S004116-4101-网络信息安全基础理论与技术

发布者:沈如达发布时间:2018-04-23浏览次数:14

研究生课程开设申请表

 开课院(系、所):信息科学与工程学院

 课程申请开设类型: 新开□     重开     更名□请在内打勾,下同

课程

名称

中文

网络信息安全理论与技术

英文

Theory and Application of Information Security in Network

待分配课程编号

S004101

课程适用学位级别

博士


硕士

√   

总学时

54

课内学时

44

学分

3

实践环节

研究报告

用机小时

10

课程类别

公共基础      专业基础     专业必修     专业选修

开课院()

信息科学与工程学院

开课学期

春季

考核方式

A. √笔试(开卷    闭卷)      B. 口试    

C.笔试与口试结合                 D. □其他

课程负责人

教师

姓名

黄杰

职称

副教授

e-mail

Jhuang@seu.edu.cn

网页地址


授课语言

中文

课件地址


适用学科范围

通信与信息系统

所属一级学科名称

通信与信息系统

实验(案例)个数

6

先修课程

计算机网络,通信原理

教学用书

教材名称

教材编者

出版社

出版年月

版次

主要教材

网络信息安全理论与技术

蒋睿、胡爱群等

华中科技大学出版社

2007.11

1

主要参考书

网络安全原理与应用

张世永

科学出版社

2003.5

1

信息安全原理及应用

阙喜戎、孙锐等

清华大学出版社

2003.7

1

网络安全-公众世界中的秘密通信

Charlie Kaufman

Radia PerlmanMike Speciner  著 许剑卓,左英男等 译

电子工业出版社

2004.9

1


一、课程介绍(含教学目标、教学要求等)300字以内)

在社会日益信息化的今天,通信与信息系统的安全性成为信息化建设的一个核心问题。本课程的内容主要包括三方面:密码学原理,介绍常用的加密算法和协议,包括对称密码、非对称密码和密钥管理;通信与信息系统安全技术,主要介绍通信与信息系统安全常用的技术,包括身份认证技术和相关协议等;系统安全,从系统安全的角度进行分析,包括防火墙,入侵监测、计算机病毒等。

通过本课程的学习,使学生掌握通信与信息系统安全的基本概念和基本原理,并了解设计和维护网络及其应用系统安全的基本手段和常用方法。要求学生学完本课以后,能够认识信息安全领域人们关心的问题和相应的解决途径,并能够运用常用的一些系统安全技术在具体实践中保护网络信息系统的安全,解决实际问题。



二、教学大纲(含章节目录):(可附页)

