SlideShare a Scribd company logo
Dept. of Computer Science – FITA – HUA




          Van Hoang Nguyen
          Mail: startnewday85@gmail.com
          Department of Computer Science – FITA – HUA



Computer and Network Security ---------------------------------------- Fall 2012
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




       Not “to make the system as secure as possible”

       “To make the system as secure as possible within
       certain constraints”
          Cost
          Benefit, usability and convenience

       More security is not always better at all




Van Hoang Nguyen                                                                  9
Computer & Network Security – Fall 2012


                                 Total vulnerabilities cataloged
          9000


          8000


          7000


          6000


          5000


          4000


          3000


          2000


          1000


             0
              1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008
                                            Sourced by http://www.cert.org/stats/cert_stats.html
Van Hoang Nguyen
Computer & Network Security – Fall 2012




                   Sourced by Charles Henderson - Trustwave 2011
Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




              Part 1   Introduction

              Part 2   Program level
              Part 3   Application level
              Part 4   Viruses and Malware
              Part 5   The Trusted Computing Architecture




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




              Attention   10%
              Mid         30%
              Final       60%
              Total       100%

Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen
Computer & Network Security – Fall 2012




Van Hoang Nguyen

More Related Content

Viewers also liked

Anatomy and physiology of central nervous system
Anatomy and physiology of central  nervous systemAnatomy and physiology of central  nervous system
Anatomy and physiology of central nervous system
aparna jayara
 
Pulse- Abnormal Findings
Pulse- Abnormal FindingsPulse- Abnormal Findings
Pulse- Abnormal Findings
Arya Anish
 
Tolerance & autoimmunity
Tolerance & autoimmunityTolerance & autoimmunity
Tolerance & autoimmunityOmar Moatamed
 
ERYTHROPOIESIS
ERYTHROPOIESISERYTHROPOIESIS
ERYTHROPOIESIS
Dr Nilesh Kate
 
Esr, pcv, blood indices copy
Esr, pcv, blood indices   copyEsr, pcv, blood indices   copy
Esr, pcv, blood indices copy
Janani Mathialagan
 
Chapter 10 Nervous System I - Basic Structure and Function
Chapter 10   Nervous System I - Basic Structure and FunctionChapter 10   Nervous System I - Basic Structure and Function
Chapter 10 Nervous System I - Basic Structure and Function
sgossett5757
 
Kidney function test
Kidney function testKidney function test
Kidney function testGavin Yap
 
URINE FORMATION
URINE FORMATIONURINE FORMATION
URINE FORMATION
Dr Nilesh Kate
 
Renal Function Tests by Dr.Ankur Puri
Renal Function Tests by Dr.Ankur PuriRenal Function Tests by Dr.Ankur Puri
Renal Function Tests by Dr.Ankur PuriAnkur Puri
 
Haemoglobin
Haemoglobin Haemoglobin
Haemoglobin
Dr Nilesh Kate
 
Introduction to nervous system
Introduction to nervous systemIntroduction to nervous system
Introduction to nervous systemStephanie Kennedy
 
Types of Arterial pulses
Types of  Arterial  pulsesTypes of  Arterial  pulses
Types of Arterial pulses
Dr. Amit Anand
 
Blood pressure
Blood pressure Blood pressure
Blood pressure
Dr Nilesh Kate
 
Central Nervous System 1
Central Nervous System 1Central Nervous System 1
Central Nervous System 1MBBS IMS MSU
 
introduction to central nervous system
introduction to central nervous systemintroduction to central nervous system
introduction to central nervous system
fouzia saleemi
 
The Nervous System (Slide Show)
The Nervous System (Slide Show)The Nervous System (Slide Show)
The Nervous System (Slide Show)
William Banaag
 
Regulation of gene expression in eukaryotes
Regulation of gene expression in eukaryotesRegulation of gene expression in eukaryotes
Regulation of gene expression in eukaryotes
Namrata Chhabra
 

Viewers also liked (20)

Anatomy and physiology of central nervous system
Anatomy and physiology of central  nervous systemAnatomy and physiology of central  nervous system
Anatomy and physiology of central nervous system
 
Pcv
PcvPcv
Pcv
 
Pulse- Abnormal Findings
Pulse- Abnormal FindingsPulse- Abnormal Findings
Pulse- Abnormal Findings
 
Sex Education For Girls
Sex Education For GirlsSex Education For Girls
Sex Education For Girls
 
Tolerance & autoimmunity
Tolerance & autoimmunityTolerance & autoimmunity
Tolerance & autoimmunity
 
ERYTHROPOIESIS
ERYTHROPOIESISERYTHROPOIESIS
ERYTHROPOIESIS
 
Esr, pcv, blood indices copy
Esr, pcv, blood indices   copyEsr, pcv, blood indices   copy
Esr, pcv, blood indices copy
 
