Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 報告人:張克章教授 應用密碼學與資安應用 Dept. Information Management Chang Gung University Applied cryptography & Information security Course introduction for Applied cryptography.

Similar presentations


Presentation on theme: "1 報告人:張克章教授 應用密碼學與資安應用 Dept. Information Management Chang Gung University Applied cryptography & Information security Course introduction for Applied cryptography."— Presentation transcript:

1 1 報告人:張克章教授 應用密碼學與資安應用 Dept. Information Management Chang Gung University Applied cryptography & Information security Course introduction for Applied cryptography & Information security 102/9/26

2 2 報告人:張克章教授 應用密碼學與資安應用 Dept. Information Management Chang Gung University Applied cryptography & Information security 1. Some requirements for course requirement 2. Some situations in social status 3. Observations from MIS 4. How to maintenance 5. How to through this field 6. Your requirement CONTENTS

3 3 報告人:張克章教授 應用密碼學與資安應用 Dept. Information Management Chang Gung University Applied cryptography & Information security 1. Some requirements for course requirement All course you have to join and discuss together All course you have to join and discuss together Some topics we can illustrate and research, but all of you have to discuss and change your concept. Some topics we can illustrate and research, but all of you have to discuss and change your concept. So far, the security of all databases is very important, if some leakages happen, all attacks can appear and disorder, some personnel have to give much attention to this situation. So far, the security of all databases is very important, if some leakages happen, all attacks can appear and disorder, some personnel have to give much attention to this situation. The database consists all other types as centralized, distributed, or cloud computing databases. The database consists all other types as centralized, distributed, or cloud computing databases.

4 4 報告人:張克章教授 應用密碼學與資安應用 Dept. Information Management Chang Gung University Applied cryptography & Information security Each time, some reports discuss that the attacks can successful get into some computers, and find that leakage to intrude. Each time, some reports discuss that the attacks can successful get into some computers, and find that leakage to intrude. The results of all attracts can make any computer to stop, or even let the computer to idle and make nothing to continue. The results of all attracts can make any computer to stop, or even let the computer to idle and make nothing to continue. Like some result illustrated by Information & Communication Security Technology Center( 行政 院國家資通安全會報技術服務中心 ) ) that there are some various attacks intrude computer systems by various ways. Like some result illustrated by Information & Communication Security Technology Center( 行政 院國家資通安全會報技術服務中心 ) ) that there are some various attacks intrude computer systems by various ways..

5 5 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University 2. Some situations in social status There are so many information describe a lot of some news, the purpose is to provide an extensively defense your security and privacy in computers. There are so many information describe a lot of some news, the purpose is to provide an extensively defense your security and privacy in computers. The is the first topic all MIS people and all other personnel should to understand, this is the major topic we have to know. The is the first topic all MIS people and all other personnel should to understand, this is the major topic we have to know. Some regulations like “Computer-Processed Personal Data Protection Law ( 電腦處理個人資料保 護法 )” or “Challenging Hackers ( 挑戰駭客 ) ” are the same information to study. Some regulations like “Computer-Processed Personal Data Protection Law ( 電腦處理個人資料保 護法 )” or “Challenging Hackers ( 挑戰駭客 ) ” are the same information to study.

6 6 報告人:張克章教授 應用密碼學與資安應用 Dept. Information Management Chang Gung University Applied cryptography & Information security There are many attacks we can find: There are many attacks we can find: SPAM (): 台灣的國家通訊傳播委員會 (National Communication Council, NCC) 也立法,未來 如果濫發垃圾信 (SPAM) 被認定,收件者可依每封信向濫發單位求償兩千元。 SPAM ( 垃圾郵件 ): 台灣的國家通訊傳播委員會 (National Communication Council, NCC) 也立法,未來 如果濫發垃圾信 (SPAM) 被認定,收件者可依每封信向濫發單位求償兩千元。 Social engineering( 社交工程 ) 已一般方法向保 管機密的負責人員作攻擊的模式, 如 Cyberpunk( 電腦叛客 ) 就是故事之一 Social engineering( 社交工程 ) 已一般方法向保 管機密的負責人員作攻擊的模式, 如 Cyberpunk( 電腦叛客 ) 就是故事之一 We have to note specially and give much attention on this areas. We have to note specially and give much attention on this areas.

7 7 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University Denial od Service (DoS) Denial od Service (DoS) Wiretapping Wiretapping Spoof Spoof Man-in-the-Middle Man-in-the-Middle Something else Something else Connector attacks like routing attack, illegal collection, or attack after SSL communication, ect, a point to note. Connector attacks like routing attack, illegal collection, or attack after SSL communication, ect, a point to note. Other attacks can be discussed in the next slice. Other attacks can be discussed in the next slice.

8 8 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University There are many attacks we can find: There are many attacks we can find: Information gathering, fraud or explanation, etc. Some attacks are divided as: Ciphertext-only Known plaintext Chosen plaintext Chosen ciphertext Side channel attack Brute force attack: like dictionary search. Fault i Fault injection attack: inexpensive equipment and a short amount of time. SQL fishing: SQL 木馬偵測 SQL fishing: SQL 木馬偵測

9 9 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University 3. Observations from MIS People in MIS are a special group to understand what the attack happened, how to defend and against the attack soon. People in MIS are a special group to understand what the attack happened, how to defend and against the attack soon. CEO (Chief in Office) in MIS have to notice the influence of any attack, CEO have to suggest various ways to against the attacks. CEO (Chief in Office) in MIS have to notice the influence of any attack, CEO have to suggest various ways to against the attacks. Other people may follow their instruction to again the attack, and report the effect of results. Other people may follow their instruction to again the attack, and report the effect of results. All people in MIS have a special to against any attack, if there has a special attack appeared. All people in MIS have a special obligation to against any attack, if there has a special attack appeared.

