Introduction to IS course

1,217 views
1,154 views

Published on

A description to Information Safe Course.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,217
On SlideShare
0
From Embeds
0
Number of Embeds
152
Actions
Shares
0
Downloads
88
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Introduction to IS course

  1. 1. Information Safe Introduction Hoang V.Nguyen Mail: startnewday85@gmail.com Department of Computer Science Faculty of Information Technology – Hanoi University of Agriculture
  2. 2. Welcome to IS Course! • My name: Hoang V.Nguyen • Mail: startnewday85@gmail.com • Blog: startnewday85.blogspot.com • Department of Computer Science • My interesting: – Computation Models – Knowledge representation and discover – Software Engineering – Web science and Web technologies About you?
  3. 3. What is information? Information vs Data? How is information safe?
  4. 4. What is information? Information is a abstract notion, to denote anything that is a result of interaction. Some problems: • Reperesentation and Storing • Processing • Transfer • Safety
  5. 5. Information vs Data • What is Data?
  6. 6. Information vs Data Data is plain fact
  7. 7. Information vs Data Information Data - Subjective - Objective - Abstract - Visual - Result of interaction - A component of interaction Data is any sort of raw fact. Information is data in a usable form, ussually processed in some way. It’s data plus interpretation.
  8. 8. How is “information safe”? • Confidentiality • Integrity • Trust • Others… The safety of information is guarantee for some properties of information. In a specific context, specific properties must be guarantee
  9. 9. Why must we care Because: • Information is very very important • Data is not safe • Information safe is very interesting • Finally, it’s your subject 
  10. 10. Goal and objectives • Understand the basic principles and concepts of “information safe” • Study main aspects of Network security => Then: • Have a good background about “information safe” • Can study other fields such as data security, database security, network security, web security, … • Can design security solutions
  11. 11. Syllabus & Textbook • Syllabus Part 1 Introduction Part 2 Confidentiality Part 3 Integrity Part 4 Trust Part 5 Network security • Textbook - Cryptography and Network security principles and practices – William Stalling – 4th edition.
  12. 12. References • Books - Handbook of applied cryptography – A. Menezes, P.van Oorschot and S. Vanstone - Modern cryptography theory and practice - Wenbo Mao - Cryptography Theory And Practice - Douglas Stinson - The Codebreaker – David Kahn - The codebook – Sighmon Sigh • Videos
  13. 13. Prerequisites & Grading • Prerequisites - Mathematical background - Basic programming skills - Basic computer network • Grading Attention 20% Mid 30% Final 50% Total 100%
  14. 14. Collaboration policy

×