Top Banner
Information Safe Introduction Hoang V.Nguyen Mail: [email protected] Department of Computer Science Faculty of Information Technology Hanoi University of Agriculture
15

Introduction to IS course

May 12, 2015

Download

Technology

Hoang Nguyen

A description to Information Safe Course.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction to IS course

Information Safe

Introduction

Hoang V.Nguyen

Mail: [email protected]

Department of Computer Science

Faculty of Information Technology – Hanoi University of Agriculture

Page 2: Introduction to IS course

Welcome to IS Course!• My name: Hoang V.Nguyen

• Mail: [email protected]

• Blog: startnewday85.blogspot.com

• Department of Computer Science

• My interesting:

– Computation Models

– Knowledge representation and discover

– Software Engineering

– Web science and Web technologies

About you?

Page 3: Introduction to IS course

What is information?

Information vs Data?

How is information safe?

Page 4: Introduction to IS course

What is information?

Some problems:

• Reperesentation and Storing

• Processing

• Transfer

• Safety

Information is a abstract notion, to denoteanything that is a result of interaction.

Page 5: Introduction to IS course

Information vs Data

• What is Data?

Page 6: Introduction to IS course

Information vs Data

Data is plain fact

Page 7: Introduction to IS course

Information vs Data

Information Data

Data is any sort of raw fact. Information is data in a usable form, ussually processed in some way. It’s data plus interpretation.

- Subjective - Objective

- Abstract - Visual

- Result of interaction - A component of interaction

Page 8: Introduction to IS course

How is “information safe”?

• Confidentiality

• Integrity

• Trust

• Others…

The safety of information is guarantee for some properties of information. In a specific context,

specific properties must be guarantee

Page 9: Introduction to IS course

Why must we care

Because:

• Information is very very important

• Data is not safe

• Information safe is very interesting

• Finally, it’s your subject

Page 10: Introduction to IS course

Goal and objectives• Understand the basic principles andconcepts of “information safe”

• Study main aspects of Network security

=> Then:

• Have a good background about “informationsafe”

• Can study other fields such as datasecurity, database security, networksecurity, web security, …

• Can design security solutions

Page 11: Introduction to IS course

Syllabus & Textbook• Syllabus

- Cryptography and Network security principles andpractices – William Stalling – 4th edition.

Part 1 Introduction

Part 2 Confidentiality

Part 3 Integrity

Part 4 Trust

Part 5 Network security

• Textbook

Page 12: Introduction to IS course

References- Handbook of applied cryptography – A. Menezes, P.van Oorschotand S. Vanstone

• Books

• Videos

- The Codebreaker – David Kahn

- The codebook – Sighmon Sigh

- Modern cryptography theory and practice - Wenbo Mao

- Cryptography Theory And Practice - Douglas Stinson

Page 13: Introduction to IS course

Prerequisites & Grading

- Mathematical background

- Basic programming skills

• Prerequisites

- Basic computer network

• Grading

Attention 20%

Mid 30%

Final 50%

Total 100%

Page 14: Introduction to IS course

Collaboration policy

Page 15: Introduction to IS course