The Innovation of the Instruction Strategy for the Information Security Course Based on the Network Attack and Defense Training

被引:0
|
作者
Jia, Xueming [1 ]
机构
[1] Yunnan Police Coll, Informat Secur Coll, Kunming 650223, Peoples R China
关键词
Information security; Training; Instruction; Attack and defense;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, a novel instruction strategy for the information security training is proposed. Based on the Attack and Defense pattern training, the interesting of the students can be enhanced and the practical ability for tackling the exact information security problem can be improved. After the experiment thoughout a semester, the efficiency of the instruction can be increased almost 17%.
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [41] Security risk control of water power generation industrial control network based on attack and defense map
    Dong, Xiao
    Zhang, Jing
    Li, Qianmu
    Hou, Jun
    Liu, Yonzong
    2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, : 232 - 236
  • [42] Network Security Metric Based on Attack Duration
    Forghani, Shahab
    Habibi, Navid
    Firoozbakht, Mohsen
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1093 - 1096
  • [43] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [44] Food security strategy based on computer innovation
    College of Computer and Information Engineering, Xinxiang University, Xinxiang, Henan, China
    Adv. J. Food Sci. Technol., 10 (815-820):
  • [45] A probabilistic automata-based network attack-defense game model for data security by using security service chain
    Liu, Hao
    Wang, Chong
    Wu, Zhonghai
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2025, 28 (01):
  • [46] Network Attack Defense Awareness based on Dynamic Game
    Li, Man
    Cao, Jinjing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 69 - 77
  • [47] Optimal Network Security Strengthening Using Attack-Defense Game Model
    Jiang, Wei
    Fang, Bin-xing
    Zhang, Hong-li
    Tian, Zhi-hong
    Song, Xin-fang
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
  • [48] DFScan: Security Scanner of the Dockerfile Based on Instruction Coverage and Attack Perspective
    Hao, Jiawei
    Lu, Hui
    Jiang, Yu
    Gupta, Brij B.
    Almomani, Ammar
    Zhang, Man
    Tian, Zhihong
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2024, 14
  • [49] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [50] Discussion on the Role of Assembly Language Course in Information Security Training
    Li Xiao-dong
    NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 343 - 345