The Innovation of the Instruction Strategy for the Information Security Course Based on the Network Attack and Defense Training

被引:0
|
作者
Jia, Xueming [1 ]
机构
[1] Yunnan Police Coll, Informat Secur Coll, Kunming 650223, Peoples R China
关键词
Information security; Training; Instruction; Attack and defense;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, a novel instruction strategy for the information security training is proposed. Based on the Attack and Defense pattern training, the interesting of the students can be enhanced and the practical ability for tackling the exact information security problem can be improved. After the experiment thoughout a semester, the efficiency of the instruction can be increased almost 17%.
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [21] Attack-Defense Differential Game Model for Network Defense Strategy Selection
    Zhang, Hengwei
    Jiang, Lv
    Huang, Shirui
    Wang, Jindong
    Zhang, Yuchen
    IEEE ACCESS, 2019, 7 : 50618 - 50629
  • [22] Research on network security model based on active and passive defense hybrid strategy
    Zhu, Nan
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 2686 - 2689
  • [23] Active Defense Strategy Selection of Military Information Network Based on Incomplete Information Game
    Wang Z.
    Lu Y.
    Li X.
    Binggong Xuebao/Acta Armamentarii, 2020, 41 (03): : 608 - 617
  • [24] Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
    Zhao, Xuhua
    International Journal of Network Security, 2020, 22 (06) : 1037 - 1042
  • [25] Research on Network Attack-Defense Simulation Training Platform
    Lin, ZhiWei
    Chen, Gang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 462 - +
  • [26] Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model
    Liu, Jianyi
    Weng, Fangyu
    Zhang, Ru
    Guo, Yunbiao
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 161 - 173
  • [27] Design of Network Security Defense System for Information System
    Li, Kexin
    Xia, Hongsen
    Zhong, Ling
    PROCEEDINGS OF ANNUAL CONFERENCE OF CHINA INSTITUTE OF COMMUNICATIONS, 2010, : 301 - 303
  • [28] Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL
    Tu, Shanshan
    Waqas, Muhammad
    Meng, Yuan
    Rehman, Sadaqat Ur
    Ahmad, Iftekhar
    Koubaa, Anis
    Halim, Zahid
    Hanif, Muhammad
    Chang, Chin-Chen
    Shi, Chengjie
    COMPUTER COMMUNICATIONS, 2020, 160 : 790 - 798
  • [29] Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain
    Zhang, Zhe
    Li, Chengcheng
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2022, 34 (01)
  • [30] Generation method of power network security defense strategy based on Markov decision process
    Yang, Wang
    Dong, Liu
    Dong, Wang
    Chun, Xu
    Dong, Liu (623044261@qq.com), 1600, River Publishers (36):