第一章 绪论

1.1 通信与信息系统安全概述

1.2 安全的影响因素

1.3 通信系统安全体系结构

第二章 对称密码学

2.1概述

    1. Shannon保密系统信息理论

    2. 对称密码体制

2.4 DES算法

2.5 blowfish算法

2.6 RC5算法

2.7 AES算法

第三章 非对称密码学

    1. 数学基础

3.1.1近世代数基础

3.1.2数论简介

    1. 非对称密码体制

    2. RSA算法

    3. 椭圆曲线加密算法

    4. 密钥管理

第四章 公钥基础设施(PKI

4.1 数字签名

4.2 私钥管理

4.3 PKIX模式

4.4 公钥密码标准(PKCS

4.5 XMLPKI和安全

第五章 身份认证

5.1 口令认证

5.2 基于证书的身份认证

5.3 生物特征认证

5.4 Kerberos认证服务

第六章 安全协议

6.1 SSL/TLS协议

6.2 安全超文本传输协议(SHTTP

6.3 时间戳协议(TSP

6.4 安全电子交易协议(SET

6.5 电子邮件安全协议

6.6 3-D安全协议

第七章 无线网络安全

7.1 无线局域网概述

7.2 WEP缺陷分析

7.3 802.11i安全协议

7.4 无线网络安全的解决方案

第八章 信息安全实用技术

8.1 概述

8.2 网络攻击技术

8.3 防火墙技术

8.4 入侵检测及预警技术

8.5 漏洞检测技术

8.6 计算机病毒防范


三、教学周历

周次

 教学内容

 教学方式

1

绪论,

讲课

2

 对称密码学

讲课

3

 对称密码学

讲课

4

 对称密码学

讲课

5

 非对称密码学

讲课

6

 非对称密码学

讲课

7

 非对称密码学

讲课

8

 公钥基础设施(PKI

讲课

9

 身份认证

讲课

10

 身份认证,安全协议

讲课

11

 安全协议

讲课

12

 无线网络安全

讲课

13

 无线网络安全

讲课

14

 无线网络安全

讲课

15

防火墙技术

讨论

16

入侵检测及预警技术

讨论

17

漏洞检测技术

讨论

18

计算机病毒防范

讨论


四、主讲教师简介:

黄杰,男,19705月生,湖北武汉人。19927月于华中理工大学获学士学位;19996月于华中科技大学获硕士学位,研究方向为计算机网络;200411月毕业于华中科技大学,获得博士学位,研究方向:信息传输的安全和身份认证技术。200411月进入东南大学无线电系信息安全研究中心任教。目前主要研究兴趣为:通信网络的信息安全,无线局域网及其安全技术,可信计算等。


五、任课教师信息(包括主讲教师):

 任课

 教师

 学科

 (专业)

 办公

 电话

 住宅

 电话

 手机

 电子邮件

 通讯地址

 邮政

 编码

黄杰

信息安全

83795112-8

83792380

13675178016

Jhuang_2003@163.net

信息科学与工程学院

210096




Application Form For Opening Graduate Courses

School (Department/Institute)School of Information Science and Engineering

Course Type: New Open □   Reopen    Rename □Please tick in □, the same below

Course Name

Chinese

网络信息安全理论与技术

English

Theory and Technology of Information Security in Network

Course Number

S004101

Type of Degree

Ph. D


Master

Total Credit Hours

54

In Class Credit Hours

44

Credit

3

Practice

Report

Computer-using Hours

10

Course Type

Public Fundamental Major Fundamental    □Major Compulsory     □Major Elective

School (Department)

School of Info. Sci. and Eng.

Term

Spring

Examination

A.PaperOpen-bookClosed-bookB. □Oral   

C. □Paper-oral Combination                       D. □ Others

Chief

Lecturer

Name

Huang Jie

Professional Title

Associate Professor

E-mail

Jhuang@seu.edu.cn

Website

NULL

Teaching Language used in Course

Chinese

Teaching Material Website

NULL

Applicable Range of Discipline

Communication and Information System

Name of First-Class Discipline

Communication and Information System

Number of Experiment

6

Preliminary Courses

Computer Network

Teaching Books

Textbook Title

Author

Publisher

Year of Publication

Edition Number

Main Textbook

Theory and Technology of Information Security in Network

Jiang Rui,Hu Aiqun,etc

HUST Press

2007.11

1

Main Reference Books

Network Security Principle and Aplication

Zhang Shiyong

Science Press

2003.5

1

Principle and Practice of Information Security

Que Xirong, Sui Rui, etc.

Tsinghua University Press

2003.7

1

Network Security Private Communication in a Public World

William Stallings

Publishing House of Electronics Industry

2004.9

1


  1. Course Introduction (including teaching goals and requirements) within 300 words:

Two trends have come together to make this course of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence on the information stored and communicated using these systems. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications.


Three parts are included in this course: 1. Cryptography: a concise survey of the cryptographic algorithms and protocols underlying network security applications. 2. Communication and Information system security applications:  Covers important network security tools, including identification and security protocol, etc. 3. System security: looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls, etc.


After the study of this course, the basic concepts and principles of information security in communication networks are provided. The students should hold how to design and maintain the network and its application so as to make them secure.


