課程大綱 Syllabus |
學生學習目標 Learning Objectives |
單元學習活動 Learning Activities |
學習成效評量 Evaluation |
備註 Notes |
序 No. | 單元主題 Unit topic |
內容綱要 Content summary |
1 | Introduction |
A. System vulnerability
B. Threats
C. Protection |
Overall understanding of the course |
|
|
|
2 | Technical aspects of information security |
A. Cryptography
B. Hardware enhancement
C. Software measures |
-To understand the advanced cryptosystems such as ElGammal,Ecliptic Curve, and Quantum Cryptography. |
演講 講授
|
作業 其他評量-
|
|
3 | EI Gamma Public-key crypto system |
A. Primitive root
B. Algorithm |
-To know the weakness of RSA system |
演講 講授
|
作業 其他評量-
|
|
4 | Multimedia Security(I) |
A. Image
B. Information hiding |
-To understand the threats hidden in multimedia |
演講 講授
|
問答
|
|
5 | Multimedia Security(II) |
A. Stenography
B. Streaming |
-To know how to improve the security in multimedia. In addition, copyrights protection is considered. |
演講 講授
|
問答
|
|
6 | Electron: Commerce Security(I) |
A. eCommerce
B. Threats to eCommerce |
-To introduce the structural of eCommerce
and to know the threats behind including fraud |
演講 講授
|
作業 問答
|
|
7 | Electron: Commerce Security(II) |
A. web Security
B. Payment Security |
-To gain an overview over eCommerce and its payment system
- To know the risks in e-payment |
演講 講授
|
問答
|
|
8 | Database Security(I) |
A. ACID Property
B. Statistic Attacks |
-To understand the deatabase security
-To protect attacks like statistical attack and SQL injection |
講授
|
作業 問答
|
|
9 | Database Security(II) |
A. DB Security measures
B. DB Encryption |
-To understand the new types of Large Language Models
-To know the attacks on LLM |
講授
|
問答
|
|
10 | Cloud Computing Security(I) |
A. Introduction
B. Cloud Computing Architecture |
-To understand the architecture, the sevice model and deployment model of cloud computing |
講授
|
作業 問答
|
|
11 | Cloud Computing Security(II) |
A. Hypervisor
B. System Configuration |
- To understand the risks associated with cloud computing such as DDOS attacks, side-channel attacks, and man-in-the-middle attacks
-To understand how to leverage these new computing model |
講授
|
問答
|
|
12 | AI & Security |
A. Security with AI enhancement
B. AI exploited by hackers |
-To make use of AI to strengthen security
-To prevent hackers from attacks using AI |
講授
|
問答
|
|
13 | IOT Security |
A. IOT overview
B. Vulnerability of IOT systems
C. Security enhancement |
-To know the use of sensors and other devices
-To understand the threats in IOT security (e.g., Mirai)
-To strengthen by best practice |
講授
|
問答
|
|
14 | Mobile Security(I) |
A. Introduction to GSM
B. Data Security
C. 5G security |
-To understand the development of mobile communications
-To know the vulnerabilities of 1G--4G Comm |
講授
|
其他評量-
|
|
15 | Mobile Security(II) |
A. 5G Standard
B. 5G Security |
-To know the applications of 5G Comm
-To understand the weakness of 5G and new generation mobile comm and its possible enhancement |
講授
|
其他評量-
|
|
16 | Security Management(I) |
A. ISO 2 Tool
B. Information Assets |
-To dicuss online about the management aspects on security management from policy to procedure to methods |
講授
|
問答 彈性教學
|
|
17 | Security Management(II) |
A. Risk Management
B. Security as a Service |
-To know the PDCA management in ISO 27001
To discuss with case studies |
講授
|
問答 彈性教學
|
|
18 | Conclusion |
A. Review of all Information Security Issues
B. Outlook |
-Final examination |
|
期末考
|
|