國內(nèi)外信息安全學科發(fā)展_第1頁
國內(nèi)外信息安全學科發(fā)展_第2頁
國內(nèi)外信息安全學科發(fā)展_第3頁
國內(nèi)外信息安全學科發(fā)展_第4頁
國內(nèi)外信息安全學科發(fā)展_第5頁
已閱讀5頁,還剩45頁未讀 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領

文檔簡介

國外信息安全教學情況調(diào)研哈爾濱工業(yè)大學張宏莉2007.11.17報告提綱引言國外信息安全相關課程設置情況總體情況有代表性的大學辦學特點國外信息安全知識體系相關情況NSTISSI(NationalSecurityTelecommunicationsandInformationSystemSecurityI)ISC(2)的信息安全共同知識體系CBK引言2002年設立信息安全專業(yè)的課程調(diào)研2004年清華大學出版社信息安全知識點總結2007年教指委信息安全教學規(guī)范調(diào)研方式:INTERNET調(diào)研范圍:美英等知名高校20余所所發(fā)布的相關課程教學大綱、教學內(nèi)容等調(diào)研范圍PurdueUniversityCornellUniversityStanfordUniversityMITCMUOxfordUniversityNewYorkUniversityRiceUniversityFloridaStateUniversityPrincetonUniversityUCDavisUniversityofLondonGeorgeMasonUniversityOslouniversity,NorwayFloridaAtlanticUniversityGeorgiaInstituteofTechnpologyPortlandStateUniversity等學校

報告提綱引言國外信息安全相關課程設置情況總體情況有代表性的大學國外信息安全知識體系相關情況NSTISSI(NationalSecurityTelecommunicationsandInformationSystemSecurityI)ISC(2)的信息安全共同知識體系CBK辦學特點總體情況:1995年,美國國家安全局NationalSecurityAgency委任CMU成立信息安全學術人才中心,提高高校信息安全人才培養(yǎng)能力至2003年9月,有50多所教育機構被認定為這種中心,包括44所高等院校和4所國防院校,如CMU,GeogiaInstituteofTechnology,FlaridaStateUniversity,PurdueUniversity,GeorgeMasonUniversity4所學校設立信息安全專業(yè)本科專業(yè),13所學校設立以信息安全為主的本科專業(yè);在10所學校設立信息安全碩士專業(yè),30所學校設立信息安全研究方向;半數(shù)以上學校開設課程與NSTISSI的CNSS4011水平相當,20所學校開展了NSTISSI的CNSS4011-4-15認證有代表性的大學Purdueuniversity:信息安全滲透到很多已有學科UniversityofLondon:10門課程,PROJECTFloridaStateUniversity:始于2000,高質(zhì)量OxfordUniversity:計算機安全課程體系CC-getech:2個選修課系列PurdueUniversity

PurdueUniversityInformationSecurityCoursesComputerSciencesCS355IntrotoCryptographyCS426ComputerSecurityCS471IntrotoArtificialIntelligenceCS478IntroductiontoBioinformaticsCS490S

SecureNetworkProgrammingCS526InformationSecurityCS555CryptographyCS591SInformationSecurityandCybercrimeSeminar

CS626AdvancedInformationAssuranceCS655AdvancedCryptologyCS690SPrivacyOnlinePurdueUniversityComputerandInformationTechnology

C&IT227IntroductiontoBioinformaticsC&IT420BasicCyberForensics

C&IT455NetworkSecurityC&IT499CCyberForensics:AdvancedTechnicalIssuesC&IT499D

SmallScaleDigitalDeviceForensics

C&IT499FIntroductiontoComputerForensics

C&IT499NWirelessNetworkSecurityandManagementC&IT528InformationSecurityRiskAssessmentC&IT556IntrotoCyberForensics

C&IT581AAdvancedTopicsinCyberforensics

C&IT581BBiometricDataAnalysisC&IT581CAppliedCryptographyC&IT581FExpertWitness&ScientificTestimony

C&IT581SInformationSecurityManagement

C&IT581VSpecialTopicsinCyberforensicsC&IT581ZWebServicesSecurity

PurdueUniversityComputerSecurity:

Asurveyofthefundamentalsofinformationsecurity.Risksandvulnerabilities,policyformation,controlsandprotectionmethods,databasesecurity,encryption,authenticationtechnologies,host-basedandnetwork-basedsecurityissues,personnelandphysicalsecurityissues,issuesoflawandprivacy.

