資訊安全 Information Security
1. 密碼學與資訊安全理論 (Theory of Cryptography and Information Security)
• 密碼系統分析 (Cryptanalysis)
• 橢圓曲線密碼系統 (Elliptic curve cryptosystem,ECC)
• 同態密碼系統 (Homomorphic cryptosystem)
• 後量子密碼系統 (Post-quantum cryptosystem,PQC)
• 大數據安全 (Big data security)
2. 網路與行動商務安全 (Network and Mobile Commerce Security)
• 攻防演練平台之建置 (Security experiment platform)
• 網路攻防演練劇本之設計 (Design of network attack and defense exercises)
• 網路攻防演練過程之監控 (Monitor the process of network attack and defense)
• 網路攻防演練攻擊防禦資料庫 (Attack defense database for network attack and defense training)
• 誘捕系統於攻防演練中之應用 (Application of trap system in attack and defense)
• SDN 網路安全 (SDN network security)
• 無線網路安全 (Wireless network security)
• 行動裝置付款機制之安全性研究 (Mobile devices payment secuirty)
• 行動裝置APP 惡意程式檢測 (Mobile devices malware detection)
• 行動裝置APP 安全漏洞檢測 (Mobile devices security hole detection)
3. 雲端計算與物聯網安全 (Security of Cloud Computing and Internet of Things)
• 雲端計算安全技術 (Cloud computing security)
• 物聯網安全技術 (IoT security)
• 雲端計算與物聯網隱私保護問題 (Privacy of cloud computing and internet of things)
4. 惡意程式偵測分析與數位鑑識調查追蹤 (Malware Detection and Digital Forensic/Investigation)
• 惡意程式行為萃取與分析 (Extraction and analysis of malicious program behavior)
• 資安防護工具與偵測工具的保護 (Protection of security tools and detection tools)
• 網頁安全 (Web security)
• 系統與軟體風險評估 (System and software risk analysis)
• 自動化漏洞偵測與攻擊程式產生 (Automated vulnerability detection and attack program generation)
• 數位稽核紀錄的鑑識調查追蹤 (Identification of the audit of digital audit records)
• 探究APT 事件的數位採證與調查策略 (Exploring the digital acquisition and investigation strategy of apt events)
• 網路封包判讀的鑑識調查追蹤 (Investigation and investigation of the identification of internet packet)
• 反鑑識的鑑識調查追蹤 (Forensic investigation of anti-forensic tracking)
• 數位裝置與平台鑑識 (Digital device and platform identification)
• 鑑識歸責的資安管理、法律責任與對象釐清 (Information security management, legal liability and to clarify the subject of forensic attribution)
5. 資訊安保 (Information Assurance)
• IT 風險管理 (IT risk management)
• 安全驗證、評估和量度 (Security verification, evaluation and metrics)
• 可信賴計算架構 (Trusted computing architecture)
• 隱私保護與資料隱匿性 (Privacy protection and data anonymity)
• 社會議題與法規 (Social issues and legislation)
2021資訊安全 規劃書 下載
2018資訊安全 規劃書 下載
2015資訊安全 規劃書 下載