Joke Collection Website - Cold jokes - "Network Security" Theme Class Meeting Daquan
"Network Security" Theme Class Meeting Daquan
Network security includes six threats: physical security threats, operating system security flaws, network protocol security flaws, application software implementation flaws, user use flaws and malicious programs. The following is a class meeting on the theme of "network security" that I arranged for you, hoping to bring you help.
"Network Security" Theme Class Meeting 1 Activity Purpose:
1, as a pupil, you should know the safety measures to prevent fraud.
2. Publicize the anti-fraud knowledge learned to parents.
Teaching preparation: collecting fraudulent information
Teaching process:
First, import
1, tell the story of fraud around you.
2. blackboard writing topic. Make the content of this lesson clear.
Second, explain the fraud story.
1, loan fraud
Be wary of people you don't know very well, especially when they borrow things. Never let property leave your sight, and be more careful when lending valuables.
2. "Change package" fraud
"Switching" is a trick to turn a dragon into a phoenix. Molecules prepare forged passbooks (or savings cards) in advance, and after contacting the victim, they use the opportunity of inspection to quickly replace the passbooks (or savings cards) in the hands of the victim. When the client deposits money into his passbook (or savings card), the molecules abscond with a savings card (or passbook) matching the passbook (or savings card).
3, fund-raising fraud
Some people use the spare money in the hands of ordinary people to lie that there are good investment projects. If they invest, they can get a high profit return, but once they invest, they often lose everything. Fund-raisers don't spend money on projects at all, but transfer or squander it.
4, the magic medicine fraud
First of all, the panacea itself is a myth. There can be no panacea in real life. When someone sells medicine to you, you must be careful not to be fooled.
Second, when you are sick, especially when you have an incurable disease, you must go to a regular hospital for examination, prescribe the right medicine, and recover slowly after treatment.
Third, don't be greedy. We should correctly understand the value of drugs. Some greedy people often become targets for criminals to lure and defraud money. Fourth, when encountering such elements, we should respond skillfully and strive for time to call the police.
5, cans winning fraud
This kind of deception usually occurs in parks, bus stations, cars, trains, ships and other means of transportation, and the scammers are mostly three people. Molecules often use a can as a prop to tell the victim that they have won the prize, and then their accomplices pretend to buy it, and encourage the victim to listen to the contents of the winning inquiry phone to confirm that they have really won the prize (this phone call was actually answered by another accomplice), thus tricking the victim into buying the winning ring. If they appear, don't trust them; Second, we must stabilize each other, call the police quietly and help the police kill people.
6. Recruitment fraud
If you want to work in the legal and formal labor intermediary market, don't listen to the small advertisements on the street. The so-called "high-paying recruitment" advertisement is not only illegal, but also full of deception. Do not believe! Every time these swindlers talk, they don't ask you to pay a lot of money, but all kinds of fabricated reasons are really true, which not only deceive rural job seekers and laborers, but also make residents who are not alert fall for it.
7. Emergency telephone fraud remittance
Don't believe the news that a family member who is away from home has been involved in a car accident. Don't panic. Call "1 14" to check the telephone number of local public security bureau and hospital, and then remit money.
8. Commercial fraud partnership
Is it possible to invite you to do business on the street and make a lot of money? Remember impossible, absolutely impossible, he is trying to cheat money.
9. Magic fraud
There are always some mysterious magic shows or swindlers who claim to have special functions in the park. They use magic to cause people's visual errors and let you participate, while some people are too credulous and always think that seeing is believing. As a result, they regret losing their money. Don't take chances and don't take part in any gambling or opportunistic activities. Molecules are usually two people. When doing business in partnership, one person first accosted the victim, claiming that he could turn small money into big money during the chat and demonstrate it on the spot. He used magic to change the one yuan in the victim's hand into ten yuan, and the ten yuan into one hundred yuan, so that the victim could believe that he really went home to get the money to exchange it, and then cheated the victim of his money by changing the bag. Police tip: If you really have such amazing skills, why do you still do business!
Third, the class meeting summary
What did you gain after listening to today's anti-fraud knowledge introduction? What will you do if you encounter similar fraud in the future?
1. The telephone number in Fei Jing is 1 10. Keep this number in mind so that you can dial it in time when there is an abnormal situation.
2. Call 1 10 and report the location, time, parties and details of the case to the door concisely and accurately, so that the door can send personnel to handle it in time.