  1. Teaching Syllabus (including the content of chapters and sections. A sheet can be attached):

Ch1 Introduction
    1. Network Security Overview

    2. Influence Factors in Network Security

    3. Network Security Architecture

Ch2 Symmetric Cryptography

    1. Introduction

    2. Theory of Shannons Security System

    3. Symmetrical Encryption Algorithms

    4. DES

    5. Blowfish

    6. RC5

    7. AES

Ch3 Asymmetric Cryptography

    1. Mathematical Foundation

3.1.1 Basic Modern Algebra

3.1.2 Introduction to Number Theory

    1. Public-Key Cryptography Principles

    2. RSA Algorithms

    3. Elliptic Curve Cryptography

    4. Key Management

Ch4 Public Key Ingrastructure
    1. Digital Signature

    2. Private key management

    3. The PKIX Model

    4. Public Key Cryptography Standards

    5. XML,PKI and security

Ch5 User Authentication Mechanisms

5.1 Passwords

5.2 Certificate-based Authentication

5.3 Biometric Authentication

5.4 Kerberos

Ch6 Security Protocol

6.1 Secure Socket Layer(SSL/TLS)

6.2 Secure Hyper Text Transfer Protocol(SHTTP)

6.3 Time Stamping Protocol(TSP)

6.4 Secure Electronic Transaction (SET)

6.5 Email Security

6.6 3-D Security Protocol

Ch7 WLAN Security

7.1 Introduction to WLAN

7.2 Default of WEP

7.2 802.11i

7.3 WLAN Secure Solution

Ch8 Practical Techniques in Information System Security

8.1 Introduction

8.2 Network Attacks

8.3 Firewalls

8.4 Intruder Detection System

8.5 System Hole Detection

8.6 Computer Viruses and Protection


  1. Teaching Schedule:


Week

Course Content

Teaching Method

1

Ch1 Introduction

Presentation

2

Ch2 Symmetric Cryptography

Presentation

3

Ch2 Symmetric Cryptography

Presentation

4

Ch2 Symmetric Cryptography

Presentation

5

Ch3 Asymmetric Cryptography

Presentation

6

Ch3 Asymmetric Cryptography

Presentation

7

Ch3 Asymmetric Cryptography

Presentation

8

Ch4 PKI

Presentation

9

Ch5 User Authentication

Presentation

10

Ch5 User Authentication and Ch6 Security Protocol

Presentation

11

Ch6 Security Protocol

Presentation

12

CH7 WLAN Security

Presentation

13

CH7 WLAN Security

Presentation

14

CH7 WLAN Security

Presentation

15

Ch8 Firewalls

Discussion

16

Ch8 Intruder Detection System

Discussion

17

Ch8 System Hole Detection

Discussion

18

Ch8 Computer Viruses and Protection

Discussion

Note: 1.Above one, two, and three items are used as teaching Syllabus in Chinese and announced on the Chinese website of Graduate School. The four and five items are preserved in Graduate School.


2. Course terms: Spring, Autumn , and Spring-Autumn term.  

3. The teaching languages for courses: Chinese, English or Chinese-English.

4. Applicable range of discipline: public, first-class discipline, second-class discipline, and third-class discipline.

5. Practice includes: experiment, investigation, research report, etc.

6. Teaching methods: lecture, seminar, practice, etc.

7. Examination for degree courses must be in paper.

8. Teaching material websites are those which have already been announced.

9. Brief introduction of chief lecturer should include: personal information (date of birth, gender, degree achieved, professional title), research direction, teaching and research achievements. (within 100-500 words)


  1. Brief Introduction of Chief lecturer:

Huang Jie was born in May, 1970 in Wuhan, Hubei province, China. He received his B.E. and M.E. degree both in from Huazhong University of Science and Technology in 1996 and 1999, respectively, and in Nov. 2004got his Ph.D. degree in School of Mechanical Science and Engineering of Huazhong University of Science and Technology. He is now a lecturer in the Research Center of Information Security of Southeast University.



  1. Lecturer Information (include chief lecturer)


Lecturer

Discipline

(major)

Office

Phone Number

Home Phone Number

Mobile Phone Number

Email

Address

Postcode

Huang Jie

Information Security

83795112-8

83792380

13675178016

Jhuang_2003@163.net

School of Info. Sci. and Eng.

210096







11