SlideShare a Scribd company logo
1 of 11
Information Security
( Мэдээллийн нууцлал хамгаалалт)
            2011 Хавар
   http://gantur-course.blogspot.com
Contact information

Instructor: Тогтохын Гантөр
 – Email: gantur_t@yahoo.com
 – Office Hours in B306(КПХ ТЭНХИМ):
      • Wed 08:00-17:00
      • Unless there is a dept. meeting or class
      • Else, by appointment
Prerequisites
• At least one of:
       – Computer Networks
       – Network Programming (Socket)
       – Wireless Networks
       – Mobile Communications
• At least one of:
       – Network Security
       – Cryptography
       – Data Structures
       – Computer Algorithms
Prerequisites
• At least one of:
       – Computer Networks
       – Network Programming (Socket)
                 Бага зэрэг Англи
       – Wireless Networks
                        хэл
       – Mobile Communications
• At least one of:
       – Network Security
       – Cryptography
       – Data Structures
       – Computer Algorithms
Attendance and Attitude
• Attendance
      – Absence: 40 минутаас дээш
      – 3 times Late: 1 Absence.
      – 1 times absence: -1.5 pt.
      – More than 8 absences: F

• Penalties on Bad Attitudes
     – Leave room without notice (on the Lecture): -1 pts.
     – Mobile phone ringing (on the Lecture): -1 pt.
     – Chat: -1 pt. every 20 mins (on the Lecture)
Course Grading

Багш:
  - Ирц:         10
  - Идэвхи:      10
  - Сорил:       20
  - Бие даалт:   30


Шалгалт:         30
Course Textbooks/References

• Textbooks
      – No textbooks required.
      – All materials will be provided or informed.
• References
      – Network security
also

• This is not first offering in Ulaanbaatar University
• I will make mistake
• I want your feedback!
• Please ask lots of questions
Bird’s eye view


     Network               Ubiquitous
     security     Crypto
                           Computing
Bird’s eye view

                Энэ хичээл
     Network                 Ubiquitous
     security     Crypto
                             Computing
Өнөөдөр
  • Introduction to Ubiquitous Computing
  • Definitions of Ubiquitous Computing
  • Future Ubiquitous Life

More Related Content

Viewers also liked (20)

Lecture2 4
Lecture2 4Lecture2 4
Lecture2 4
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture4 5 aлгоритм_түүний_шинжчанар
Lecture4 5 aлгоритм_түүний_шинжчанарLecture4 5 aлгоритм_түүний_шинжчанар
Lecture4 5 aлгоритм_түүний_шинжчанар
 
Lecture2
Lecture2Lecture2
Lecture2
 
Saiga news mongolia_dugaar_3
Saiga news mongolia_dugaar_3Saiga news mongolia_dugaar_3
Saiga news mongolia_dugaar_3
 
Lecture5 6
Lecture5 6Lecture5 6
Lecture5 6
 
Лекц 4
Лекц 4Лекц 4
Лекц 4
 
Lecture7 8
Lecture7 8Lecture7 8
Lecture7 8
 
Лабораторийн ажил 1
Лабораторийн ажил 1Лабораторийн ажил 1
Лабораторийн ажил 1
 
PL Lecture2
PL Lecture2PL Lecture2
PL Lecture2
 
Visual programming-2 noanswer
Visual programming-2 noanswerVisual programming-2 noanswer
Visual programming-2 noanswer
 
Lecture9
Lecture9Lecture9
Lecture9
 
Practics onprogramming
Practics onprogrammingPractics onprogramming
Practics onprogramming
 
лекц 4 шинэ
лекц  4 шинэлекц  4 шинэ
лекц 4 шинэ
 
Sp l2
Sp l2Sp l2
Sp l2
 
Лабораторийн ажил 7
Лабораторийн ажил 7Лабораторийн ажил 7
Лабораторийн ажил 7
 
PL Lecture4
PL Lecture4PL Lecture4
PL Lecture4
 
Лекц 1
Лекц 1Лекц 1
Лекц 1
 
Lecture2
Lecture2Lecture2
Lecture2
 
Лабораторийн ажил 7
Лабораторийн ажил 7Лабораторийн ажил 7
Лабораторийн ажил 7
 

Similar to Lecture 01

Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTWSO2
 
Mind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceMind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceStewart Kowalski
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Your Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsYour Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsWSO2
 