3. Alarm is an important event related to public security management. Don't make random phone calls or make jokes about this.
Fourth, blackboard design.
What do you know about fraud prevention?
Borrowing goods fraud "changing packages" fraud fund-raising fraud
The magic medicine cheats the pot, wins the prize, cheats the job, cheats.
Emergency telephone fraud remittance partnership fraud magic fraud.
"Network Security" theme class meeting 2 1, class meeting theme: tighten the string of prevention and stay away from fraud.
2. Purpose of the activity: With the development of society and the progress of information technology, various fraud phenomena have become increasingly prominent problems in society. Especially some fraudsters, turn their targets to students. Students are easily deceived by people with ulterior motives, and they are easy to have a sense of trust and obedience to what adults say. Therefore, in the face of adult fraud, it is difficult to make a clear judgment effectively. Therefore, in order to familiarize students with the common forms of fraud in life, enhance their awareness of coping with fraud flexibly in life, and improve their abilities of self-prevention, self-protection, self-coping and self-escape.
3. Activity process: In today's society, there are more and more fraud cases and the means are becoming more and more sophisticated. Since the beginning of school, students have been cheated in our school. Although it is an example, it cannot be ignored. Criminals take advantage of some students' psychological characteristics, such as vanity, greed, simplicity, etc., and implement various fraud tricks, causing some students to suffer huge property losses and mental stress. In order to enhance everyone's anti-fraud awareness and improve their self-prevention ability.
4. Location: Senior Three Spring Examination Class (1).
5. Participants: all the students in the spring exam (1) class of senior three.
6. Main content: Prevention of fraud
7. Fraud cases:
During the winter vacation, students in our school also encountered fraud, but fortunately, the losses were not great, and the fraud methods of scammers emerged one after another, using the deep friendship and pure hearts of classmates to gain benefits. Fortunately, most students are highly vigilant and beware of fraud, so that scammers can't start.
2065438+August 2009, Ms. An, who lives in Hongqiao District, was attracted by an advertisement for investing in stock index futures while browsing information online. After actively contacting the advertiser's customer service WeChat, she was pulled into a "stock investment exchange information group".
With the support of a group of friends, Ms. An registered the stock index futures platform recommended by the company and invested 700,000 yuan in stock index futures trading under the guidance of "experts". But after calming down, Ms. An wanted to redeem the funds, only to find that her WeChat had been blacked out by the other party. ......
On August 30th, 20 19, Ms. An, who was found to have been cheated, came to the Nantouyao police station of Hongqiao Branch of the Public Security Bureau. Hongqiao Branch of the Public Security Bureau quickly mobilized the anti-trafficking investigation detachment, the anti-telecom fraud special class, the Netan detachment, the Nantouyao police station and other multi-department capable police forces. With the strong support of the four detachments of the Municipal Public Security Criminal Investigation Bureau, a task force was formed to solve the case. Through investigation, the task force found that under the guise of entrusting and guiding investment in stocks and stock index futures, the gang posted online advertisements on multiple search platforms on the Internet to lure victims to "take the bait" and join the stock trading group. Team members have successively played the roles of "stock master", "tout" and "customer service" in the stock exchange group, boasting about the profit from investment, defrauding the trust of the victims, and making them invest in stock futures products on the virtual platform according to the recommendation of the "stock teacher". The victims' funds have already been transferred out and flowed into the pockets of criminals.
The task force found that the electric bombing gang had a clear division of labor. After three days of intense investigation, on June 5438+065438+1October 2 1 day, five people, including Li Moumou, were all arrested in Changfeng District, Hefei City. So far, all nine members of the telecommunication network fraud gang have been brought to justice, and more than 40 mobile phones have been seized on the spot. 10 More than 0 computers. 6 vehicles and cash of 6.5438+0.7 million yuan. Lots of bank cards, scripts, account books. Upon inquiry, the criminal suspect Li confessed to the fact that he set up a bureau to defraud Ms. An of 700,000 yuan.
8. How to prevent fraud:
Don't covet petty advantages.
Don't easily participate in all kinds of so-called "discount promotion" activities of strangers.
Don't believe in feudal superstitions.
(4) Don't easily believe the sweet words of strangers on the street, and don't believe the nonsense of "breaking money and eliminating disasters", so as not to give swindlers an opportunity. Once you are cheated, you should call 1 10 to call the police quickly.