10 10 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University All other people in an organization have a job, how to follow the CEO or people in MIS have to another requirement. All other people in an organization have a job, how to follow the CEO or people in MIS have to another requirement. While the organization is the target all attackers want to intrude, members should give much attention to against the influence the attacks. While the organization is the target all attackers want to intrude, members should give much attention to against the influence the attacks. 4. How to maintenance When the any person or organizations are the target to be attacked, keeping special attitude and moods have to appear in any times. When the any person or organizations are the target to be attacked, keeping special attitude and moods have to appear in any times.

11 11 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University A set of educations, trainings, or conferences are the necessary tools, some types of attacks are issued and discussed. A set of educations, trainings, or conferences are the necessary tools, some types of attacks are issued and discussed. We can have a lot of ideas to understand what the topics in study and discussion, some research results can list various reciprocal effect to their systems. We can have a lot of ideas to understand what the topics in study and discussion, some research results can list various reciprocal effect to their systems. Since the attack have much functions, additional effects can appeared now. Since the attack have much functions, additional effects can appeared now. So the against attacker. So the against attacker. Some attackers come from international crimes and domestic crimes, we have to notice at all. Some attackers come from international crimes and domestic crimes, we have to notice at all.

12 12 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University 5. How to through this field We can have a lot of ideas to understand what the topics in study and discussion, some research results can list various reciprocal effect to their systems. We can have a lot of ideas to understand what the topics in study and discussion, some research results can list various reciprocal effect to their systems. Since the attack have much functions, additional effects can appeared now. Since the attack have much functions, additional effects can appeared now. So the against attacker. So the against attacker. Some attackers come from international crimes and domestic crimes, we have to notice at all. Some attackers come from international crimes and domestic crimes, we have to notice at all. The job you take this course is to understand, protocol design, the reason why protocol works and counterfeit this attacks. The job you take this course is to understand, protocol design, the reason why protocol works and counterfeit this attacks. The through jobs are to take the practice of all discussions and understand, taking the counterfeit all attack seriously. The through jobs are to take the practice of all discussions and understand, taking the counterfeit all attack seriously. We have this idea that communication in internet, internet or extranet have the face all attacks, we have to face the situation and try to against their illegal result. We have this idea that communication in internet, internet or extranet have the face all attacks, we have to face the situation and try to against their illegal result.

13 13 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University A set of educations, trainings, or conferences are the necessary tools, some types of attacks are issued and discussed. A set of educations, trainings, or conferences are the necessary tools, some types of attacks are issued and discussed. We can have a lot of ideas to understand what the topics in study and discussion, some research results can list various reciprocal effect to their systems. We can have a lot of ideas to understand what the topics in study and discussion, some research results can list various reciprocal effect to their systems. Since the attack have much functions, additional effects can appeared now. Since the attack have much functions, additional effects can appeared now. So the against attacker. So the against attacker. Some attackers come from international crimes and domestic crimes, we have to notice at all. Some attackers come from international crimes and domestic crimes, we have to notice at all.

14 14 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University 6. Your requirement We want to get some other ideas on “cryptography security and information security” for an organization or inter-organizations, some cross participation and discussion have to join. We want to get some other ideas on “cryptography security and information security” for an organization or inter-organizations, some cross participation and discussion have to join. This course wants to understand why there some many attacks on information leakages. This course wants to understand why there some many attacks on information leakages. All studies on various ideas and reports have to let all other to understand. All studies on various ideas and reports have to let all other to understand. 3 invited speakers will give you some of their ideas, you have to give your idea on their topic and send the messages to me by e-mail one week later. 3 invited speakers will give you some of their ideas, you have to give your idea on their topic and send the messages to me by e-mail one week later.

15 15 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University Your grade is given: Your grade is given: 1. Oral expression 1. Oral expression 2. All students need to provide his idea 2. All students need to provide his idea 3. Cross discussion for that topics 3. Cross discussion for that topics Grade is given as: Grade is given as: 1. Oral discussion 30% 1. Oral discussion 30% 2. Cross discussion 30% 2. Cross discussion 30% 3. Each report 30% 3. Each report 30% 4. General evaluation 10% 4. General evaluation 10% My connections are: My connections are: E-mail: changher@mail.cgu.edu.tw E-mail: changher@mail.cgu.edu.twchangher@mail.cgu.edu.tw Phone: 0935645158 or ~ 5866 or Cabinet Phone: 0935645158 or ~ 5866 or Cabinet

16 16 報告人:張克章教授 Applied cryptography & Information security 應用密碼學與資安應用 Dept. Information Management Chang Gung University QuestionsAndDiscussions


Download ppt "1 報告人:張克章教授 應用密碼學與資安應用 Dept. Information Management Chang Gung University Applied cryptography & Information security Course introduction for Applied cryptography."

Similar presentations


Ads by Google