20191218 "Introduction to Information Security" Twelfth weekly summary

Learning content summary

This week finally learned the chapters related to our professional: computer security, but also to understand some of the basic skills we need to have. We understand that information security is defined: to ensure proper access to the data base and policy, and to understand that the confidentiality, integrity, availability of three parts, namely the so-called CIA. We know the focus of risk analysis: the distinction between administrative privileges available data, determine what data needs to be protected, risk and risk calculation estimated identification data may become a real possibility. A clear understanding of the information security core that CIA, and the confidentiality and integrity of the core is to report the unauthorized users can not access your account. Understand three common identification credential: the user knows (a password, PIN, etc.), items owned by the user (if any magnetic stripe or smart card identification) and biometric (seemingly very safe but risks great harm to a type of certificate method because once the individual biometric stolen, you are hard to fit the new biological characteristics).

Next week also learned knowledge related to network attack and defense. Learn several malicious code: viruses (Virus), worm (Worm, note the virus to distinguish), Trojans (Trojan Horse, disguised as goodwill resource malicious code) and logic bombs (Logic Bomb, a specific event, time trigger point); probably know several common security attacks: deception (which is often said fishing), the back door (the programmer itself deliberately left), buffer overflows, denial of service attacks (DoS, the network remains busy green) and middle attacks (ie, the interception of critical information).

Also learn the relevant knowledge of cryptography. The first is the password management guidelines (that is, how better to set a password and a high strength to keep in mind), to learn more about the cryptographic standards, to better appreciate the practice keepass by after class this point. Meanwhile, our GM SSL have a preliminary understanding. Learn classical encryption in two ways: Caesar Cipher (shift constant replacement alphabetical order), the encryption conversion (replacement character to another character). Also studied the line on behalf of password encryption: a public key, the introduction of the private key. In this way, we can be digitally signed (there are non-repudiation). Tuesday Polytechnic Institute forum talking about block chain at the same time highlighted the importance of cryptographic algorithms. Learned with other wiki wiki wiki is not the same thing.

In addition, this week will be "self-study is a craft," book review a second time, I feel a lot of problems left over from the past (such as the lambda expression return value, string, etc.) have a good solution, many of the original advance knowledge has become the reference of common sense.

This week has been the practice of personal web design, website creation does not feel easy as you think, just adjust the background color spent a lot of effort, learn from the Internet and found some templates can solve the problem quickly.

Last week, the wrong question test summary

 

 The debugger is converting the analog signal into a digital signal and then converted back.

Learning progress bar

9/251hours

Guess you like

Origin www.cnblogs.com/20191218tangqiheng/p/12081009.html