5 online shoppers must be highly vigilant and pay more attention to avoid being deceived.
Nine, class meeting summary:
The theme class meeting of "Preventing fraud alarm bells ringing" concluded that in today's society, there are more and more fraud cases and the means are becoming more and more sophisticated. They use some students' psychological characteristics such as vanity, greed and simplicity to implement various fraud tricks. I hope that through this class meeting, I can once again awaken the students' awareness of various safety issues in life. The earth woke up and the spring breeze was green. We should let the seeds of safety education in our hearts sprout and blossom, grow into towering trees, and we will certainly reap more peace, happiness and tranquility.
"Network Security" Theme Class Meeting 3 Teaching Objectives:
1, to understand students' awareness and level of network security.
2. Let students grasp the concept of network as a whole and have a general understanding.
Teaching process:
Introduction before class: With the advent of the information age, more and more people can't live, work and study without computer networks, and various network security issues also follow. Some people use the internet to work and study, but there are always some people who destroy the internet to make money and show their computer skills, which greatly affects their normal work. Through the study of this course, I hope that students will have a general understanding of network security, and have a detailed grasp of Trojan horse detection, hacking techniques, computer network viruses, vulnerability inspection and prevention. Through the combination of theory and practice, including the use of some commonly used security software, students can systematically learn the relevant knowledge of network security under the guidance of teachers.
I. Learning requirements and methods
1. There is no suitable textbook for this course. I hope you can often take notes and do a good job in listening and reviewing with online teaching plans.
2. In addition to listening carefully in class, this course relies more on everyone's consciousness, consulting relevant learning materials through various channels, and taking notes with more hands and brains in order to solve similar problems in the future.
3. Conduct some exchanges and discussions in a timely manner to share your benefits for a period of time.
Second, the network security overview
1, students discuss in groups to understand students' understanding, interest and mastery of network security.
Divide the two groups of students into 10 minutes to discuss Trojan horse and the "panda burning incense" virus that has recently become popular on the Internet, and then choose a representative from each group to speak. The teacher made a summary according to the situation.
2. The teacher got a more accurate understanding of Trojan horse and "panda burning incense" virus by summing up.
Trojan horse: Trojan horse program is a popular virus file at present. Unlike ordinary viruses, it does not copy itself or intentionally infect other files. It attracts users to download and execute by disguising itself, and provides Trojan horse breeders with the entrance to open the seed computer, so that horse breeders can destroy and steal the seed files at will, and even remotely control the seed computer.
"Panda Burning Incense" virus: At the end of 2006, a large-scale outbreak of "Panda Burning Incense" virus and its variants occurred on the Internet in China. The virus spread in many ways, and all the infected program files were changed to look like a panda with three incense sticks. At the same time, the virus also has the function of stealing users' game accounts and QQ accounts.
This is a super virus, and the infected computer will attach the virus to all web files on the hard disk. If the infected computer is a website editor, it may be attached to all pages of the website through a poisoned webpage virus, and netizens will be infected with the virus when visiting the poisoned website. "Panda Burning Incense" has infected portal websites such as Tianya Community. "Panda Burning Incense" not only has all the characteristics of the virus, but also has a strong commercial purpose: it can secretly steal users' game accounts and QQ accounts for sale, and can also control infected computers, turn them into "cyber zombies" and secretly visit some websites that pay for their access, thus making profits. Some varieties also contain pilfer date trojan.
The concept of network security: information security refers to protecting the confidentiality, integrity and availability of information, that is, data-oriented security. After the emergence of the Internet, in addition to the above concepts, the connotation of information security has been extended to user-oriented security. Generally speaking, network security includes six threats: physical security threats, operating system security flaws, network protocol security flaws, application software implementation flaws, user use flaws and malicious programs.
Third, examples of network security
Security vulnerabilities Theoretically speaking, security vulnerabilities are unexpected functional branches in software. Through security holes, software can do unexpected things for software designers.
1. Example: Alipay control was originally designed to encrypt communication and protect users' communication security, but it can also be used to perform any function, such as running a Trojan horse that steals bank accounts. If a Trojan horse wants to run on a user's computer, one of the main means is to exploit security vulnerabilities. At present, the most widely used are various IE control vulnerabilities. On February 8, 2007, Alipay upgraded the controls and fixed the above vulnerabilities. As long as the vulnerable controls are installed, whether you use Alipay or log in to Alipay, you will be threatened by vulnerabilities. Because any web page can call this control by placing special code. However, using Alipay service itself is not dangerous-because Alipay website itself does not contain such malicious code.
