Current location - Music Encyclopedia - Dating - Content of network security education
Content of network security education
About the content of network security education

With regard to the content of network security education, it is now a highly developed era of network technology. More and more people like surfing the Internet in their lives, so that there are many online frauds now. People need to pay attention to the security of the network. Below I sorted out the relevant contents of network security education.

The content of network security education is 1 1, and several common network security problems.

(1) I can't stop playing online games. After the first level, you want to play to the second level and the third level ... In order to gain honor and self-esteem, players will not hesitate to sell their friendship and reputation, cheat, blackmail and even treat their peers violently.

(2) Playing games not only consumes all their spare time, but also makes it difficult for them to control themselves once they are addicted, even they don't want to go to school. They often play truant and their grades drop, which leads to dropping out of school.

(3) There are other traps hidden in the network. Chatting and making friends online is college students' favorite program, but making friends in virtual environment should be more vigilant than in real life to prevent being cheated.

(4) Excessive use of the Internet has seriously affected and damaged its social function, work, study and life. Being online for a long time will lead to unwillingness to communicate with the outside world, unsociable behavior and loss of normal interpersonal relationships.

2. Preventive measures

(1) Abide by computer network management and regulations, and do not play online games or browse pornographic information.

(2) Online chatting should focus on friends and classmates that you are familiar with, and it is best to talk less or not, let alone talk about low-level topics with netizens.

(3) Be careful when making friends online, don't disclose personal information, and don't let "netizens" go out casually.

(4) Computers can't replace people's emotional communication. In real life, most of them communicate and chat directly with classmates and friends.

(5) Strengthen physical exercise, arrange time reasonably, and pay attention to scientific use of brain.

(6) Check yourself for possible central nervous system function damage.

Do you think it will take a long time to feel satisfied when using the Internet?

② Are there any signs of shivering when you are not surfing the Internet?

Do you have any illusions or dreams about the Internet?

(4) Did your fingers unconsciously tap the keyboard?

Do you have an impulse to sensitive people?

Do you feel anxious for unknown reasons?

(7) If there are the above symptoms, the following adjustments should be made in time.

① Control the online operation time, with the cumulative operation time not exceeding 3 hours per day, and rest after continuous operation 1 hour 15 minutes.

(2) Before surfing the Internet, make clear the tasks and objectives of surfing the Internet and list the specific tasks to be completed on paper.

(3) Before surfing the Internet, limit the surfing time according to the workload, and log off or shut down on time.

The content of network security education. Strengthening the education of network security knowledge for students requires all teaching departments to actively offer computer network courses in accordance with the requirements of the national curriculum plan, so that students can master the necessary computer network knowledge. The school network classroom should extend the opening hours as much as possible to meet the students' online requirements. At the same time, it is necessary to combine the age characteristics of students, adopt flexible and diverse forms, impart necessary network security knowledge to students, and enhance their awareness and ability of security prevention.

Two, to further carry out the "National Youth Network Civilization Convention" study and publicity activities. Educate students to be good at online learning and not browse bad information;

Honest and friendly, not insulting and deceiving others; To enhance self-protection awareness, don't date netizens at will; It is necessary to maintain network security without disturbing network order; It should be beneficial to physical and mental health, and we should not indulge in virtual time and space.

Third, strengthen the management of students' online places such as electronic reading rooms, multimedia classrooms and computer rooms, prevent unhealthy content such as reaction, pornography and violence from endangering students, and guide students to treat the Internet correctly and surf the Internet in a civilized way.

Fourth, strengthen the construction and management of network civilization and network security. Take various effective measures to improve young students' ability to distinguish right from wrong, network moral level and self-discipline awareness, as well as their ability to prevent injuries and protect themselves under the network environment. In the process of campus network construction, we should pay attention to the establishment of network security measures, provide multi-level security control means and establish a security management system.

Fifth, strengthen the publicity and education of campus network civilization. All departments and teaching departments of the school are required to pay attention to the study and prevention of the adverse effects of the network on young people and actively guide young people to surf the Internet healthily. Strengthen the construction of teachers, so that every educator can understand network knowledge, abide by network ethics, learn network laws and regulations, and educate students on network ethics and network security through classroom teaching and extracurricular activities.

