
L. ZHU ET AL.
and vision, improve the quality of teaching, and finally provide
good conditions for cultivating innovative information security
talents in universities and colleges.
Current Status & Construction Target
With the development of the network and information tech-
nology, information security has become the key information
technology of 21st Century. Therefore, the ministry of educa-
tion has established information security professionals from
2000. Currently, there are more than sixty colleges to start the
information security major as well as the higher vocational
colleges. Domestic universities such as Wuhan University, Bei-
jing University of Posts and Telecommunications, Shanghai
Jiao Tong University have set information security major early
and constructed large-scale labs of information security. In
addition, each university or college who has opened informa-
tion security major, combined with their own characteristics,
put forward the suitable construction ideas for the laboratory
construction; however, there are still some limitations and defi-
ciencies.
Firstly, Many network and information security laboratories
are reconstructed from the original network engineering labs,
which are lacking special security experimental equipments and
unable to complete professional experimental courses.
Secondly, at the beginning of the construction, only the sim-
ple experimental teaching process is considered, which leads to
the students’ little knowledge about the experiments. Besides
that, because of the lack of communication between the stu-
dents and the teachers, students learn passively, and the inspira-
tion of innovative consciousness that the teachers give to the
students is not enough. This will affect the students’ ability to
solve problems independently
Thirdly, the laboratory of Information security serves for a
single object without its own hardware advantages, which can’t
provide the requirements of local extended service and scien-
tific research requirement of the teachers.
Therefore, building a network and information security labo-
ratory combined with scientific research, teaching and service
will play an important role in the development of information
security technology as well as the training. It also provides
security evaluation, authentication and extension services for
local governments, institutions and enterprises.
Function Requirements for Information Security
Laboratory
On the one hand, we should pay attention to the related fore-
front research, intensive technologies and hot application in
information security field; on the other hand, it is needed to
build information security engineering practice environment to
cultivate comprehensive information security talents. Engineer-
ing application of information security is strong; therefore, we
should focus on authenticity of the experimental environment
and design comprehensive experiments to cultivate security
sense of the students (Aboutab, 2006). The following three
aspects of services are supported by the lab:
Firstly, it is research-oriented. It will provide good experi-
mental environment for scientific research and validation in-
cluding the basic theory, security frame, security mechanisms,
security technologies and other aspects.
Secondly, it is teaching-oriented. The lab will help the stu-
dents to improve their practice activity. In the information se-
curity laboratory, the students could carry out security experi-
ments in different levels and different directions.
Thirdly, it will support extension services. It will support so-
cialization training services for information security majors.
The two talents cultivation modes including “school education”
and “vocational training” need to be combined; the two modes
of “teaching in class” and the “online learning” also need to be
combined. It also provides multi-level training and certification
mechanisms of universal and specific complementary levels; it
also supports safety training services and products promotion.
Through the combination with well-known security vendors, it
provides training and certification of security products to meet
the needs of enterprise users; it also supports testing function
for network devices and security devices; it supports testing and
validation services for large network, and also it provides secu-
rity test and eva luation on the c ommercia l n e tw o rk.
Requirements for Network and Information
Security Laboratory
The construction of information security lab involves many
new technologies. As a fully functional network security lab, it
is able to simulate real environment as much as possible. At the
same time, we should deduce the cost of devices to achieve
high-yield with low-input. The lab will provide the students
with the same work environment as they work after graduation.
Based on the above considerations, the following principles
(O’Leary, 2006) should be confirmed:
1) Practical, easy to use and apply.
The security devices used in lab should have strong practica-
bility. We should adopt mainstream security devices and soft-
ware in the market, combine with the mainstream command
line configuration so that the students can experience and learn
a variety of network attack and defense techniques in real work
environment, which guarantees that what skills they have
learned can be fully applied in the work after they graduated.
Besides that, the convenience of teaching in the lab needs to be
taken into full consideration. It should be easy to use for the
teachers and students. The opening management system is
adopted for unified management. The system provides different
users including students, teachers and administrators access to
the lab by the network, which makes it possible that the users
can do experiments remotely. This will improve the utilization
rate of the lab, and the teachers and students can carry out ex-
periments and communicate in their spare time.
2) The technology should be advanced, function of the lab
should be comprehensive and devices should be compatible and
scalable.
Firstly, with the rapid development of the network security
technologies, the equipments and management systems in the
lab should be updated timely to adapt to the development of the
technologies. So, the lab should have good compatibility and
scalability at the beginning of lab construction. When the new
technologies appear, the hardware and software can be up-
graded, and the new equipments can be used in the laboratory.
The lab will provide devices including firewall, IDS/IPS, VPN,
anti-virus, anti-spyware, high security, hacking, encryption and
decryption, and other security devices and software etc, which
will provide a more comprehensive network security learning
platform for us.
Secondly, the network information security technologies are
Copyright © 2012 SciRe s . 407