2. How to prevent Trojans and viruses?
At present, the main working principle of all anti-virus software is based on feature recognition. What is feature recognition? Generally speaking, it is to master the roster of bad guys and look for them according to the roster. If this virus or Trojan horse is just written, there is no "criminal record" and it is not on the roster, anti-virus software will not recognize it. Although some anti-virus software also has some advanced identification functions that do not depend on the roster, this function is not reliable. What's more, today's virus Trojan authors, after writing the program, will test it with anti-virus software to confirm that it will not be detected before releasing it. So antivirus software is useless? No, all kinds of antivirus software can help you solve most of your troubles, but you can't expect it to be reliable.
Fourth, understand hackers.
Hacking is an industry that only a few people can enter. Every hacker has cruel youth. Most people are interested in computer assembly language in the first and second years of middle school or university. Later, they have to spend a lot of time on basic learning, so that they can enter the advanced road of hackers. Most people can't overcome this challenge and choose to give up. Hacking is also an industry that only young people can engage in. Among the hackers in China, the older generation who call themselves old people are only 30 years old, while the new generation may be less than 20 years old.
Trojan horse technology is a common attack method for hackers. It hides a program that will run when Windows starts in your computer system, and adopts the server/client running mode, so as to control your computer when surfing the Internet. Hackers use it to steal your password, browse your drive, modify your files, log in to the registry and so on.
In addition, hackers often use system vulnerabilities to carry out some destructive attacks. These will be studied slowly with everyone in the future teaching.
Verb (abbreviation of verb) abstract
This lesson mainly gives students an overall understanding of network security through examples around them. In the future, they will learn more about hackers, Trojans, security vulnerabilities and computer viruses. I hope everyone will cooperate well and lay a good foundation for future work and study!
"Network Security" Theme Class Meeting Lesson 4:
Let students clearly understand all kinds of unsafe hidden dangers on the network and learn to protect their own interests in the virtual network world; Treat all kinds of temptations rationally and resist the erosion of bad thoughts; Pay special attention not to indulge in online games and sound the alarm with bloody facts.
Overall process:
1. Let's express our opinions on the problems encountered in the network.
2. Look at cases and materials and talk about feelings.
3. The class teacher makes a summary.
Detailed process
A and B: Hello, everyone! The theme of this class is "Network Security Education".
Moderator A: I believe that students are familiar with the network, but how much do they know about network security? Why don't you listen to Li Zhao's questions about network security first?
1, speak freely
Moderator B: The following questions are all encountered by students in the process of surfing the Internet. How do you deal with them and why? Please speak freely.
(1) Are you temperate in surfing the Internet? What's the timetable? What do you usually do?
(2) Have you protected your online password and personal data?
(3) Will you provide your name, home address, school name or telephone number, photos, etc. Chat room or public forum?
(4) Have you received documents and other information from people you don't know? Why?
(5) What will you do with bad information such as hints, provocations and threats?
(6) What's your attitude towards websites that publish bad information, unhealthy chat rooms and unhealthy pages?
(7) What do you do when someone asks to go to an appointment or visit on the grounds of giving money or meeting?
Moderator A: It seems that students have a comprehensive understanding of network security and can rationally control themselves from being eroded by bad thoughts.
It is said that the negative impact of China's Internet at present mainly includes the following three aspects: First, hostile forces at home and abroad publish a large number of reactionary, inflammatory, yellow, violent and vulgar contents on the Internet. It has caused serious adverse effects on the physical and mental health of minors. Secondly, in view of the weak self-control of minors, many criminals use the platforms provided by websites and Internet cafes to find targets to commit fraud, robbery, coercion and other criminal activities, which directly threaten the personal safety of minors.
(8) Have you ever been to an Internet cafe to surf the Internet? Even playing games?
(9) Do you play online games? What kind is it? Do you know the language and actions in The Imitation Game? Do your classmates often imitate or even talk about it?
(10) If you have classmates or relatives who are addicted to online games, can you talk about their performance?