InformationSecurity:

Basicnotionsofconfidentiality,integrity,availability;authenticationmodels;protectionmodels;securitykernels;secureprogramming;audit;intrusiondetectionandresponse;operationalsecurityissues;physicalsecurityissues;personnelsecurity;policyformationandenforcement;accesscontrols;informationflow;legalandsocialissues;identificationandauthenticationinlocalanddistributedsystems;classificationandtrustmodeling;andriskassessment

PurdueUniversityCommunicationsSecurityAndNetworkControls:

Thiscoursewillprovidestudentswithanoverviewofthefieldofinformationsecurityandassurance.Studentswillexplorecurrentencryption,hardware,software,andmanagerialcontrolsneededtooperatenetworksandcomputersystemsinasafeandsecuremanner

AdvancedNetworkSecurity:

Thiscourseprovidesstudentswiththein-depthstudyandpracticeofadvancedconceptsinappliedsystemsandnetworkingsecurity,includingsecuritypolicies,accesscontrols,IPsecurity,authenticationmechanismsandintrusiondetectionandprotection.

PurdueUniversitySystemsAssurance:

Thiscoursecoverstheimplementationofsystemsassurancewithcomputingsystems.Topicsincludeconfidentiality,integrity,authentication,non-repudiation,intrusiondetection,physicalsecurity,andencryption.Extensivelaboratoryexercisesareassigned

DisasterRecoveryAndPlanning

:

Thiscoursecoversriskmanagementandbusinesscontinuity.Topicsincludedisasterrecoverystrategies,mitigationstrategies,riskanalysisanddevelopmentofcontingencyplansforunexpectedoutagesandcomponentfailures.Extensivelaboratoryexercisesareassigned

.

PurdueUniversityInformationAssuranceRiskAssessment

:

Thiscoursecoversindustryandgovernmentrequirementsandguidelinesforinformationassuranceandauditingofcomputingsystems.Topicsincluderiskassessmentandimplementationofstandardizedrequirementsandguidelines

SoftwareAssurance

:

Thiscoursecoversdefensiveprogrammingtechniques,boundsanalysis,errorhandling,advancedtestingtechniques,detailedcodeauditing,andsoftwarespecificationinatrustedassuredenvironment.Extensivelaboratoryexercisesareassigned

.

PurdueUniversityComputerForensics

:

Thiscoursecoversthetechniquesusedintheforensicanalysisofcomputerizedsystemsforgatheringevidencetodetailhowasystemhasbeenexploitedorused.Extensivelaboratoryexercisesareassigned

SecureProgramming

:

Shellandenvironment,Bufferoverflows,Integeroverflows,Formatstrings,Meta-charactervulnerabilities(codeinjection)andInputValidation,WebApplicationissues(includingcross-sitescriptingvulnerabilities),Raceconditions,Filesystemissues,Randomness

FloridaStateUniversity

FloridaStateUniversityNetworkSecurity

Class1.

Fundamentalsofnetworksecurity.

Class2and3.

Securechannelsviaencryption.

Class4and5.

Blockciphersandencryptionmodes.

Class6.

MessageAuthenticationCodes.

Class7.

Streamciphers.Class8.

Authenticationmechanisms.Class9.Thebirthdayparadoxandapplications.Class10.Kerberos.Classes11,12,13and14.Publickeycryptography.Class15.Publickeyinfrastructure.Class16.Examreview.Class17.MidtermClass18.RSAscheme.Class19.SSLscheme.Class20.IPSECscheme.Class21.IPSEC-IKEscheme.Classes22,23,and24.Studentpresentations.Class25.Internetprotocolsreview,andintroductiontopacketfiltering.Class26.BuildingInternetfirewalls.Class27.Intrusiondetectionsystems.Class28.Finalreview.UniversityofLondon

UniversityofLondonSecuritymanagement[690IC01]:

Thismodulewillemphasisetheneedforgoodsecuritymanagement.Itsaimsaretoidentifytheproblemsassociatedwithsecuritymanagementandtoshowhowvarious(major)organisationssolvethoseproblems.