Chapter 10 Nervous System I - Basic Structure and Function
Chapter 10   Nervous System I - Basic Structure and FunctionChapter 10   Nervous System I - Basic Structure and Function
Chapter 10 Nervous System I - Basic Structure and Function
 
Kidney function test
Kidney function testKidney function test
Kidney function test
 
URINE FORMATION
URINE FORMATIONURINE FORMATION
URINE FORMATION
 
Renal Function Tests by Dr.Ankur Puri
Renal Function Tests by Dr.Ankur PuriRenal Function Tests by Dr.Ankur Puri
Renal Function Tests by Dr.Ankur Puri
 
Haemoglobin
Haemoglobin Haemoglobin
Haemoglobin
 
Introduction to nervous system
Introduction to nervous systemIntroduction to nervous system
Introduction to nervous system
 
Types of Arterial pulses
Types of  Arterial  pulsesTypes of  Arterial  pulses
Types of Arterial pulses
 
Blood pressure
Blood pressure Blood pressure
Blood pressure
 
Central Nervous System 1
Central Nervous System 1Central Nervous System 1
Central Nervous System 1
 
introduction to central nervous system
introduction to central nervous systemintroduction to central nervous system
introduction to central nervous system
 
The Nervous System (Slide Show)
The Nervous System (Slide Show)The Nervous System (Slide Show)
The Nervous System (Slide Show)
 
Regulation of gene expression in eukaryotes
Regulation of gene expression in eukaryotesRegulation of gene expression in eukaryotes
Regulation of gene expression in eukaryotes
 
Gene therapy
Gene therapy Gene therapy
Gene therapy
 

Similar to Introduction to CNS Course

Introduction to Information Security Course
Introduction to Information Security CourseIntroduction to Information Security Course
Introduction to Information Security Course
Hoang Nguyen
 
Multiprocessor Systems
Multiprocessor SystemsMultiprocessor Systems
Multiprocessor SystemsHoang Nguyen
 
CLUSIR DU 12 JUIN
CLUSIR DU 12  JUIN CLUSIR DU 12  JUIN
CLUSIR DU 12 JUIN
ndelannoy
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Mark Underwood
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
sajid mehmood
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
Motty Ben Atia
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
Juniper Networks
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyie-Democracy Conference
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Massimiliano Mandolini
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
neoalt
 
Appsec Introduction
Appsec IntroductionAppsec Introduction
Appsec Introduction
Mohamed Ridha CHEBBI, CISSP
 
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Schneider Electric
 
Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...
Schneider Electric
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
IBM Sverige
 
SE-4101, Trustworthy multi-tenancy for the modern application ecosystem, by J...
SE-4101, Trustworthy multi-tenancy for the modern application ecosystem, by J...SE-4101, Trustworthy multi-tenancy for the modern application ecosystem, by J...
SE-4101, Trustworthy multi-tenancy for the modern application ecosystem, by J...
AMD Developer Central
 
Cloud Engineering
Cloud EngineeringCloud Engineering
Cloud Engineering
Gwendal Simon
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
IBMGovernmentCA
 

Similar to Introduction to CNS Course (20)

Introduction to Information Security Course
Introduction to Information Security CourseIntroduction to Information Security Course
Introduction to Information Security Course
 
Multiprocessor Systems
Multiprocessor SystemsMultiprocessor Systems
Multiprocessor Systems
 
Dtl 2012 q4_home.1
Dtl 2012 q4_home.1Dtl 2012 q4_home.1
Dtl 2012 q4_home.1
 
CLUSIR DU 12 JUIN
CLUSIR DU 12  JUIN CLUSIR DU 12  JUIN
CLUSIR DU 12 JUIN
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyi
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
 
Appsec Introduction
Appsec IntroductionAppsec Introduction
Appsec Introduction
 
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...
 
Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
 
SE-4101, Trustworthy multi-tenancy for the modern application ecosystem, by J...
SE-4101, Trustworthy multi-tenancy for the modern application ecosystem, by J...SE-4101, Trustworthy multi-tenancy for the modern application ecosystem, by J...
SE-4101, Trustworthy multi-tenancy for the modern application ecosystem, by J...
 
Cloud Engineering
Cloud EngineeringCloud Engineering
Cloud Engineering
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 

More from Hoang Nguyen

GANs and Applications
GANs and ApplicationsGANs and Applications
GANs and Applications
Hoang Nguyen
 
Scrum - An introduction
Scrum - An introductionScrum - An introduction
Scrum - An introduction
Hoang Nguyen
 
ORM in Django
ORM in DjangoORM in Django
ORM in Django
Hoang Nguyen
 
Introduction to Cross-platform App Development
Introduction to Cross-platform App DevelopmentIntroduction to Cross-platform App Development
Introduction to Cross-platform App Development
Hoang Nguyen
 
Conistency of random forests
Conistency of random forestsConistency of random forests
Conistency of random forests
Hoang Nguyen
 
