首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
针对社会信息化发展所带来的信息安全问题,分析了信息安全学科的特点、信息安全专业和学科发展和现状、信息安全学科专业及其教育的地位和作用。提出了淮阴工学院信息安全专业方向培养知识体系,体现信息安全是计算机和数学为基础的交叉学科特点,提出了淮阴工学院信息安全专业方向的教学实践的成绩和不足之处。  相似文献   

2.
针对社会信息化发展所带来的信息安全问题,分析了信息安全学科的特点、信息安全专业和学科发展和现状、信息安全学科专业及其教育的地位和作用。提出了淮阴工学院信息安全专业方向培养知识体系,体现信息安全是计算机和数学为基础的交叉学科特点.提出了淮阴工学院信息安全专业方向的教学实践的成绩和不足之处。  相似文献   

3.
信息安全是一门涉及多种学科的国家重点发展的新兴学科,社会对信息安全专业人才的需求日益增加,增强学生的实践动手能力已经迫在眉睫。该文通过对信息安全实践教学的研究,构建了信息安全专业实践教学体系,并提出信息安全实践教学系统的五大模块及其具体内容。  相似文献   

4.
为推动国家信息安全事业的健康发展,满足国家和社会对信息安全人才日益增长的需求,缓解我国信息安全专业人才需求与供给之间的矛盾,中国信息安全产品测评认证中心于2002年启动了“注册信息安全专业人员”(CISP)资质认证这一信息安全专业人才培训项目。“注册信息安全专业人员”  相似文献   

5.
本科信息安全专业建设的实践与探索   总被引:2,自引:1,他引:1  
本文分析了信息安全专业建设的现状和存在的问题,并根据我校该专业建设的实践提出了相关建议,对信息安全学科建设具有一定的指导作用。  相似文献   

6.
针对信息安全专业的《近世代数》教学,分析信息安全专业学生与数学专业学生在《近世代数》学习上存在的差异性,并因此提出如何调整《近世代数》的教学内容使其更适合信息安全专业学生的学习,探讨针对信息安全专业《近世代数》学习的教学方法改革,从而提高信息安全专业学生学习《近世代数》的积极性和效果。  相似文献   

7.
《中国信息化》2013,(15):53-53
为深入贯彻落实党的十八大精神和国家教育发展规划纲要,加强对高等学校信息安全专业教学改革的研究、咨询、指导和评估,进一步促进信息安全人才培养,新一届(2013—2017)教育部高等学校信息安全专业教学指导委员会(简称信息安全教指委)日前在北京宣布成立。  相似文献   

8.
关于《信息安全概论》教材建设的两点思考   总被引:1,自引:1,他引:0  
陈泽茂 《计算机教育》2008,(19):148-151
本文针对当前高校《信息安全概论》课程教学中存在的教学缺乏针对性、内容失衡等问题,提出将该课程的教学对象划分为信息安全专业、非信息安全的信息技术专业和其他专业三类,并对如何根据不同教学对象的特点和需求分别确立教学目标、教学内容给出了建议。  相似文献   

9.
信息安全专业课程体系设置的探讨   总被引:1,自引:1,他引:0  
王练  陈龙 《计算机教育》2009,(24):108-110
本文调研国内外信息安全专业教学情况与课程设置情况,并重点介绍国外知名大学信息安全培养方案的特点以及已有的参考课程模型。分析国内信息安全专业设置的特点并与国外进行简单比较。针对已有课程设置的特点和不足,并结合重庆邮电大学信息安全专业建设实际情况,提出关于信息安全专业课程设置的设想。  相似文献   

10.
信息安全实训实践教学平台建设   总被引:2,自引:2,他引:0  
文章在分析信息安全专业实践教学的发展现状与存在问题的基础上,阐述武汉大学计算机学院在"三创"教育理念指导下创建基础实验平台、综合实训平台、开放性研究平台三个层次的金字塔型信息安全综合实训实践教学平台的过程,提出针对信息安全专业领域的实践教学改革创新思路与措施。  相似文献   

11.
信息安全实训室建设可以分为三个层次,一是面向课程,二是面向专业,三是面向社会服务。按面向社会服务的建设要求,提出了基于职业分析的信息安全实训室设计思路,并对信息安全实训室设计方案进行了详细的介绍,对关键技术进行了详细分析。该设计方案已应用于我院的信息安全实训室建设。  相似文献   

12.
随着网络的普及和发展,信息的安全问题日益突出,使得加强信息安全学科、专业和培训机构体系化建设刻不容缓。信息安全人才的培养需要从培养目标、专业定位、理论教学、实践教学和实验室建设等各个方面综合考虑,制定合理可行的信息安全人才培养模式。  相似文献   

