Joke Collection Website - News headlines - Three Lesson Plans for Network Security Education Theme Class Meetings
Three Lesson Plans for Network Security Education Theme Class Meetings
Part 1
1. Design background
Computers and networks have become indispensable tools for our work, study and life. However, more and more middle school students are addicted to the Internet. We often see shocking news about middle school students who are addicted to the Internet and stay up all night, commit crimes due to Internet addiction, and even commit suicide. Internet addiction seriously harms the healthy development of students' physical and mental health and the happiness of their families. While we are working hard to help students prevent Internet addiction, should we remind students to pay attention to their words and deeds when surfing the Internet, and pay attention to safety issues such as being deceived? " "Reject Internet addiction and surf the Internet safely" is the topic we are going to discuss today!
This lesson uses a WEB teaching platform in the teaching process and sets the location in the student computer room. The purpose is to demonstrate a The idea is that when society continues to develop and students study in class, they may reach the learning conditions of one mobile phone per person, so how can we carry out teaching work by then? Can we combine traditional paper-based tests, discussions and homework All submissions are completed using computers, and the teacher's teaching plans are shared on the Internet so that students can learn before and after class?
2. Teaching objectives
1. Through Internet addiction self-test questions, let students understand whether they have Internet addiction tendencies.
2. Let students understand Internet addiction and its dangers through data and case analysis
3. Learn how to use the Internet healthily and safely
3. Teaching Process
1. Introduction: Internet addiction self-test questions
2. Understand Internet addiction and reject Internet addiction
(1) What is Internet addiction
p>(2) The dangers of Internet addiction
3. Safe use of the Internet
(1) Be cautious when making friends online
(2) "Black" Computers are a crime
(3) Avoid traps in online transactions
(4) Online rumors are also illegal
4. Summary
( 1) Discussion and voting
(2) Summary
Part 2
Purpose of class meeting:
Let students clearly understand the importance of online Learn to protect your own interests in the virtual online world due to various unsafe hidden dangers; treat all kinds of temptations rationally and resist the erosion of bad thoughts; pay special attention not to be addicted to online games and sound the alarm with bloody facts.
Overall process:
1. Everyone expresses their opinions on the problems encountered in the network.
2. Look at cases and materials and talk about your feelings.
3. The class teacher summarizes.
Detailed process
A and B: Hello, classmates! The theme of this class meeting is "Network Security Education."
Moderator A: I believe that students all know a lot about the Internet, but how much do they know about network security issues? Why don’t we listen to Li Zhao ask a few questions about network security first!
p>1. Speak freely
Moderator B: The following problems are encountered by students while surfing the Internet. How did you deal with them and why? Please speak freely. .
(1) Do you use the Internet in a controlled manner? How do you arrange your time? What do you usually do?
(2) Have you protected your Internet password and personal information? ?
(3) Will you provide your name, home address, school name or phone number, photos, etc. to chat rooms or public *** discussion areas?
(4) Will you accept documents and other information from people you don’t know? Why?
(5) How will you deal with negative information such as hints, provocations, threats, etc.?
(6) What attitude will you take towards websites that publish harmful information, unhealthy chat rooms and unhealthy pages?
(7) Some people use the excuse of giving money or gifts or meeting, etc. What would you do when asked to make an appointment or visit?
Moderator A: It seems that students have a relatively comprehensive understanding of network security and can rationally control themselves from being eroded by bad thoughts. .
It is said that the current negative impact of China's Internet mainly has the following three aspects: First, domestic and foreign hostile forces publish a large amount of reactionary, inflammatory, pornographic, violent and vulgar content on the Internet. Cause serious adverse effects on the physical and mental health of minors. Secondly, many criminals use the platforms provided by websites and Internet cafes to target minors who have weak self-control and use the opportunity of online chatting to find targets to commit fraud, robbery, rape and other criminal activities, thereby protecting the personal safety of minors. pose a direct threat.
(8)Have you ever been to an Internet cafe to surf the Internet? Or even play games?
(9)Do you play online games? What type is it? Can you imitate the characters in the game? Language and actions? Do your classmates imitate or even talk about it often?
(10) If you have classmates or relatives and friends who are addicted to online games, can you talk about their performance?< /p>
Moderator A:: Being addicted to the Internet and even online games not only affects our study and mental health, but may also lead us astray. Imitate language or actions in the game, causing tragedy.