Trust - Digital Signature
Trust - Digital SignatureTrust - Digital Signature
Trust - Digital Signature
Hoang Nguyen
 
Key Exchange
Key ExchangeKey Exchange
Key Exchange
Hoang Nguyen
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Stream ciphers
Stream ciphersStream ciphers
Stream ciphers
Hoang Nguyen
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
Hoang Nguyen
 
Information, Data and Decision Making
Information, Data and Decision MakingInformation, Data and Decision Making
Information, Data and Decision Making
Hoang Nguyen
 
Multiple processor systems
Multiple processor systemsMultiple processor systems
Multiple processor systemsHoang Nguyen
 
Introduction to AOS course
Introduction to AOS courseIntroduction to AOS course
Introduction to AOS course
Hoang Nguyen
 
Background Knowledge
Background KnowledgeBackground Knowledge
Background Knowledge
Hoang Nguyen
 
Dynamic Testing
Dynamic TestingDynamic Testing
Dynamic Testing
Hoang Nguyen
 
Nosql intro
Nosql introNosql intro
Nosql intro
Hoang Nguyen
 
Static Testing
Static TestingStatic Testing
Static Testing
Hoang Nguyen
 
Testing in the lifecycle
Testing in the lifecycleTesting in the lifecycle
Testing in the lifecycle
Hoang Nguyen
 
Fundamentals of Testing 2
Fundamentals of Testing 2Fundamentals of Testing 2
Fundamentals of Testing 2
Hoang Nguyen
 

More from Hoang Nguyen (20)

GANs and Applications
GANs and ApplicationsGANs and Applications
GANs and Applications
 
Scrum - An introduction
Scrum - An introductionScrum - An introduction
Scrum - An introduction
 
ORM in Django
ORM in DjangoORM in Django
ORM in Django
 
Introduction to Cross-platform App Development
Introduction to Cross-platform App DevelopmentIntroduction to Cross-platform App Development
Introduction to Cross-platform App Development
 
Conistency of random forests
Conistency of random forestsConistency of random forests
Conistency of random forests
 
Trust - Digital Signature
Trust - Digital SignatureTrust - Digital Signature
Trust - Digital Signature
 
Key Exchange
Key ExchangeKey Exchange
Key Exchange
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Stream ciphers
Stream ciphersStream ciphers
Stream ciphers
 
Classical ciphers
Classical ciphersClassical ciphers
Classical ciphers
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Information, Data and Decision Making
Information, Data and Decision MakingInformation, Data and Decision Making
Information, Data and Decision Making
 
Multiple processor systems
Multiple processor systemsMultiple processor systems
Multiple processor systems
 
Introduction to AOS course
Introduction to AOS courseIntroduction to AOS course
Introduction to AOS course
 
Background Knowledge
Background KnowledgeBackground Knowledge
Background Knowledge
 
Dynamic Testing
Dynamic TestingDynamic Testing
Dynamic Testing
 
Nosql intro
Nosql introNosql intro
Nosql intro
 
Static Testing
Static TestingStatic Testing
Static Testing
 
Testing in the lifecycle
Testing in the lifecycleTesting in the lifecycle
Testing in the lifecycle
 
Fundamentals of Testing 2
Fundamentals of Testing 2Fundamentals of Testing 2
Fundamentals of Testing 2
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Introduction to CNS Course

  • 1. Dept. of Computer Science – FITA – HUA Van Hoang Nguyen Mail: startnewday85@gmail.com Department of Computer Science – FITA – HUA Computer and Network Security ---------------------------------------- Fall 2012
  • 2. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 3. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 4. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 5. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 6. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 7. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 8. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 9. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 10. Computer & Network Security – Fall 2012 Not “to make the system as secure as possible” “To make the system as secure as possible within certain constraints” Cost Benefit, usability and convenience More security is not always better at all Van Hoang Nguyen 9
  • 11. Computer & Network Security – Fall 2012 Total vulnerabilities cataloged 9000 8000 7000 6000 5000 4000 3000 2000 1000 0 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 Sourced by http://www.cert.org/stats/cert_stats.html Van Hoang Nguyen
  • 12. Computer & Network Security – Fall 2012 Sourced by Charles Henderson - Trustwave 2011 Van Hoang Nguyen
  • 13. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 14. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 15. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 16. Computer & Network Security – Fall 2012 Part 1 Introduction Part 2 Program level Part 3 Application level Part 4 Viruses and Malware Part 5 The Trusted Computing Architecture Van Hoang Nguyen
  • 17. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 18. Computer & Network Security – Fall 2012 Attention 10% Mid 30% Final 60% Total 100% Van Hoang Nguyen
  • 19. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 20. Computer & Network Security – Fall 2012 Van Hoang Nguyen
  • 21. Computer & Network Security – Fall 2012 Van Hoang Nguyen