Anintroductiontocryptographyandsecuritymechanisms[690IC02]:

Theapproachofthismoduleisnon-technical.Themainobjectiveistointroducethestudentstothemaintypesofcryptographicmechanism,tothesecurityserviceswhichtheycanprovide,andtotheirmanagement,includingkeymanagement.Themathematicalcontentofthismoduleisminimal.Supportmaterialsfortheelementarymathematicsneededforthismodulewillbeprovided.

UniversityofLondonNetworksecurity[690IC03]

Thismoduleisconcernedwiththeprotectionofdatatransferredovercommercialinformationnetworks,includingcomputerandtelecommunicationsnetworks.Afteraninitialbriefstudyofcurrentnetworkingconcepts,avarietyofgenericsecuritytechnologiesrelevanttonetworksarestudied,includinguseridentificationtechniques,authenticationprotocolsandkeydistributionmechanisms.Thisleadsnaturallytoconsiderationofsecuritysolutionsforavarietyoftypesofpracticalnetworks,includingLANs,WANs,proprietarycomputernetworks,mobilenetworksandelectronicmail.UniversityofLondonComputersecurity[690IC04]

:Thiscoursedealswiththemoretechnicalmeansofmakingacomputingsystemsecure.Thisprocessstartswithdefiningthepropersecurityrequirements,whichareusuallystatedasasecuritypolicy.Securitymodelsformalisethosepoliciesandmayserveasareferencetocheckthecorrectnessofanimplementation.Themainsecurityfeaturesandmechanismsinoperatingsystemswillbeexaminedaswellassecurity-relatedissuesofcomputerarchitecture.Specificwell-knownoperatingsystemsarethenstudiedascasestudies.Otherareasinvestigatedincludethesecurityofmiddleware,softwareprotectionandwebsecurity.UniversityofLondonSecureelectroniccommerceandotherapplications[690OPT5]:Thismoduleaimstoputtheroleofsecurityintoperspectiveanddemonstratehowitformspartofasecuritysystemwithinanapplication.Theaimistoillustrate,usuallybytheuseofcasestudies,howaparticularsituationmaymakecertainaspectsofsecurityimportantandhowanentiresystemmightfittogether.Standardsandevaluationcriteria[690OPT7]:Overthelastfewyears,avarietyofsecurity-relatedstandardshavebeenproducedbyinternationalstandardsbodies.Thismoduleexaminessomeofthemostimportantofthesestandardsindetail.Indoingsoitillustrateshowinternationalstandardsnowcovermanyaspectsoftheanalysisanddesignofsecuresystems.Thematerialcoveredalsoputscertainotheraspectsofthedegreecourseinamorestructuredsetting.Themodulealsocoversexistingsecurityevaluationcriteria,thecurrentprocessforevaluatingsecuresystems,andguidelinesformanagingITsecurity