2. Look at cases and materials and talk about your feelings
Moderator A: On March 7, students from a primary school in Ronggui, Shunde imitated the characters in online games during recess. Fight scene. Classmates Xiao Peng and Xiao Gong each played hostile characters in a popular online game. During the "battle", Xiao Gong accidentally stabbed Xiao Peng to death with a switchblade.
Students freely express their opinions: Why did such a tragedy happen? What do you think of it? What would you ask of yourself?
Moderator B: Of course the occurrence of this tragedy was not Accidental. Behind it is a huge army of young people playing online games. According to the latest statistics, there are currently about XX million online gaming teenagers in China, 2.6 million of whom are online gaming addicts. Previously, Shanghai Youth Internet Addiction Survey results showed that the overall incidence rate of Internet addiction among teenagers in the city was 14.2%. "Internet addiction" has become an inducement for these teenagers to intensify family conflicts and participate in illegal crimes.
Internet addiction: It can cause autonomic nervous disorder, imbalance of hormone levels in the body, reduced immune function, cardiovascular disease, gastrointestinal neurosis, tension headaches, anxiety, depression, etc., and can even lead to resulting in death.
3. Summary of the class teacher
The Internet has provided us with rich information resources and created wonderful entertainment time and space. It has become an important platform for students to learn knowledge, exchange ideas, and have leisure and entertainment, and it has enhanced communication and exchanges with the outside world. However, the Internet is like a double-edged sword, and some of the bad content can easily cause harm to students, posing great security risks. . In this class meeting, we exchanged and discussed everything from the time arrangement for surfing the Internet, to selectively browsing information on the Internet, to taking self-protection measures for various situations in the virtual network, and finally to the correct understanding of online games. The purpose It is to let students clearly understand the importance of network security, learn to deal with various temptations rationally, and thus make better use of the Internet to promote the progress of our learning.
Part 3
Teaching objectives:
1. Understand students’ network security awareness and level
2. Let students learn from the overall situation Grasp the concept of network and have a general understanding
Teaching process:
Pre-class introduction: With the advent of the information age, more and more people have separated from their usual study, work and life. If the computer network is not turned on, various network security problems will arise. Some people use the Internet to work and study, but there are always some people who destroy the network just to make money and show their computer skills, which greatly affects their daily work. Through studying this course, I hope that students can have an overall understanding of network security, and have a more detailed grasp of aspects such as Trojan detection, hacking techniques, computer network viruses, vulnerability inspection and prevention, etc., through theory and practical operations. Combined with the use of some commonly used security software, students can systematically learn network security-related knowledge from shallow to deep under the guidance of teachers.
1. Learning requirements and methods
1. This course does not have suitable teaching materials. I hope everyone can take notes frequently, combine online teaching plans, and listen to the lectures and review carefully.
2. In addition to listening carefully in class, this course also relies on everyone's consciousness to view and study relevant materials through various channels, and to take notes frequently with hands and brains in order to solve similar problems in the future.
3. Conduct some communication and discussion meetings in a timely manner to share what everyone has gained over a period of time.
II. Overview of network security
1. Students will use group discussions to understand students’ understanding, interest and mastery of network security.
Divide students into two groups to discuss Trojan horses and the recently popular "Panda Burning Incense" virus on the Internet for about 10 minutes, and then select a representative from each group to speak. The teacher makes a summary based on the situation.
2. The teacher gave everyone a more accurate understanding of Trojan horses and viruses such as "Panda Burning Incense" through summary.
Trojan horse: "Trojan horse" program is a relatively popular virus file at present. Unlike ordinary viruses, it does not reproduce itself, nor does it "deliberately" infect other files. It disguises itself as a virus. It attracts users to download and execute, and provides the Trojans with a portal to open the victim's computer, so that the Trojan can destroy and steal the victim's files at will, and even remotely control the victim's computer.
"Panda Burning Incense" virus: At the end of 2006, the "Panda Burning Incense" virus and its variants broke out on a large scale on the Internet in my country. The virus spread through a variety of ways and changed all infected program files to Panda. It looks like holding three incense sticks. At the same time, the virus also has the function of stealing users' game accounts and QQ accounts.