Six, increase exchanges and cooperation with the relevant departments of national network security, and strengthen the governance of Internet service places around the campus. Actively cooperate with the municipal public security, fire protection, culture, industry and commerce, urban management and other departments. To carry out the monitoring and management of the internet service business premises in and around the school to prevent students from indulging in internet cafes.

The content of network security education 3 network security knowledge 1. Password security

Whether you apply for email or play online games, you have to register, so you have to fill in the password. Most people will fill in some simple and memorable numbers or letters. I also set passwords for several email addresses. qq is the same as online games. On the Internet, you may tell your friend your password because you need it, but if that friend is very curious, he may use the password you gave him to enter your opponent's mailbox or qq, and your online secret will become information that he can get by raising his hand. Therefore, it is recommended that your most commonly used email password be set as an irregular password consisting of letters, numbers and symbols with at least 7 digits, and be changed at least once a month. Don't set the password of other mailboxes that are not commonly used to be the same as the password of the main mailbox. Passwords can be relatively simple or the same. But the password content must not involve your name, birthday or telephone number (many password dictionaries are based on these materials). So are other password settings. The most commonly used passwords should be set differently from others to avoid being "broken all the way". By the way, don't put the notebook with the password written on it in a place you think is safe.

Knowledge of network security II. qq security

Qq is an online instant chat tool produced by Tencent, and now the number of users is amazing! So there are so many tools in qq now. The following is the password security of qq. The first thing to do after applying for qq is to apply for password protection in the service area of Tencent's homepage. This is very important, but it is also easy to be ignored. Now, let's get down to business and talk about the security of qq. How about using qq to check the ip address (ip address is a 32-bit binary number divided into four 8-bit bytes, which is the only identifier used to identify computers and network devices in the network using tcp/ip protocol)? Q ip can be checked by special software, firewall or dos command, which is not explained in detail here. After finding the ip, malicious people can attack you with various bombs. Although these attacks are harmless to your personal privacy, they are often blown off the line, which is definitely not good. There are two solutions,

1. Don't let strangers or people you don't trust join your qq (but this is not practical, at least I think so).

2. Use proxy server (the full name of proxy server in English is proxy server, whose function is to obtain network information on behalf of network users, or more accurately, it is a transit station for network information). The setting method is to click qq menu = => System Parameters = > Network Settings = => Proxy Settings = => Click Use socks5 Proxy Server, fill in the proxy server address and port number, and confirm. Then log out of qq and log in again, and it's done. There are also many Qq password cracking tools. As long as the password you set is complicated, it is generally not easy to be cracked.

Network security knowledge. Proxy server security

Using a proxy server can effectively prevent malicious attackers from destroying you. But there is no free lunch, because after you use the proxy server again, your online information will be recorded in the log from the proxy service. If the network administrator wants to "take care of" you, you have no room to live. (Unless you go to the proxy server to delete his log)

Network security knowledge. Trojan horse prevention

Trojan horse, also called back door, is straightforward. Trojan horse consists of two programs, one is a server program and the other is a controller program. For example, when your computer is running a server, a malicious attacker can use the controller program to enter your computer and control your computer by booting the server program. Don't underestimate the Trojan horse, it can set your mouse, record your keyboard keys, modify the registry, remotely shut down, restart and so on. If you can't think of a Trojan horse, you must first understand its spread.

1, the email has spread, and Trojan horse will probably send it to you in the attachment of the mailbox. Therefore, it is best not to download emails with attachments from people you don't know, especially emails with attachments of * and exe names.

2, qq spread, because qq has a file transfer function, so now there are many Trojans spread through qq. Malicious saboteurs usually bundle Trojan server programs with other executable files by merging software, and then cheat you that this is a fun thing. If you accept it and manage it, you will become a victim of the Trojan horse.

3. Download and spread. When downloading software on some personal websites, it is possible to download something tied to the Trojan horse server. So, if you want to download tools, I suggest you go to a well-known website. If you are unfortunately hit by a Trojan horse, start your anti-virus program immediately and wait to be killed by the Trojan horse! Kill! Kill! . In addition, the method of manually removing Trojans is described in detail in another article.