Information Security
by Chin-Shiuh Shieh on
Objective
- The study of the fundamentals, methodology, mechanisms, and practical issues in information security, including encryption systems, network security, system security, digital watermark, and computer viruses.
Textbook
- William Stallings, Cryptography and Network Security: Principles and Practice, 3rd Ed., Prentice Hall, 2003, ISBN: 0-13-111502-2.
- ¶À²»õ¡B§d´fÅï¡B¿cªø«C¡B±i®p¸Û¡Bù¯E¡B¼ï¥¿²», ¸ê°T¦w¥þ-ì²z»P¹êÅç, ùÖ®p¸ê°TªÑ¥÷¦³¤½¥q, 2008, ISBN: 978-986-181-553-4.
Outline
Part I
- Overview
- Conventional Encryption: Classical Techniques
- Conventional Encryption: Modern Techniques
- Conventional Encryption: AES
- Contemporary Symmetric Ciphers
- Confidentiality Using Conventional Encryption
- Public-Key Cryptography
- Key Management
- Message Authentication and Hash Functions
- Hash and MAC Algorithms
- Digital Signatures and Authentication Protocols
- Authentication Applications
- Electronic Mail Security
- IP Security
- Web Security
- Intruders and Viruses
- Firewalls
Part II
- ª÷Æ_¥æ´«
- ¹ïºÙ¦¡ª÷Æ_¨t²Î
- «D¹ïºÙ¦¡ª÷Æ_¨t²Î
- ´Ó°ò©ó¼Æ¦ì©ö¸H¯B¤ô¦L§Þ³Nªº¼v¹³»{ÃÒ
- ¾AÀ³©óì©l¼v¹³¤§¥i¨£«¬¯B¤ô¦L¤èªk
- ´Ó°ò©ó¼Æ¦ì¹Lºôªº¥b¦â½Õ¼v¹³¥i¨£¯B¤ô¦L§Þ³N
- IP°»´ú»P³q°T°ð±½
- ¤J«I°»´ú¨t²Î
- ©U§£¶l¥ó¹LÂo
- ªýÂ_ªA°È§ðÀ»
- ¨¾¤õÀð
- ºô¶¹LÂo
- ¹q¸£¯f¬rºØÃþ¤Îì²z
- ¨t²Î®zÂI°»´ú
Lecture Notes
Grading
- Assignments (50%)
- Midterm Examination (25%)
- Final Examination (25%)
Prerequisites
- Experience in using computers and computer networks
- Intention and attendance