UniversityofLondonAdvancedcryptography[690OPT8]:Thismodulefollowsonfromtheintroductorycryptographymodule.Inthatmodulecryptographicalgorithmswereintroducedaccordingtothepropertiestheypossessedandhowtheymightfitintoalargersecurityarchitecture.Inthisunitwelookinsidesomeofthemostpopularandwidelydeployedalgorithmsandwehighlightdesignandcryptanalytictrendsoverthepasttwentyyears.Thiscourseis,bynecessity,somewhatmathematicalandsomebasicmathematicaltechniqueswillbeused.However,despitethisrelianceonmathematicaltechniques,theemphasisofthemoduleisonunderstandingthemorepracticalaspectsoftheperformanceandsecurityofsomeofthemostwidelyusedcryptographicalgorithms.UniversityofLondonDatabasesecurity[690OPT9]:Thismodulecoversseveralaspectsofdatabasesecurityandtherelatedsubjectofconcurrencycontrolindistributeddatabases.Wewilldiscussmethodsforconcurrencycontrolandfailurerecoveryindistributeddatabasesandtheinteractionbetweenthosemethodsandsecurityrequirements.Wewillalsoexaminehowaccesscontrolpoliciescanbeadaptedtorelationalandobject-orienteddatabases.UniversityofLondonInformationcrime[690OPT10]:Thismodulecomplementsothermodulesbyexaminingthesubjectfromthecriminalangleandpresentingastudyofcomputercrimeandthecomputercriminal.Wewilldiscussitshistory,causes,developmentandrepressionthroughstudiesofsurveys,typesofcrime,legalmeasures,andsystemandhumanvulnerabilities.Wewillalsoexaminetheeffectsofcomputercrimethroughtheexperiencesofvictimsandlawenforcementandlookatthemotivesandattitudesofhackersandothercomputercriminals.UniversityofLondonProject[6900011]:

Theprojectisamajorindividualpieceofwork.ItcanbeofacademicnatureandaimatacquiringanddemonstratingunderstandingandtheabilitytoreasonaboutsomespecificareaofInformationSecurity.Alternatively,theprojectworkmaydocumenttheabilitytodealwithapracticalaspectofInformationSecurityStanford/seclab/courses.htmlSecurityLabintheComputerScienceDepartmentCourses:CS155:ComputerandNetworkSecurity.CS255:IntroductiontoCryptographyandComputerSecurity.CS259:SecurityAnalysisofNetworkProtocolsCS355:TopicsinCryptography.CS99J:Sophomoreseminar:Computersecurityandprivacy.CS55N:Freshmanseminar:TenIdeasinComputerSecurityandCryptography.(講座)OxfordComputerSecurity:融入計算機系統(tǒng)的設計開發(fā),形成實踐能力OxfordSecurityPrinciples(SPR)Thiscoursecombinesatreatmentofthefundamentalprinciplesofcryptographyandsecurityprotocolswithapracticaltreatmentofcurrentbestpractice.Itexplainstheneedforcomputersecurity,andthescopeoftheavailabletechnicalsolutions;presentstechniquesforevaluatingsecuritysolutions;andprovidesanoverviewofthecurrentleadingtechnologiesandstandardsinthesecurityarena.OxfordSecurityRiskAnalysisandManagement(RIS)

Securityisapropertyofanentiresystemincontext,ratherthanofasoftwareproduct,soathoroughunderstandingofsystemsecurityriskanalysisisnecessaryforasuccessfulproject.Thiscourseintroducesthebasicconceptsandtechniquesofsecurityriskanalysis,andexplainshowtomanagesecurityrisksthroughtheprojectlifecycle.Participantsshouldhaveabasicunderstandingoftopicsinsecurity,asprovidedbytheSecurityPrinciples(SPR)course.PeopleandSecurity(PAS)

Averyhighproportionoffailuresinsecuritycanbeattributedtomisunderstanding,mis-information,orfailuretograsptheimportanceoftheprocessesindividualsareexpectedtofollow.Thiscoursedrawsonworkfromhuman-computerinteraction,andmorewidelyfrompsychology,relatingtheissuesraisedbacktohardtechnicalimplementationdecisions.Familiaritywithbasicsecurityprinciplesandstandardmechanisms,ascoveredinSecurityPrinciples(SPR),isassumed.

