Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security teaching method, system and device and readable storage medium

A network security and teaching system technology, applied in the field of information security monitoring, can solve problems such as Weibo social account leakage, instant messaging software account password theft, interception and tampering, etc.

Pending Publication Date: 2021-04-23
中孚安全技术有限公司 +3
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Since the beginning of the 21st century, with the rapid rise of Internet technology, the network has penetrated into all aspects of life. Today, with the explosive growth of various information in society, the way of socializing and working online has filled people's daily life, and in While it brings us high efficiency and convenience, the security of data transmission has become the biggest hidden danger
[0003] At present, data leakage cases are not uncommon, such as Weibo social account leaks, which often spread wanton speech that endangers society, accounts and passwords of instant messaging software such as WeChat QQ are stolen, and confidential information caused by work emails is leaked or even intercepted and tampered with. , enterprises, and even the country have brought many troubles

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security teaching method, system and device and readable storage medium
  • Network security teaching method, system and device and readable storage medium
  • Network security teaching method, system and device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] The present invention provides a network security teaching system, such as Figure 1 to Figure 4 As shown, it includes: interface operation module 1, monitoring module 2 and analysis processing module 3;

[0045] The interface operation module 1 is used to provide a teaching operation interface for users to input control commands and display monitoring process data and results;

[0046] The interface operation module 1 is configured with a monitored ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security teaching method, system and device and a readable storage medium. The method comprises the following steps: selecting a monitored network card; calling a monitoring module to intercept and capture the network data packet received by the monitored network card; analyzing and processing the network data packet; and cracking and displaying the data information of the network data packet. According to the invention, a basic network monitoring capture mode can be realized, and basic network packet capture analysis functions such as network data packet capture, packet capture file storage, network protocol filtering, protocol analysis, data query, flow statistical analysis and the like of coming and going mail data are realized, so account passwords and text attachment information of coming and going mails are completely cracked, and a practical teaching effect is achieved. Moreover, data leakage is truly restored through the technology, and the teaching system is used for explaining the diversity of data information stealing means.

Description

technical field [0001] The invention relates to the field of information security monitoring, in particular to a network security teaching method, system, equipment and readable storage medium. Background technique [0002] Since the beginning of the 21st century, with the rapid rise of Internet technology, the network has penetrated into all aspects of life. Today, with the explosive growth of various information in society, the way of socializing and working online has filled people's daily life, and in While it brings us high efficiency and convenience, the security of data transmission has become the biggest hidden danger. [0003] At present, data leakage cases are not uncommon, such as Weibo social account leaks, which often spread wanton speech that endangers society, accounts and passwords of instant messaging software such as WeChat QQ are stolen, and confidential information caused by work emails is leaked or even intercepted and tampered with. , enterprises, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06Q50/20
CPCH04L63/306H04L63/20G06Q50/20
Inventor 刘胜平曲志峰段文芳宋威苗功勋
Owner 中孚安全技术有限公司