■ 課程目標 (Course Objectives)
讓學員了解網路資訊安全技術,如身分驗證、網路攻擊、遠端存取、網站安全等;也介紹密碼
學概念、實體安全、災難復原、電腦犯罪鑑定等議題
■ 課程內涵 (Course Contents)
結合實務與理論,以資訊安全專家CISSP領域,探討各種電腦系統網路安全,無線網路協定,到
各種網路攻擊的防護,甚或未來各種藉由網路溝通、通訊或交易的管道都與網路安全之研究有
相關,並搭配實習課程,實際瞭解網路安全的概念。
包含:資訊安全導論、電子商務安全、實體安全、資訊安全法律與倫理、密碼學概論、系統安全
技術與規範、網路安全概論、資料庫安全、存取控制、資訊安全管理、應用系統發展管理、營
運持續計畫、資產管理與人員管理、資訊安全總復習。■Course Objectives
Let students understand network information security technologies, such as identity verification, network attacks, remote access, website security, etc.; also introduce passwords
academic concepts, physical security, disaster recovery, computer crime identification and other topics
■ Course Contents
Combining practice and theory, using the CISSP field of information security experts to discuss various computer system network security, wireless network protocols, and
The protection of various network attacks, or even various channels for communication, communication or transactions through the Internet in the future are related to the research of network security.
Relevant and paired with practical courses to gain a practical understanding of the concepts of cyber security.
Includes: Introduction to Information Security, E-commerce Security, Physical Security, Information Security Law and Ethics, Introduction to Cryptography, System Security
Technology and specifications, introduction to network security, database security, access control, information security management, application system development management, operation
General review of operations continuity planning, asset management and personnel management, and information security.
1. 林祝興,張明信,資訊安全概論,第三版,旗標,2017。
2. 林祝興,張真誠,電子商務安全技術與應用,旗標。
3. 林祝興,張真誠,資訊安全技術與應用,全華。
4. 王旭正,林祝興,數位科技安全與鑑識:高科技犯罪預防與數位證據偵蒐,博碩文化。
5. 賴溪松、邱榮輝、林祝興、盧而輝、張克章,電子簽章應用與實習,旗標
6. Cryptography and Network Security: Principles and Practice, William Stallings, 6th Edition, Pearson
Education Limited.
7. Security in Computing, Charles P. Pfleeger, Shari Lawrence Pfleeger. Prentice-Hall, Inc.
8. Building Secure and Reliable Network Applications, Kenneth P. Birman, Manning Publications Co.
9. Internet Firewalls and Network Security, Chris Hare & Karanjit Siyan, New Riders Publishing.
10. 自編教材講義。
1. Lin Zhuxing, Zhang Mingxin, Introduction to Information Security, Third Edition, Banner, 2017.
2. Lin Zhuxing, Zhang Zhencheng, E-commerce security technology and application, Banner.
3. Lin Zhuxing, Zhang Zhencheng, Information Security Technology and Application, Quanhua.
4. Wang Xuzheng, Lin Zhuxing, Digital Technology Security and Forensics: High-tech Crime Prevention and Digital Evidence Detection, PhD Culture.
5. Lai Xisong, Qiu Ronghui, Lin Zhuxing, Lu Erhui, Zhang Kezhang, electronic signature application and practice, Qibao
6. Cryptography and Network Security: Principles and Practice, William Stallings, 6th Edition, Pearson
Education Limited.
7. Security in Computing, Charles P. Pfleeger, Shari Lawrence Pfleeger. Prentice-Hall, Inc.
8. Building Secure and Reliable Network Applications, Kenneth P. Birman, Manning Publications Co.
9. Internet Firewalls and Network Security, Chris Hare & Karanjit Siyan, New Riders Publishing.
10. Self-compiled teaching materials and handouts.
評分項目 Grading Method | 配分比例 Grading percentage | 說明 Description |
---|---|---|
作業&小考作業&小考 Homework & Quiz |
40 | |
期中考期中考 midterm exam |
30 | |
期末考期末考 final exam |
30 |