OxfordDesignforSecurity(DES)

Capabilityinthedesignofsystemswhichwillmeetsecuritygoalsisanincreasinglyimportantskill.Thiscoursewillexplorehowsuitablelevelsofassurancecanbeachievedthroughcombiningarchitecturaldetail,operatingsystemandmiddlewareplatforms,andapplicationsecuritymeasures.Centraltotheseconsiderationsisconcernforwhichrequirementsaremetwithwell-establishedtools,whichriskscanbeaddressedthoughnoveltechnologies,andwhichmustbemitigatedbyothermeans.Participantsshouldhaveabasicunderstandingoftopicsinsecurity,asprovidedbytheSecurityPrinciples(SPR)course.PlatformsforSecurity(PLA)

Inordertobuildsecuresystems,appropriatemethodologiesmustbeusedthroughoutthelifecycle,notleastinthedetailedimplementationstage.Thiscoursetakesacasestudyapproachtotopicssuchasbufferoverflows,cryptographiclibraries,sandboxing,codesigning,networksecurity,andcodecorrectness,tobuildtowardsatoolkitofsoundprinciples.Participantsshouldhaveabasicunderstandingoftopicsinsecurity,asprovidedbytheSecurityPrinciples(SPR)course.CC-getech

InformationSecurityFixedCoreCourses(23semesterhours):IntroductiontoInformationSecurityAppliedCryptographySecureComputerSystemsNetworkSecurityInformationSecurityLaboratoryInformationSecurityStrategiesandPoliciesPracticum/Project/Research(5credithours)CC-getechConcentrationI(TechnologyCentric-9CreditHours),ChoosethreecoursesfromthefollowingIntroductiontoNumberTheoryTheoryIIAdvancedOperatingSystemsComputerNetworksFormalModelsandMethodsforInformationAssuranceSoftwareDevelopmentProcessDatabaseSystemsConceptsadnDesignInternetworkingArchitectureandProtocolsCC-getechConcentrationII(PolicyCentric-9CreditHours)Choosethreecoursesfromthefollowing.TechnologyForecastingandAssessmentScience,TechnologyandPublicPolicyCostandBenefitAnalysisManagementInformationSystemsBusinessProcessAnalysis&Design(SAP)SecurityandPrivacyofInformation&InformationSystems(GSU)國外辦學特色總結辦學思路方面:信息安全科研活躍的高效設立相關課程、但體系性不強信息安全知識滲透到已有各個專業(yè)講解細致、事例豐富低年級涉及專業(yè)的目的意義,并通過動手實踐能力的培養(yǎng)激發(fā)學生興趣賓州大學的一年級的課程,(UndergraduateResearch/IndependentStudy,InformationTechnologyandItsImpactonSociety)芝加哥大學的WebDesign:Aesthetics/lang高年級注重學生知識面的拓展,開辦講座(約2小時),研究方向研討會等課程方面:基本課程計算機安全、密碼、網(wǎng)絡安全、安全管理、數(shù)據(jù)庫安全、計算機/網(wǎng)絡取證特色課程人員安全、安全編程(PU)、無線網(wǎng)絡安全(PU)、PROJECT、信息犯罪、網(wǎng)絡協(xié)議安全性分析、講座/專題、網(wǎng)絡攻防(NYU)成績評分方式平時作業(yè)(30-50%)、工程實踐(30-50%)、期中期末考試(30-40%)、出勤(5%左右)等教學方式方面:網(wǎng)絡成為師生溝通的橋梁,在教學中起重要作用,相關信息在網(wǎng)上都查得到,包括:每學期各專業(yè)的開課情況、課程介紹、任課教師、參考書目、教師要求、評分方式、教師的講義(ppt)等等。聘請外校專家講授課程或課程的部分章節(jié)。多名教師或研究生共同教授同一門課,各有分工。布置學生閱讀大量參考文獻并討論(stanford),一定的交流討論課時(1/3)

