Information Security
( Мэдээллийн нууцлал хамгаалалт)
            2011 Хавар
   http://gantur-course.blogspot.com
Contact information

Instructor: Тогтохын Гантөр
 – Email: gantur_t@yahoo.com
 – Office Hours in B306(КПХ ТЭНХИМ):
      • Wed 08:00-17:00
      • Unless there is a dept. meeting or class
      • Else, by appointment
Prerequisites
• At least one of:
       – Computer Networks
       – Network Programming (Socket)
       – Wireless Networks
       – Mobile Communications
• At least one of:
       – Network Security
       – Cryptography
       – Data Structures
       – Computer Algorithms
Prerequisites
• At least one of:
       – Computer Networks
       – Network Programming (Socket)
                 Бага зэрэг Англи
       – Wireless Networks
                        хэл
       – Mobile Communications
• At least one of:
       – Network Security
       – Cryptography
       – Data Structures
       – Computer Algorithms
Attendance and Attitude
• Attendance
      – Absence: 40 минутаас дээш
      – 3 times Late: 1 Absence.
      – 1 times absence: -1.5 pt.
      – More than 8 absences: F

• Penalties on Bad Attitudes
     – Leave room without notice (on the Lecture): -1 pts.
     – Mobile phone ringing (on the Lecture): -1 pt.
     – Chat: -1 pt. every 20 mins (on the Lecture)
Course Grading

Багш:
  - Ирц:         10
  - Идэвхи:      10
  - Сорил:       20
  - Бие даалт:   30


Шалгалт:         30
Course Textbooks/References

• Textbooks
      – No textbooks required.
      – All materials will be provided or informed.
• References
      – Network security
also

• This is not first offering in Ulaanbaatar University
• I will make mistake
• I want your feedback!
• Please ask lots of questions
Bird’s eye view


     Network               Ubiquitous
     security     Crypto
                           Computing
Bird’s eye view

                Энэ хичээл
     Network                 Ubiquitous
     security     Crypto
                             Computing
Өнөөдөр
  • Introduction to Ubiquitous Computing
  • Definitions of Ubiquitous Computing
  • Future Ubiquitous Life

Lecture 01

  • 1.
    Information Security ( Мэдээллийннууцлал хамгаалалт) 2011 Хавар http://gantur-course.blogspot.com
  • 2.
    Contact information Instructor: ТогтохынГантөр – Email: gantur_t@yahoo.com – Office Hours in B306(КПХ ТЭНХИМ): • Wed 08:00-17:00 • Unless there is a dept. meeting or class • Else, by appointment
  • 3.
    Prerequisites • At leastone of: – Computer Networks – Network Programming (Socket) – Wireless Networks – Mobile Communications • At least one of: – Network Security – Cryptography – Data Structures – Computer Algorithms
  • 4.
    Prerequisites • At leastone of: – Computer Networks – Network Programming (Socket) Бага зэрэг Англи – Wireless Networks хэл – Mobile Communications • At least one of: – Network Security – Cryptography – Data Structures – Computer Algorithms
  • 5.
    Attendance and Attitude •Attendance – Absence: 40 минутаас дээш – 3 times Late: 1 Absence. – 1 times absence: -1.5 pt. – More than 8 absences: F • Penalties on Bad Attitudes – Leave room without notice (on the Lecture): -1 pts. – Mobile phone ringing (on the Lecture): -1 pt. – Chat: -1 pt. every 20 mins (on the Lecture)
  • 6.
    Course Grading Багш: - Ирц: 10 - Идэвхи: 10 - Сорил: 20 - Бие даалт: 30 Шалгалт: 30
  • 7.
    Course Textbooks/References • Textbooks – No textbooks required. – All materials will be provided or informed. • References – Network security
  • 8.
    also • This isnot first offering in Ulaanbaatar University • I will make mistake • I want your feedback! • Please ask lots of questions
  • 9.
    Bird’s eye view Network Ubiquitous security Crypto Computing
  • 10.
    Bird’s eye view Энэ хичээл Network Ubiquitous security Crypto Computing
  • 11.
    Өнөөдөр •Introduction to Ubiquitous Computing • Definitions of Ubiquitous Computing • Future Ubiquitous Life