This document introduces Hoang V. Nguyen and their course on information security. It discusses what information and data are, how information can be kept safe, and the goals and structure of the course. The course will cover confidentiality, integrity, trust, and network security. It will use Cryptography and Network Security as its textbook and assessments will include attention, a midterm, and a final exam.
Report
Share
Report
Share
1 of 15
Download to read offline
More Related Content
Introduction to IS course
1. Information Safe
Introduction
Hoang V.Nguyen
Mail: startnewday85@gmail.com
Department of Computer Science
Faculty of Information Technology – Hanoi University of Agriculture
2. Welcome to IS Course!
• My name: Hoang V.Nguyen
• Mail: startnewday85@gmail.com
• Blog: startnewday85.blogspot.com
• Department of Computer Science
• My interesting:
– Computation Models
– Knowledge representation and discover
– Software Engineering
– Web science and Web technologies
About you?
4. What is information?
Information is a abstract notion, to denote
anything that is a result of interaction.
Some problems:
• Reperesentation and Storing
• Processing
• Transfer
• Safety
7. Information vs Data
Information Data
- Subjective - Objective
- Abstract - Visual
- Result of interaction - A component of interaction
Data is any sort of raw fact. Information is data in a usable form,
ussually processed in some way. It’s data plus interpretation.
8. How is “information safe”?
• Confidentiality
• Integrity
• Trust
• Others…
The safety of information is guarantee for some
properties of information. In a specific context,
specific properties must be guarantee
9. Why must we care
Because:
• Information is very very important
• Data is not safe
• Information safe is very interesting
• Finally, it’s your subject
10. Goal and objectives
• Understand the basic principles and
concepts of “information safe”
• Study main aspects of Network security
=> Then:
• Have a good background about “information
safe”
• Can study other fields such as data
security, database security, network
security, web security, …
• Can design security solutions
11. Syllabus & Textbook
• Syllabus
Part 1 Introduction
Part 2 Confidentiality
Part 3 Integrity
Part 4 Trust
Part 5 Network security
• Textbook
- Cryptography and Network security principles and
practices – William Stalling – 4th edition.
12. References
• Books
- Handbook of applied cryptography – A. Menezes, P.van Oorschot
and S. Vanstone
- Modern cryptography theory and practice - Wenbo Mao
- Cryptography Theory And Practice - Douglas Stinson
- The Codebreaker – David Kahn
- The codebook – Sighmon Sigh
• Videos