ECE462 CommunicationIILecture1.pdf
ECE462 CommunicationIILecture1.pdfECE462 CommunicationIILecture1.pdf
ECE462 CommunicationIILecture1.pdfSayedHassan84
 
Managing Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityManaging Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityPriyanka Aash
 
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General ProblemBlockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General ProblemFerdin Joe John Joseph PhD
 
The topic is packet switching presentation
The topic is packet switching presentationThe topic is packet switching presentation
The topic is packet switching presentationXudeyfeYare
 
IoT-Week1-Day1-Lecture.pptx
IoT-Week1-Day1-Lecture.pptxIoT-Week1-Day1-Lecture.pptx
IoT-Week1-Day1-Lecture.pptxafsheenfaiq2
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspacezapp0
 
Wwsss intro2016-final
Wwsss intro2016-finalWwsss intro2016-final
Wwsss intro2016-finalSteffen Staab
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routingvpnmentor
 
FDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdfFDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdfgurukhade1
 

Similar to Lecture 01 (20)

Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
Mind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceMind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber Space
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Lecture01.ppt
Lecture01.pptLecture01.ppt
Lecture01.ppt
 
Your Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsYour Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
ECE462 CommunicationIILecture1.pdf
ECE462 CommunicationIILecture1.pdfECE462 CommunicationIILecture1.pdf
ECE462 CommunicationIILecture1.pdf
 
Managing Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber SecurityManaging Next Generation Threats to Cyber Security
Managing Next Generation Threats to Cyber Security
 
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General ProblemBlockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
 
Seminar V2
Seminar V2Seminar V2
Seminar V2
 
The topic is packet switching presentation
The topic is packet switching presentationThe topic is packet switching presentation
The topic is packet switching presentation
 
IoT-Week1-Day1-Lecture.pptx
IoT-Week1-Day1-Lecture.pptxIoT-Week1-Day1-Lecture.pptx
IoT-Week1-Day1-Lecture.pptx
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Civilian OPSEC in cyberspace
Civilian OPSEC  in cyberspaceCivilian OPSEC  in cyberspace
Civilian OPSEC in cyberspace
 
Data wrangling week2
Data wrangling week2Data wrangling week2
Data wrangling week2
 
Wwsss intro2016-final
Wwsss intro2016-finalWwsss intro2016-final
Wwsss intro2016-final
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
 
FDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdfFDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdf
 

More from Gantur Togtokh

Lecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэхLecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэхGantur Togtokh
 
Lecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэхLecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэхGantur Togtokh
 
Lecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарLecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарGantur Togtokh
 
Lecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэцLecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэцGantur Togtokh
 
Lecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарLecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарGantur Togtokh
 
Lecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэцLecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэцGantur Togtokh
 
Lecture5 aлгоритм түүний_шинжчанар
Lecture5 aлгоритм түүний_шинжчанарLecture5 aлгоритм түүний_шинжчанар
Lecture5 aлгоритм түүний_шинжчанарGantur Togtokh
 
Lecture3 aлгоритм түүний_шинжчанар.ppt
Lecture3 aлгоритм түүний_шинжчанар.pptLecture3 aлгоритм түүний_шинжчанар.ppt
Lecture3 aлгоритм түүний_шинжчанар.pptGantur Togtokh
 
Lecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарLecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарGantur Togtokh
 
Lecture4 5 aлгоритм_түүний_шинжчанар
Lecture4 5 aлгоритм_түүний_шинжчанарLecture4 5 aлгоритм_түүний_шинжчанар
Lecture4 5 aлгоритм_түүний_шинжчанарGantur Togtokh
 
Lecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарLecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарGantur Togtokh
 
Lecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэцLecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэцGantur Togtokh
 
Lecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэхLecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэхGantur Togtokh
 
Tolvolgoo for students
Tolvolgoo for studentsTolvolgoo for students
Tolvolgoo for studentsGantur Togtokh
 

