Introduction to IS course

Post on 12-May-2015

1.076 views 1 download

Tags:

description

A description to Information Safe Course.

Transcript of Introduction to IS course

Information Safe

Introduction

Hoang V.Nguyen

Mail: startnewday85@gmail.com

Department of Computer Science

Faculty of Information Technology – Hanoi University of Agriculture

Welcome to IS Course!• My name: Hoang V.Nguyen

• Mail: startnewday85@gmail.com

• Blog: startnewday85.blogspot.com

• Department of Computer Science

• My interesting:

– Computation Models

– Knowledge representation and discover

– Software Engineering

– Web science and Web technologies

About you?

What is information?

Information vs Data?

How is information safe?

What is information?

Some problems:

• Reperesentation and Storing

• Processing

• Transfer

• Safety

Information is a abstract notion, to denoteanything that is a result of interaction.

Information vs Data

• What is Data?

Information vs Data

Data is plain fact

Information vs Data

Information Data

Data is any sort of raw fact. Information is data in a usable form, ussually processed in some way. It’s data plus interpretation.

- Subjective - Objective

- Abstract - Visual

- Result of interaction - A component of interaction

How is “information safe”?

• Confidentiality

• Integrity

• Trust

• Others…

The safety of information is guarantee for some properties of information. In a specific context,

specific properties must be guarantee

Why must we care

Because:

• Information is very very important

• Data is not safe

• Information safe is very interesting

• Finally, it’s your subject

Goal and objectives• Understand the basic principles andconcepts of “information safe”

• Study main aspects of Network security

=> Then:

• Have a good background about “informationsafe”

• Can study other fields such as datasecurity, database security, networksecurity, web security, …

• Can design security solutions

Syllabus & Textbook• Syllabus

- Cryptography and Network security principles andpractices – William Stalling – 4th edition.

Part 1 Introduction

Part 2 Confidentiality

Part 3 Integrity

Part 4 Trust

Part 5 Network security

• Textbook

References- Handbook of applied cryptography – A. Menezes, P.van Oorschotand S. Vanstone

• Books

• Videos

- The Codebreaker – David Kahn

- The codebook – Sighmon Sigh

- Modern cryptography theory and practice - Wenbo Mao

- Cryptography Theory And Practice - Douglas Stinson

Prerequisites & Grading

- Mathematical background

- Basic programming skills

• Prerequisites

- Basic computer network

• Grading

Attention 20%

Mid 30%

Final 50%

Total 100%

Collaboration policy