Download presentation
Presentation is loading. Please wait.
Published byAshlie Atkinson Modified over 8 years ago
2
1 Information Security ( 資訊安全 )
3
2 What is Security? Security meaning: What kind of thing that should be protected? Protection mechanism: (Security Policy) –Concept Isolated the Object container Security Policy related with the users and the objects –Methods: Layer approach (Hybrid) Highest ideals in protection –Exposing all but reveal nothing
4
3 Network Security Information security v.s. network security
5
4 Network Public: –Internet Specific: –Enterprise level –Home level Ad Hoc:
6
5 Transmission Media Guided Media –T–Twisted-pair –C–Coaxial cable –F–Fiber-optic cable Unguided Media –R–Radio wave –E–ElectroMagnetic Wave Very high frequency (VHF) Ultro high frequency (UHF) Microwave band InfraRed
7
6 Network Threats Targets Jumbling Message snooping Virus/Worm diffusion Communication Blocking Despiteous attacking Human careless
8
7 Ways to prevent Technologies: –Targets identification –Message encryption –Virus scan –Routing Trace –Firewall Management (Security policy)
9
8 Text book cryptography and network security by Atul Kahate[McGraw-Hill] Powerpoint Files: –ftp://im1.im.tku.edu.tw Prof_Lee information securityftp://im1.im.tku.edu.tw Related book:
10
9 Course Evaluation Midterm test (40%) Presentation (40%) Course participation –Homework (10%) –Roll call (10%) –Others (10%)
11
10 問題討論 利用一些轉換機制,將金融卡密碼轉換 後寫出 ? 如何設計一個安全的機制,控制在外的 核子潛艦發射核子飛彈 ? 古代中國的帝王,如何調度領兵在外的 將領 ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.