Overview of the Master’s Program in Information Security
The Master’s Program in Information Security was officially established in the 2023-2024 academic year. The program emphasizes the equal importance of theory and practice. In addition to information security research, the program invites instructors from the industry to teach practical courses to increase students’ practical knowledge. The program also encourages students to intern in the industry so that they may be well-connected and apply what they learn.
The program’s main areas of learning and research include fintech security, secure software design, network security, mobile security, forward-looking cryptography techniques, digital forensics, etc.
“Fintech” is the fusion of finance and technology. It is a new economic paradigm that incorporates technological means into the financial industry. It is a highly digitized sector in which information security is bound to be an issue of top-most importance.
The design of secure software involves both information security and software engineering. It is a topic that has garnered the attention of interdisciplinary teaching and research in recent years. Long has software development projects treated information security as an ad hoc issue that is addressed after a software system’s development, release, and maintenance stages. Only when problems arise would information security experts begin to explore potential weaknesses in the system.
Network security refers to the technologies used to protect systems, networks, and software from being attacked. It consists of different fields such as network device security, network information security, and network software security. There have been many real cases in which attacks were accomplished through networked systems to steal confidential information or to cripple the service altogether. Such attacks can cause massive problems for any business operations or government agencies.
Currently, the primary research areas in mobile security are identity authentication and data privacy. The most common identity authentication method is the user password. In recent years, to increase the level of security, various biometric authentication methods such as fingerprints, voiceprints, or facial features have been adopted. However, these methods may impede the user experience and may be susceptible to mimicry attacks.
To solve the security problems in everyday life, cryptographic protocols are intertwined with modern living. In addition, encryption mechanisms supporting fine-grained access control, as well as obfuscation circuits, function encryption, and homomorphic encryption for secure computing, are highly beneficial to information security outsourcing technology in the era of big data.
Digital forensics refers to the investigation, evidence collection, and recovery of the content in digital devices. It is used to assist entities that have been hacked to find the causes of information security breaches and to prevent similar incidents in the future. Additionally, facts gathered through the forensic process can serve as court evidence in legal proceedings of computer crimes.