• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Introduction to IS course

Introduction to IS course



A description to Information Safe Course.

A description to Information Safe Course.



Total Views
Views on SlideShare
Embed Views



1 Embed 141

http://startnewday85.blogspot.com 141



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Introduction to IS course Introduction to IS course Presentation Transcript

    • Information Safe Introduction Hoang V.Nguyen Mail: startnewday85@gmail.com Department of Computer Science Faculty of Information Technology – Hanoi University of Agriculture
    • Welcome to IS Course! • My name: Hoang V.Nguyen • Mail: startnewday85@gmail.com • Blog: startnewday85.blogspot.com • Department of Computer Science • My interesting: – Computation Models – Knowledge representation and discover – Software Engineering – Web science and Web technologies About you?
    • What is information? Information vs Data? How is information safe?
    • What is information? Information is a abstract notion, to denote anything that is a result of interaction. Some problems: • Reperesentation and Storing • Processing • Transfer • Safety
    • Information vs Data • What is Data?
    • Information vs Data Data is plain fact
    • Information vs Data Information Data - Subjective - Objective - Abstract - Visual - Result of interaction - A component of interaction Data is any sort of raw fact. Information is data in a usable form, ussually processed in some way. It’s data plus interpretation.
    • How is “information safe”? • Confidentiality • Integrity • Trust • Others… The safety of information is guarantee for some properties of information. In a specific context, specific properties must be guarantee
    • Why must we care Because: • Information is very very important • Data is not safe • Information safe is very interesting • Finally, it’s your subject 
    • Goal and objectives • Understand the basic principles and concepts of “information safe” • Study main aspects of Network security => Then: • Have a good background about “information safe” • Can study other fields such as data security, database security, network security, web security, … • Can design security solutions
    • Syllabus & Textbook • Syllabus Part 1 Introduction Part 2 Confidentiality Part 3 Integrity Part 4 Trust Part 5 Network security • Textbook - Cryptography and Network security principles and practices – William Stalling – 4th edition.
    • References • Books - Handbook of applied cryptography – A. Menezes, P.van Oorschot and S. Vanstone - Modern cryptography theory and practice - Wenbo Mao - Cryptography Theory And Practice - Douglas Stinson - The Codebreaker – David Kahn - The codebook – Sighmon Sigh • Videos
    • Prerequisites & Grading • Prerequisites - Mathematical background - Basic programming skills - Basic computer network • Grading Attention 20% Mid 30% Final 50% Total 100%
    • Collaboration policy