110年第2學期-5737 資訊安保 課程資訊

iLearn 公告清單

讀取中....

Teams 連結清單

讀取中....

評分方式

評分項目 配分比例 說明
隨堂討論 40 隨堂討論
期中報告 30 期中報告
期末報告 30 期末報告

選課分析

本課程名額為 70人,已有28 人選讀,尚餘名額42人。

授課教師

林祝興

教育目標

隨著資料科學、雲端計算、大數據、物聯網等技術快速發展,許多資訊都逐漸數位化、網路 化,進入虛擬網路世界。然而,醫院與家庭醫護物聯網若資訊錯誤,可能造成急救延宕或診斷 錯誤;汽車電腦若被駭客入侵,遠端遙控駕駛車輛,也將發生嚴重問題。為因應新興資訊科技 快速進展,資訊安保已經成為刻不容緩的重要研究議題。本課程探討巨量資料、物聯網、雲端 計算等應用領域的資訊安全保障議題,並介紹相關觀念與技術。

課程資訊

參考書目

[1] Ishwor Khadka, Software piracy: A study of causes, effects and preventive measures, 2015
[2] Josiah Dykstra, Seizing Electronic Evidence from Cloud Computing Environments, University of
Maryland, Baltimore County, USA
[3] Peter Mell, Karen Kent, Joseph Nusbaum, Guide to Malware Incident Prevention and Handling,
Recommendations of the National Institute of Standards and Technology.
[4] BIG DATA AND PRIVACY:A TECHNOLOGICAL PERSPECTIVE Executive,
www.whitehouse.gov/ostp/pcast
[5] Robert Havighurst, User Identification and Authentication Concepts.
[6] JUN TANG, YONG CUI, and QI LI,Ensuring Security and Privacy Preservation for Cloud Data
Services
[7] Rodrigo Roman, Pablo Najera, and Javier Lopez, Securing the Internet of Things.
[8] Andrew Martin, The ten-page introduction to Trusted Computing.
[9] Fuu-Cheng Jiang a, Chu-Hsing Lin a,⇑, Hsiang-Wei Wub Lifetime elongation of ad hoc networks
under flooding attack using power-saving technique, Ad Hoc Networks 21 (2014) 84–96
[10] Joy Iong-Zong Chen & Chu-Hsing Lin, Algorithms for promoting anonymity of BS and for
prolonging network lifetime of WSN, Peer-to-Peer Networking and Applications
[11] Laurence T. Yang, Mobile Intelligence, Wiley, 2010.