当前位置:网站首页>Key points and difficulties of the course "information content security" at Harbin Institute of Technology
Key points and difficulties of the course "information content security" at Harbin Institute of Technology
2022-07-01 23:34:00 【Wusu】
《 Information content security 》 Key points and difficulties of course knowledge
Chapter one summary
1. What are the subjects of network security threats ?
2. What is cyberspace ? What are the four elements of cyberspace ?
3.《 Network security law 》 Subject in 、 What are the main objects ? Try to list the basic responsibilities and obligations of each subject .
4. What is cyberspace ? What is Cyberspace Security ? What are the research directions of Cyberspace Security ?
5. The main content of the national network power strategy ? What are the main network security departments in our government ?
6. What is cyberspace sovereignty ? What are the basic principles ?( Independent, equal and autonomous jurisdiction )
7. What is information content security ?
8. What are the main threats to information content security ? What are the typical events ?
( Net anti-terrorism, anti-corruption, intellectual property rights, cults, anti secession, privacy protection )
9. Information content security technology mainly includes ?
10. What are the challenges faced by information content security technology ?( Large amount of data , High computational complexity , New network technology , Social contradictions are deep )
( What is the essential root of network and information security problems ?)
Chapter two Access to network information
1. What are the two types of ways to obtain network information ? Try to compare their main characteristics .
2.BPF What is the principle of catching packets ?
3. What is the main process of the passive packet capture program ?
4.IP What information does the first part mainly contain ? How to extract in packet analysis ?
5.TCP What information does the first part mainly contain ? How to extract in packet analysis ?
6. How to improve the performance of packet capture system in the environment of large traffic network ?
7. How to improve the ability of single machine to catch packets ? What core problems does zero copy packet capture mainly solve ?
8. What is the main idea of website information crawling ? Describe the information crawling algorithm of stand-alone Web pages with pseudo code .
9. Use multiple computers to crawl information from multiple websites , What are the core problems to be solved ? What are the main strategies ?
10. Describe the information crawling algorithm of multi machine single website with pseudo code .
11. This paper briefly introduces the composition of website information monitoring system based on active acquisition technology .
12. sketch Pagerank The main idea of the algorithm .
13. What are the search strategies for web crawling ? What kind of application scenarios are they suitable for ?
14. Try to compare the similarities and differences between active acquisition and passive acquisition .
( How to trace the source of illegal activities on the Internet ?)
The third chapter String matching algorithm
1. What are the classification and evaluation indicators of string matching algorithm ?
2. The main idea of string matching algorithm optimization ?
3. Try to compare the advantages and disadvantages of different string matching algorithms .
4.KMP The basic flow of the algorithm ? Be able to give solution steps for actual data .
5.BM The basic flow of the algorithm ?( Main data structure ) Be able to give solution steps for actual data .
6.AC The basic flow of the algorithm ?( Failure function ) Be able to give solution steps for actual data .
7.WM The basic flow of the algorithm ? Be able to give solution steps for actual data .
8. How to further optimize AC Algorithm ?( Memory space optimization )
9. How to further optimize WM Algorithm ?( Mode length sensitivity )
10. For tens of millions of pattern sets , How to optimize string matching algorithm ?
( Specific IP Address or URL A pattern set of addresses , How to optimize string matching algorithm ?)
Chapter four Text classification
1. Quantitative representation of text ? The main process of text classification system ?
2. What are the main classification methods ? Compare their advantages and disadvantages .
3. Classification method based on rule induction ? Be able to give solution steps for actual data .
4. Classification method based on decision tree (C4.5)? Be able to give solution steps for actual data .
5. Bayesian classification method ? Be able to give solution steps for actual data .
6.KNN classification method ? Be able to give solution steps for actual data .
7. When the sample set is updated frequently , Which classification method is more suitable ?
8. What are the main clustering methods ? What are the characteristics of each ?
9.K-Means Clustering method ?
10. Hierarchical clustering ? The main similarities and differences of clustering methods based on splitting and aggregation ?
The fifth chapter Information content security management
1.C/S And P2P The characteristics of the publishing methods ?
2.C/S In mode , How to respond to ?
3.P2P Typical architecture of network ?
4.P2P In mode , How to respond to ?
5. Main privacy protection methods ?
6. Location privacy protection method ?
Reference materials :
《 Network security development kit details 》
《 Flexible string matching algorithm 》
《 Text mining 》
《P2P Network measurement and analysis 》
边栏推荐
- Paramètres communs de matplotlib
- TS初次使用、ts类型
- 安全协议重点
- JS - use of arguments
- 每日三题 6.29
- Redis AOF日志
- 2021 robocom world robot developer competition - preliminary competition of undergraduate group
- Typescript enumeration
- [untitled]
- 2022 crane driver (limited to bridge crane) examination questions and simulation examination
猜你喜欢

Material Design组件 - 使用BottomSheet展现扩展内容(一)
![[micro service sentinel] sentinel integrates openfeign](/img/8b/46156255fd980eb422c7e05d5af7ee.png)
[micro service sentinel] sentinel integrates openfeign

Redis数据类型和应用场景

2022 safety officer-c certificate examination question simulation examination question bank and simulation examination

安全协议重点

边缘计算概述

Why is PHP called hypertext preprocessor

物联网现状及未来发展趋势

深度学习 | 三个概念:Epoch, Batch, Iteration

STM32F030F4驱动TIM1637数码管芯片
随机推荐
PostgreSQL source code (58) tuple splicing heap_ form_ Tuple analysis
What are the common types of points mall games?
ConcurrentSkipListMap——跳表原理
Practical application and extension of plain framework
Applet form verification encapsulation
What is the relationship between modeling and later film and television?
Yunxin small class | common cognitive misunderstandings in IM and audio and video
神经网络物联网的未来趋势与发展
写给当前及未来博士研究生一些建议整理分享
边缘计算概述
认识--Matplotlib
云信小课堂 | IM及音视频中常见的认知误区
What is the difference between memory leak and memory overflow?
Who do you want to know when opening a stock account? Is it safe to open an account online?
The third part of the construction of the defense system of offensive and defensive exercises is the establishment of a practical security system
哈工大《信息内容安全》课程知识要点和难点
Leetcode(34)——在排序数组中查找元素的第一个和最后一个位置
[micro service sentinel] sentinelresourceaspect details
De PIP. Interne. CLI. Main Import main modulenotfounderror: No module named 'PIP'
Paramètres communs de matplotlib