More from Gantur Togtokh (19)

Lecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэхLecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэх
 
Lecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэхLecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэх
 
Lecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарLecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанар
 
Lecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэцLecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэц
 
Lecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарLecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанар
 
Lecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэцLecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэц
 
Lecture5 aлгоритм түүний_шинжчанар
Lecture5 aлгоритм түүний_шинжчанарLecture5 aлгоритм түүний_шинжчанар
Lecture5 aлгоритм түүний_шинжчанар
 
Lecture3 aлгоритм түүний_шинжчанар.ppt
Lecture3 aлгоритм түүний_шинжчанар.pptLecture3 aлгоритм түүний_шинжчанар.ppt
Lecture3 aлгоритм түүний_шинжчанар.ppt
 
Lecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарLecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанар
 
Lecture4 5 aлгоритм_түүний_шинжчанар
Lecture4 5 aлгоритм_түүний_шинжчанарLecture4 5 aлгоритм_түүний_шинжчанар
Lecture4 5 aлгоритм_түүний_шинжчанар
 
Lecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанарLecture3 aлгоритм түүний_шинжчанар
Lecture3 aлгоритм түүний_шинжчанар
 
Lecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэцLecture2 kомпьютерийн ерөнхий бүтэц
Lecture2 kомпьютерийн ерөнхий бүтэц
 
Lecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэхLecture1 kомпьютерт мэдээлэл_дүрслэх
Lecture1 kомпьютерт мэдээлэл_дүрслэх
 
Vpii seminar1
Vpii seminar1Vpii seminar1
Vpii seminar1
 
Vpi sem8
Vpi sem8Vpi sem8
Vpi sem8
 
Assignment for cap
Assignment for capAssignment for cap
Assignment for cap
 
Vpi bie daalt
Vpi bie daaltVpi bie daalt
Vpi bie daalt
 
Vpii bie daalt
Vpii bie daaltVpii bie daalt
Vpii bie daalt
 
Tolvolgoo for students
Tolvolgoo for studentsTolvolgoo for students
Tolvolgoo for students
 

Recently uploaded

Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptxVishal Singh
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 

Recently uploaded (20)

OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 

Lecture 01

  • 1. Information Security ( Мэдээллийн нууцлал хамгаалалт) 2011 Хавар http://gantur-course.blogspot.com
  • 2. Contact information Instructor: Тогтохын Гантөр – Email: gantur_t@yahoo.com – Office Hours in B306(КПХ ТЭНХИМ): • Wed 08:00-17:00 • Unless there is a dept. meeting or class • Else, by appointment
  • 3. Prerequisites • At least one of: – Computer Networks – Network Programming (Socket) – Wireless Networks – Mobile Communications • At least one of: – Network Security – Cryptography – Data Structures – Computer Algorithms
  • 4. Prerequisites • At least one of: – Computer Networks – Network Programming (Socket) Бага зэрэг Англи – Wireless Networks хэл – Mobile Communications • At least one of: – Network Security – Cryptography – Data Structures – Computer Algorithms
  • 5. Attendance and Attitude • Attendance – Absence: 40 минутаас дээш – 3 times Late: 1 Absence. – 1 times absence: -1.5 pt. – More than 8 absences: F • Penalties on Bad Attitudes – Leave room without notice (on the Lecture): -1 pts. – Mobile phone ringing (on the Lecture): -1 pt. – Chat: -1 pt. every 20 mins (on the Lecture)
  • 6. Course Grading Багш: - Ирц: 10 - Идэвхи: 10 - Сорил: 20 - Бие даалт: 30 Шалгалт: 30
  • 7. Course Textbooks/References • Textbooks – No textbooks required. – All materials will be provided or informed. • References – Network security
  • 8. also • This is not first offering in Ulaanbaatar University • I will make mistake • I want your feedback! • Please ask lots of questions
  • 9. Bird’s eye view Network Ubiquitous security Crypto Computing
  • 10. Bird’s eye view Энэ хичээл Network Ubiquitous security Crypto Computing
  • 11. Өнөөдөр • Introduction to Ubiquitous Computing • Definitions of Ubiquitous Computing • Future Ubiquitous Life