13.
Knowledge sharing is an important component of knowledge management systems. Security knowledge sharing substantially reduces risk and investment in information security. Despite the importance of information security, little research based on knowledge sharing has focused on the security profession. Therefore, this study analyses key factors, containing attitude, self-efficacy, trust, norm of reciprocity, and shared language, in respect of the information security workers intention to share knowledge. Information security professionals in virtual communities, including the Information Security Professional Association (ISPA), Information Systems Security Association (ISSA), Society of Information Risk Analysts (SIRA), and LinkedIn security groups, were surveyed to test the proposed research model. Confirmatory factor analysis (CFA) and the structural equation modelling (SEM) technique were used to analyse the data and evaluate the research model. The results showed that the research model fit the data well and the structural model suggests a strong relationship between attitude, trust, and norms of reciprocity to knowledge sharing intention. Hypotheses regarding the influence of self-efficacy and reciprocity, to knowledge sharing attitude were upheld. Shared language did not influence either the attitude or intention to share knowledge.  相似文献   

14.
根据当前企业对网络安全人才的需求,结合我校网络安全课程教学中存在的主要问题,文章分别从课堂教学、实践教学、完善教学资源以及培养创新型技能人才等几方面,探讨了如何加强学生网络安全课程的职业能力培养。  相似文献   

15.
Organizational insiders have considerable influence on the effectiveness of information security efforts. However, most research conducted in this area fails to examine what these individuals believe about organizational security efforts. To help bridge this gap, this study assesses the mindset of insiders regarding their relationship with information security efforts and compares it against the mindset of information security professionals. Interviews were conducted with 22 ordinary insiders and 11 information security professionals, an effort that provides insight into how insiders gauge the efficacy of recommended responses to information security threats. Several key differences between insiders’ and professionals’ security mindsets are also discussed.  相似文献   

16.
计算机专业人员的信息伦理和职业道德素养是信息社会和谐健康发展的重要因素,高校在计算机人才信息伦理素养的培养中起着关键作用,因此在高校计算机专业学生中开展信息论理教育具有重大意义。文章在实践基础上分析信息论理和职业道德教育的目标和内涵,探讨其教育内容、实施途径和方法,并初步研究了其教学评价方法,希望引起对信息伦理专业教育的广泛重视。  相似文献   

17.
信息安全是个综合性学科,涉及计算机科学、通信技术、编码学、信息论等多个领域,甚至和管理学、社会学和心理学等方面都有着千丝万缕的联系,所以对信息安全人才的培养应该是一个复杂的系统工程。本文提出基于项目管理的《信息安全概论》教学模式,培养与本专业领域紧密结合、符合社会发展和市场需求的高技能型应用型人才。  相似文献   

18.
It is well known that software errors may lead to information security vulnerabilities, the breach of which can have considerable negative impacts for organizations. Studies have found that a large percentage of security defects in e-business applications are due to design-related flaws, which could be detected and corrected during applications development. Traditional methods of managing software application vulnerabilities have often been ad hoc and inadequate. A recent approach that promises to be more effective is to incorporate security requirements as part of the application development cycle. However, there is limited practice of secure development of applications (SDA) and lack of research investigating the phenomenon.Motivated by such concerns, the goal of this research is to investigate the factors that may influence the intention of information systems (IS) professionals to practise SDA, i.e., incorporate security as part of the application development lifecycle. This study develops two models based on the widely used theory of planned behaviour (TPB) and theory of reasoned action (TRA) to explain the phenomenon. Following model operationalization, a field survey of 184 IS professionals was conducted to empirically compare the explanatory power of the TPB-based model versus the TRA-based model.Consistent with TPB and TRA predictions, attitude and subjective norm were found to significantly impact intention to practise SDA for the overall survey sample. Attitude was in turn determined by product usefulness and career usefulness of SDA, while subjective norm was determined by interpersonal influence, but not by external influence. Contrary to TPB predictions, perceived behavioural controls, conceptualized in terms of self-efficacy and facilitating conditions, had no significant effect on intention to practise SDA. Thus, a modified TRA-based model was found to offer the best explanation of behavioural intention to practise SDA. Implications for research and information security practice are suggested.  相似文献   

19.
Risk analysis is the predominant technique used by information security professionals to establish the feasibility of information systems controls. Yet it fails an essential test of scientific method—it lacks statistical rigour and is subject to social misuse. Adoption of alternatives from other disciplines, however, proves even more implausible. Indeed, even improved rigour in risk analysis may limit its usefulness. Perhaps risk analysis is misconceived: its ostensible value as a predictive technique is less relevant than its value as an effective communications link between the security and management professionals who must make decisions concerning capital investments in information systems security.  相似文献   

20.
IS professionals can only dream of the days when technical brilliance alone was enough to ensure a successful career. Now business acumen and a strong understanding of customer expectations are vital to long-term career survival. Based on their study of 75 experienced IS professionals, the authors present guidelines for fostering the development of customer-oriented IS professionals.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号