Moderator A: Indulging in the Internet or even online games not only affects our study and mental health, but also may lead us astray. The Imitation Game's words or actions caused tragedy.
2. Look at cases and materials and talk about feelings.
Compere A: On March 7th, students of a primary school in Rong Gui, Shunde, imitated scenes in online games and fought during class. Xiao Peng and Xiao Gong, classmates, play hostile roles in a popular online game. In the "battle", Xiao Gong accidentally stabbed Xiao Peng with a switchblade.
Students are free to express their opinions: Why did such a tragedy happen? What do you think of this? What would you ask yourself?
Moderator B: Of course, this tragedy is not accidental. Behind it is a huge army of young online games. According to the statistical results, there are about 1 10,000 online game teenagers in China, of whom 2.6 million are online game addicts. Previously, the survey results of internet addiction among teenagers in Shanghai showed that the total incidence of internet addiction among teenagers in this city was 14.2%. Internet addiction has become an incentive for these teenagers to intensify family conflicts and participate in illegal crimes.
Internet addiction: it can cause autonomic nerve disorder, imbalance of hormone level in human body, decline of immune function, cardiovascular disease, gastrointestinal neurosis, tension headache, anxiety, depression and so on. , and even lead to death.
3, the class teacher summary
The network provides us with rich information resources and creates wonderful entertainment time and space. It has become an important platform for students to learn knowledge, exchange ideas and entertain, and has strengthened communication with the outside world. However, the network is like a double-edged sword, and some of its bad content is also very easy to hurt students, which has great security risks. At this class meeting, we exchanged and discussed various situations in the virtual network from the time arrangement of surfing the Internet, to the selective browsing of online information, and finally to the correct understanding of online games. The purpose is to make students clearly understand the importance of network security and learn to treat all kinds of temptations rationally, so as to make better use of the network to promote our learning progress.
"Network Security" Theme Class Meeting 5 I. Design Background
Computers and networks have become indispensable tools in our work, study and life. However, more and more middle school students are addicted to the Internet. We can often see shocking news that middle school students are addicted to the internet, stay out at night, commit crimes due to internet addiction, and even commit suicide by self-mutilation. Internet addiction has seriously endangered students' physical and mental health development and family happiness. When we are trying to help students prevent Internet addiction, should we remind students to pay attention to their words and deeds to prevent being cheated on the Internet? "Reject Internet addiction and surf the Internet safely" is the theme we are going to discuss today!
This class adopts the WEB teaching platform in the teaching process, and the location is set in the student computer room. The purpose is to demonstrate an idea that when the society develops continuously and students study in the classroom, they may reach the learning state of one person and one computer. Then how to carry out teaching work? Can we use computers to complete traditional paper tests, discussions and homework, and share teachers' teaching plans on the Internet so that students can study before and after class?
Second, the teaching objectives
1, let students know whether they have the tendency of internet addiction through the internet addiction self-test questions.
2. Through data and case analysis, let students know about Internet addiction and its harm.
3. Learn how to surf the Internet healthily and safely.
Third, the teaching process
1, Introduction: Internet addiction self-test.
2. Understand Internet addiction and reject it.
(1) What is Internet addiction?
(2) The harm of Internet addiction
3. Secure Internet access
(1) Be careful when making friends online.
(2) It is a crime to "hack" other people's computers.
(3) Anti-trap of online trading
(4) It is also illegal to spread rumors on the Internet.
4. Summary
(1) Discussion voting
(2) Summary
- Previous article:A joke about the Year of the Pig
- Next article:I feel dizzy. Why do people who know me know who I am when they look at my back?
- Related articles
- From falling in love to slapping each other, what happened to Kobe and O'Neal?
- A simple joke that satirizes life
- Darwin said that man evolved from monkeys. What did monkeys evolve from?
- Download the complete works of txt of "power in one's hand and in one's hand"
- Looking for Zhang Weijian¡¯s classic funny segment!
- Jokes about young people cutting their hair for the first month.
- Hardcore! Northeastern college students make ice sculptures of Ultraman Transformers. What unforgettable ice sculptures have you seen?
- How ridiculous it is to laugh at the world?
- When Charlie accepted the prize, the microphone automatically dropped. What was Charlie's expression at that time?
- Gu Ailing sent Valentine¡¯s Day greetings in between posts, and netizens¡¯ comments were hilarious. Is your boyfriend busier than Gu Ailing?