Home
資訊工程學系在職專班
course information of 109 - 2 | 5735 Information Assurance(資訊安保)

5735 - 資訊安保 Information Assurance


教育目標 Course Target

隨著資料科學、雲端計算、大數據、物聯網等技術快速發展,許多資訊都逐漸數位化、網路 化,進入虛擬網路世界。然而,醫院與家庭醫護物聯網若資訊錯誤,可能造成急救延宕或診斷 錯誤;汽車電腦若被駭客入侵,遠端遙控駕駛車輛,也將發生嚴重問題。為因應新興資訊科技 快速進展,資訊安保已經成為刻不容緩的重要研究議題。本課程探討巨量資料、物聯網、雲端 計算等應用領域的資訊安全保障議題,並介紹相關觀念與技術。With the rapid development of technologies such as data science, cloud computing, big data, and the Internet of Things, much information has gradually been digitized and networked. ization and enter the virtual network world. However, if the information in hospitals and home healthcare IoT is incorrect, it may cause delays in first aid or diagnosis. Wrong; if the car computer is hacked and the vehicle is driven remotely, serious problems will occur. In response to emerging information technology With rapid progress, information security has become an urgent and important research topic. This course explores massive data, the Internet of Things, and the cloud Information security issues in computing and other application fields, and introduce related concepts and technologies.


參考書目 Reference Books

[1] Ishwor Khadka, Software piracy: A study of causes, effects and preventive measures, 2015
[2] Josiah Dykstra, Seizing Electronic Evidence from Cloud Computing Environments, University of
Maryland, Baltimore County, USA
[3] Peter Mell, Karen Kent, Joseph Nusbaum, Guide to Malware Incident Prevention and Handling,
Recommendations of the National Institute of Standards and Technology.
[4] BIG DATA AND PRIVACY:A TECHNOLOGICAL PERSPECTIVE Executive,
www.whitehouse.gov/ostp/pcast
[5] Robert Havighurst, User Identification and Authentication Concepts.
[6] JUN TANG, YONG CUI, and QI LI,Ensuring Security and Privacy Preservation for Cloud Data
Services
[7] Rodrigo Roman, Pablo Najera, and Javier Lopez, Securing the Internet of Things.
[8] Andrew Martin, The ten-page introduction to Trusted Computing.
[9] Fuu-Cheng Jiang a, Chu-Hsing Lin a,⇑, Hsiang-Wei Wub Lifetime elongation of ad hoc networks
under flooding attack using power-saving technique, Ad Hoc Networks 21 (2014) 84–96
[10] Joy Iong-Zong Chen & Chu-Hsing Lin, Algorithms for promoting anonymity of BS and for
prolonging network lifetime of WSN, Peer-to-Peer Networking and Applications
[11] Laurence T. Yang, Mobile Intelligence, Wiley, 2010.
[1] Ishwor Khadka, Software piracy: A study of causes, effects and preventive measures, 2015
[2] Josiah Dykstra, Seizing Electronic Evidence from Cloud Computing Environments, University of
Maryland, Baltimore County, USA
[3] Peter Mell, Karen Kent, Joseph Nusbaum, Guide to Malware Incident Prevention and Handling,
Recommendations of the National Institute of Standards and Technology.
[4] BIG DATA AND PRIVACY:A TECHNOLOGICAL PERSPECTIVE Executive,
www.whitehouse.gov/ostp/pcast
[5] Robert Havighurst, User Identification and Authentication Concepts.
[6] JUN TANG, YONG CUI, and QI LI,Ensuring Security and Privacy Preservation for Cloud Data
Services
[7] Rodrigo Roman, Pablo Najera, and Javier Lopez, Securing the Internet of Things.
[8] Andrew Martin, The ten-page introduction to Trusted Computing.
[9] Fuu-Cheng Jiang a, Chu-Hsing Lin a,⇑, Hsiang-Wei Wub Lifetime elongation of ad hoc networks
under flooding attack using power-saving technique, Ad Hoc Networks 21 (2014) 84–96
[10] Joy Iong-Zong Chen & Chu-Hsing Lin, Algorithms for promoting anonymity of BS and for
prolonging network lifetime of WSN, Peer-to-Peer Networking and Applications
[11] Laurence T. Yang, Mobile Intelligence, Wiley, 2010.


評分方式 Grading

評分項目 Grading Method 配分比例 Grading percentage 說明 Description
隨堂討論隨堂討論
Discussion in class
40 隨堂討論
期中報告期中報告
interim report
30 期中報告
期末報告期末報告
Final report
30 期末報告

授課大綱 Course Plan

Click here to open the course plan. Course Plan
交換生/外籍生選課登記 - 請點選下方按鈕加入登記清單,再等候任課教師審核。
Add this class to your wishlist by click the button below.
請先登入才能進行選課登記 Please login first


相似課程 Related Course

很抱歉,沒有符合條件的課程。 Sorry , no courses found.

Course Information

Description

學分 Credit:0-3
上課時間 Course Time:Friday/11,12,13[ST405]
授課教師 Teacher:林祝興
修課班級 Class:資工系4,資訊專班1,2
選課備註 Memo:核心技術課程、資料科學產業領域、物聯網;大四可選;延修生學分費以專班標準收取
授課大綱 Course Plan: Open

選課狀態 Attendance

There're now 11 person in the class.
目前選課人數為 11 人。

請先登入才能進行選課登記 Please login first