for network information security can collect wisdoms of the excellent teachers, apply the best fruits of teaching materials, teach openly in all aspects, tack all teaching process and provide a new method of saving expenses.This system provides colleges and universities with conditions of opening the network information security teaching experiment lessons, and changes the former situations of more theories and fewer experiments.On the basis of the previously learned knowledge of Principles of Computer, Computer System Organization and Network Technology, this system helps students systematically and comprehensively learn the network information security; understand its architecture and basic theory of network information security and foster the real working ability. It also makes students fully master and apply the scientific and modern management means and methods of network information security, with the purpose of serving their majors, adapting the managing work of different levels, and making a good foundation for the network security management. Consequently it helps cultivate modernized information managing talents with high qualities.
Keywords/Search Tags:Experimental
PDF Full Text Request
Related items