Portable network security attack and defense target range teaching device and use method thereof

A network security and teaching device technology, applied in the field of intelligent computer design, can solve problems such as error-prone, learners can't intuitively feel the importance of network security, the danger of network attack, and not obvious, so as to achieve the effect of improving the effect

Pending Publication Date: 2020-05-05
XIAN THERMAL POWER RES INST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The construction and demonstration of the traditional network security attack and defense range requires the configuration of multiple sets of virtual machine operating environments, and the deployment of Windows, Linux and other operating systems; the need to build middleware such as IIS, Weblogic, and Apache to support the operation of the attack and defense test platform; DVWA, SQLolSQLol, BodgeItBodgeIt, XSSeducationXSSeducation and other attack and defense test platforms are used for attack experiments and effect demonstrations... The entire construction and demonstration process involves the installation, configuration and debugging of various databases, middleware, websites, systems and tool software, and construction personnel are required With professional network security knowledge and technology, there are problems such as complicated installation, long configuration time, strong dependence on professionals, and error-prone, which also puts forward high professional requirements for the personnel who carry out network security offensive and defensive shooting range teaching , it is difficult for ordinary primary and secondary schools, enterprises and institutions to meet these requirements, resulting in traditional primary and secondary schools, enterprises and institutions' network security knowledge training and teaching work are often based on data training, and learners cannot intuitively feel the harmfulness of cyber attacks and the importance of network security, the training effect is not intuitive and obvious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portable network security attack and defense target range teaching device and use method thereof
  • Portable network security attack and defense target range teaching device and use method thereof
  • Portable network security attack and defense target range teaching device and use method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0019] Such as figure 1 , figure 2 As shown, a portable network security attack and defense shooting range teaching device of the present invention includes a display 1, a computer host 3 connected to the display 1 through a connecting shaft, a power switch 2 arranged on the outer surface of the computer host 3, and an attack type LED display 4, attack command LED display screen 5, operation type input button panel 6, attack command input button panel 8 and start button 10, the operation type input button 7 arranged on the operation type input button panel 6 and attack command input button panel 8 respectively And the attack command input button 9, the operation type input button 7 includes eight attack type numeric buttons and a confirmation button, and the attack command input button 9 includes nine attack command numeric buttons and a confirmation button;

[0020] It also includes an operation type instruction translation module 11, an attack instruction translation modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a portable network security attack and defense target range teaching device and a use method thereof. The device comprises a computer host, wherein a power switch, a display, an attack type LED display screen, an attack command LED display screen, an operation type input button panel, an attack command input button panel and a start button are arranged on the outer surfaceof the computer host, and an operation command translation module, an attack command translation module and an action execution module are arranged in the computer host. A user controls the number button combination of the operation type input panel; a network attack type needing to be demonstrated is determined, an attack command needing to be executed is determined by controlling a digital button of the attack instruction input panel, a start button is pressed after determining that the current attack type and attack instruction information are correct on an LED display screen, and demonstration teaching contents of attacks can be demonstrated on a display. According to the invention, the requirements of network security teaching work on software and hardware environments and trainee quality are reduced, and the teaching and training effects are improved.

Description

technical field [0001] The invention belongs to the technical field of intelligent computer design, and in particular relates to a portable teaching device and a using method which can demonstrate network security shooting range attack behavior by controlling the combination of input buttons. Background technique [0002] The construction and demonstration of the traditional network security attack and defense range requires the configuration of multiple sets of virtual machine operating environments, and the deployment of Windows, Linux and other operating systems; the need to build middleware such as IIS, Weblogic, and Apache to support the operation of the attack and defense test platform; DVWA, SQLolSQLol, BodgeItBodgeIt, XSSeducationXSSeducation and other attack and defense test platforms are used for attack experiments and effect demonstrations... The entire construction and demonstration process involves the installation, configuration and debugging of various database...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G09B9/00
CPCG09B9/00
Inventor 毕玉冰杨新民杨东高海东胡波崔逸群王文庆刘超飞董夏昕
Owner XIAN THERMAL POWER RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products