This is a super powerful virus. A computer infected with the virus will attach the virus to all webpage files on the hard drive. If the computer that is infected is a website, the virus may be attached to all web pages of the website through the poisoned web page, and netizens will be infected with the virus when they visit the poisoned website. "Panda Burning Incense" has infected portals such as Tianya Community. In addition to having all the characteristics of a virus, "Panda Burning Incense" also has a strong commercial purpose: it can secretly steal users' game accounts and QQ accounts for sale for profit, and it can also control infected computers and turn them into "cyber zombies" ", secretly visit some pay-per-visit websites to make a profit. Some variants also contain account-stealing Trojans.
The concept of network security: Information security refers to the protection of the confidentiality, integrity and availability of information, that is, data-oriented security. After the emergence of the Internet, in addition to the above concepts, the connotation of information security has expanded to user-oriented security. Generally speaking, network security includes six aspects of threats: physical security threats, operating system security flaws, network protocol security flaws, application software implementation flaws, user flaws and malicious programs.
3. Network security examples
Security vulnerabilities Theoretically speaking, security vulnerabilities are unexpected functional branches in software. Through security vulnerabilities, the software can be made to do what the software designer intended. Unexpected things.
1. Example: "Alipay" The original design function of the Alipay control is to encrypt communications and protect users' communication security. However, due to security vulnerabilities, it can also be exploited to perform any function, such as running a stolen Bank account trojan. If a Trojan horse wants to run on the user's computer, one of the main means is to exploit security vulnerabilities. The most exploited ones at present are various IE control vulnerabilities. On February 8, 2007, Alipay upgraded its control and fixed the above-mentioned loopholes. As long as you install the loophole control, whether you use Alipay or not, or log in to Alipay, you will be threatened by the loophole. Because any web page can call this control by placing special code. But using the Alipay service itself is not dangerous - because the Alipay website itself does not contain such malicious code.
2. How to prevent Trojans and viruses
The main working principle of all anti-virus software at present is based on feature recognition. What is feature recognition? In layman's terms, it means to have a roster of bad guys and find them based on the roster. If the virus or Trojan has just been written and has no "criminal record" and is not on the roster, the anti-virus software will not be able to identify it. Although some anti-virus software has advanced identification functions that do not rely on rosters, this function is not reliable. What's more, today's virus and Trojan authors, after writing the program, will first test it with anti-virus software to confirm that it will not be detected before releasing it. So wouldn’t anti-virus software be useless? No.
Various anti-virus software can help you solve most of your troubles, but you cannot rely on it to be reliable.
IV. Understanding Hackers
Hackers are an industry that only a very few people can enter. Every hacker has a cruel youth, and most people are interested in computer assembly language. They are all in the first or second grade of middle school or college, and then they have to spend a lot of time on basic learning to advance to the advanced level of hackers. Most people find it difficult to overcome this challenge and choose to give up. Hacking is also an industry that only young people can engage in. Among Chinese hackers, the older generation of hackers who call themselves elderly are only 30 years old, while the new generation may not be 20 years old.
"Trojan horse program" technology is a common attack method used by hackers. It hides a program in your computer system that will run when Windows starts, and uses a server/client operating method to achieve the purpose of controlling your computer while surfing the Internet. Hackers use it to steal your passwords, browse your drives, modify your files, log into your registry, and more.
In addition, hackers often exploit system vulnerabilities to carry out destructive attacks. These will be slowly learned with everyone in future teaching.
5. Summary
This class mainly gives students an overall understanding of network security through examples around them. In the future teaching, hackers, Trojans, and security vulnerabilities will be discussed. , computer viruses, etc. for further study. I hope everyone can cooperate well and lay a good foundation for future work and study!
- Previous article:Any information about crossing the Jinsha River skillfully?
- Next article:What is the major of agricultural economics?
- Related articles
- Simple drawings of publicity posters with serving chopsticks and serving spoons - A complete collection of hand-written posters and pictures of practicing the action of serving serving chopsticks and
- Epidemic prevention work in Degui Town
- Breathe freely, Rongcheng is a very popular slogan
- Armed Police Ji 'nan Corps Hospital Expert Group
- Why is Lhasa, Tibet called "Little Sichuan"?
- "Double Reduction" Policy: Provide a stronger guarantee for children to reduce their burden
- Marry an air force officer, okay?
- Suitable for children to pay New Year greetings to their brother who is a soldier.
- Warm reminders for serving chopsticks
- Rural bride price jingle _20 17 wedding bride price jingle