introduction to is course
DESCRIPTION
A description to Information Safe Course.TRANSCRIPT
Information Safe
Introduction
Hoang V.Nguyen
Mail: [email protected]
Department of Computer Science
Faculty of Information Technology – Hanoi University of Agriculture
Welcome to IS Course!• My name: Hoang V.Nguyen
• Mail: [email protected]
• Blog: startnewday85.blogspot.com
• Department of Computer Science
• My interesting:
– Computation Models
– Knowledge representation and discover
– Software Engineering
– Web science and Web technologies
About you?
What is information?
Information vs Data?
How is information safe?
What is information?
Some problems:
• Reperesentation and Storing
• Processing
• Transfer
• Safety
Information is a abstract notion, to denoteanything that is a result of interaction.
Information vs Data
• What is Data?
Information vs Data
Data is plain fact
Information vs Data
Information Data
Data is any sort of raw fact. Information is data in a usable form, ussually processed in some way. It’s data plus interpretation.
- Subjective - Objective
- Abstract - Visual
- Result of interaction - A component of interaction
How is “information safe”?
• Confidentiality
• Integrity
• Trust
• Others…
The safety of information is guarantee for some properties of information. In a specific context,
specific properties must be guarantee
Why must we care
Because:
• Information is very very important
• Data is not safe
• Information safe is very interesting
• Finally, it’s your subject
Goal and objectives• Understand the basic principles andconcepts of “information safe”
• Study main aspects of Network security
=> Then:
• Have a good background about “informationsafe”
• Can study other fields such as datasecurity, database security, networksecurity, web security, …
• Can design security solutions
Syllabus & Textbook• Syllabus
- Cryptography and Network security principles andpractices – William Stalling – 4th edition.
Part 1 Introduction
Part 2 Confidentiality
Part 3 Integrity
Part 4 Trust
Part 5 Network security
• Textbook
References- Handbook of applied cryptography – A. Menezes, P.van Oorschotand S. Vanstone
• Books
• Videos
- The Codebreaker – David Kahn
- The codebook – Sighmon Sigh
- Modern cryptography theory and practice - Wenbo Mao
- Cryptography Theory And Practice - Douglas Stinson
Prerequisites & Grading
- Mathematical background
- Basic programming skills
• Prerequisites
- Basic computer network
• Grading
Attention 20%
Mid 30%
Final 50%
Total 100%
Collaboration policy