資訊安全

資訊安全 Information Security

 

1. 密碼學與資訊安全理論 (Theory of Cryptography and Information Security)

     •  密碼系統分析 (Cryptanalysis)

     •  橢圓曲線密碼系統 (Elliptic curve cryptosystem,ECC)

     •  同態密碼系統 (Homomorphic cryptosystem)

     •  後量子密碼系統 (Post-quantum cryptosystem,PQC)

     •  大數據安全 (Big data security)

 

2. 網路與行動商務安全 (Network and Mobile Commerce Security)

     •  攻防演練平台之建置 (Security experiment platform)

     •  網路攻防演練劇本之設計 (Design of network attack and defense exercises)

     •  網路攻防演練過程之監控 (Monitor the process of network attack and defense)

     •  網路攻防演練攻擊防禦資料庫 (Attack defense database for network attack and defense training)

     •  誘捕系統於攻防演練中之應用 (Application of trap system in attack and defense)

     •  SDN 網路安全 (SDN network security)

     •  無線網路安全 (Wireless network security)

     •  行動裝置付款機制之安全性研究 (Mobile devices payment secuirty)

     •  行動裝置APP 惡意程式檢測 (Mobile devices malware detection)

     •  行動裝置APP 安全漏洞檢測 (Mobile devices security hole detection)

 

3. 雲端計算與物聯網安全 (Security of Cloud Computing and Internet of Things)

     •  雲端計算安全技術 (Cloud computing security)

     •  物聯網安全技術 (IoT security)

     •  雲端計算與物聯網隱私保護問題 (Privacy of cloud computing and internet of things)

 

4. 惡意程式偵測分析與數位鑑識調查追蹤 (Malware Detection and Digital Forensic/Investigation)

     •  惡意程式行為萃取與分析 (Extraction and analysis of malicious program behavior)

     •  資安防護工具與偵測工具的保護 (Protection of security tools and detection tools)

     •  網頁安全 (Web security)

     •  系統與軟體風險評估 (System and software risk analysis)

     •  自動化漏洞偵測與攻擊程式產生 (Automated vulnerability detection and attack program generation)

     •  數位稽核紀錄的鑑識調查追蹤 (Identification of the audit of digital audit records)

     •  探究APT 事件的數位採證與調查策略 (Exploring the digital acquisition and investigation strategy of apt events)

     •  網路封包判讀的鑑識調查追蹤 (Investigation and investigation of the identification of internet packet)

     •  反鑑識的鑑識調查追蹤 (Forensic investigation of anti-forensic tracking)

     •  數位裝置與平台鑑識 (Digital device and platform identification)

     •  鑑識歸責的資安管理、法律責任與對象釐清 (Information security management, legal liability and to clarify the subject of forensic attribution)

 

5. 資訊安保 (Information Assurance)

     •  IT 風險管理 (IT risk management)

     •  安全驗證、評估和量度 (Security verification, evaluation and metrics)

     •  可信賴計算架構 (Trusted computing architecture)

     •  隱私保護與資料隱匿性 (Privacy protection and data anonymity)

     •  社會議題與法規 (Social issues and legislation)

 

2021資訊安全 規劃書 下載

2018資訊安全 規劃書 下載

2015資訊安全 規劃書 下載