報告提綱引言國外信息安全相關課程設置情況總體情況有代表性的大學國外信息安全知識體系相關情況NSTISSI(NationalSecurityTelecommunicationsandInformationSystemSecurityI)ISC(2)的信息安全共同知識體系CBK辦學特點NSTISSI(NationalSecurityTelecommunicationsandInformationSystemSecurityI)的CNSS4011-4015CNSS4011:國家信息系統(tǒng)安全專業(yè)人才培訓標準NationalTrainingStandardforInformationSystemsSecurity(INFOSEC)ProfessioinalsCNSS4012:國家高級系統(tǒng)管理員信息安全培訓標準NationalInformationAssuranceTrainingStandardforSeniorSystemsManagersCNSS4013:國家系統(tǒng)管理員信息安全培訓標準NationalInformationAssuranceTraningStandardforSystemAdministratorsCNSS4014:國家信息系統(tǒng)安全官員安全培訓標準InformationAssuranceTrainingStandardforInformationSystemsSecurityOfficersCNSS4015:國家系統(tǒng)證書培訓標準NationalTrainingStandardforSystemCertifiersCNSS4011培訓標準培訓課程采用信息安全綜合模型,向受培訓者提供兩個層面的相關知識認知層面:對于國家信息信息系統(tǒng)威脅和弱點,要建立起敏感的認知。認識到保護數(shù)據(jù)、信息和信息處理手段的需求及意義;具有從事信息安全工作的原理和實踐知識實踐層面:培訓INFOSEC安全過程和實踐的設計、執(zhí)行和評估技能。對這個層面的理解可以確保學員有能力對他們在實踐過程中遇到的安全概念加以應用CNSS4011培訓標準教學計劃:1、通信基礎(認知層面)教學內(nèi)容:現(xiàn)代通信系統(tǒng)的演化過程,傳輸介質(zhì)學習成果:通信系統(tǒng)發(fā)展年代表,匹配傳輸特性和描述符主要內(nèi)容:歷史和當前方法對比;各種通信系統(tǒng)的能力和局限性2、自動化信息系統(tǒng)AIS基礎(認知層面)教學內(nèi)容:提供AIS語言;結合AIS實例描述AIS環(huán)境;綜述AIS中硬件、軟件、固定組件結合后文中信息系統(tǒng)安全外貌/行為學習成果:AIS術語解釋;可執(zhí)行功能解釋;描述AIS組件間相互關系主要內(nèi)容:歷史和當前技術對比;硬件;軟件;存儲器;介質(zhì);網(wǎng)絡CNSS4011培訓標準教學計劃:3、安全基礎(認知層面)教學內(nèi)容:應用信息系統(tǒng)安全廣泛模型,提出重要信息屬性、信息狀態(tài)、安全測量標準學習成果:學生應列出并表述AIS安全中的要素,對保護系統(tǒng)AIS的安全訓練進行總結,能舉例說出重要信息的決定性主要內(nèi)容:INFOSEC概述,操作安全OPSEC,信息安全INFOSEC4、NSTISS基礎(認知層面)教學內(nèi)容:組件描述,包括國家策略、威脅和弱點,對策,風險管理,系統(tǒng)生命周期管理,信任,操作模式,組織單元角色,NSTISS各方面等實例學習成果:概括出國家NSTISS策略;驗證AIS弱點和潛在威脅,舉例說明NISS策略,國產(chǎn)和實踐的代理實現(xiàn)主要內(nèi)容:國家策略和指導,系統(tǒng)弱點和威脅,法律要素,對策,風險管理,系統(tǒng)生命周期管理,信任,運行模式,多種組織人員的角色,NSTISS各方面CNSS4011培訓標準教學計劃:5、系統(tǒng)運行環(huán)境(認知層面)教學內(nèi)容:勾畫出機構的具體自動信息系統(tǒng)和通信系統(tǒng);描述機構的控制點,以便購買和維護自動信息系統(tǒng)和通信系統(tǒng);評論自動信息系統(tǒng)和通信系統(tǒng)的安全策略學習成果:總結出機構中自動信息系統(tǒng)和通信系統(tǒng);給出淡青機構的自動信息系統(tǒng)或通信系統(tǒng)和配置的示例,和維護的可操作點主要內(nèi)容:自動信息系統(tǒng),通信系統(tǒng),各機構具體的安全策略,各機構具體的自動通信系統(tǒng)或通信系統(tǒng)的策略6、NSTISS計劃和管理(實踐層面)教學內(nèi)容:討論涉及安全措施和編碼過程中的實際行動,介紹常見的安全計劃指南/文檔學習成果:針對教師提供的自動信息系統(tǒng)和通信系統(tǒng)建立安全計劃主要內(nèi)容:安全計劃,風險管理,系

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論