SlideShare a Scribd company logo
Van Hoang Nguyen
Mail: startnewday85@gmail.com
Department of Computer Science – FITA – HUA
Information Security Course --------------------------------------------- Fall 2013
Dept. of Computer Science – FITA – HUA
Information Security ------------- Fall 2013
Van Hoang Nguyen
こんにちは
Information Security ------------- Fall 2013
Van Hoang Nguyen
你好
Information Security ------------- Fall 2013
Van Hoang Nguyen
2
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
你好
2
こんにちは
Information Security ------------- Fall 2013
Van Hoang Nguyen 6
What is information?
What is data?
Information vs. Data?
Information Security ------------- Fall 2013
Van Hoang Nguyen
你好
2
こんにちは
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Dopamine
Information Security ------------- Fall 2013
Van Hoang Nguyen
What is "real"?
How do you define "real"?
If you're talking about what you can feel ... what you can smell, what you can
taste and see ... then "real" is simply electrical signals interpreted by your brain.
Information Security ------------- Fall 2013
Van Hoang Nguyen
Objective Subjective
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Association
Information Security ------------- Fall 2013
Van Hoang Nguyen
Data is any sort of raw fact. Information is data in a usable form, usually
processed in some way. It’s data plus interpretation.
Information Security ------------- Fall 2013
Van Hoang Nguyen 34
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
“fragility of our senses”
Information Security ------------- Fall 2013
Van Hoang Nguyen
4
28
17
12
100 98 100 100 100 100
86
% of drivers donating organs
Information Security ------------- Fall 2013
Van Hoang Nguyen
Opt-in
Opt-out
Information Security ------------- Fall 2013
Van Hoang Nguyen
? ?
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
What a piece of work is a man! how noble in reason!
how infinite in faculty! in form and moving how express
and admirable! in action how like an angle!
in apprehension how like a god!
Will Shakespeare (Act II, scene 2, of Hamlet)
the beauty of the world! the paragon of animals!
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Balancing usability & security
is always a challenge
Note: Engineering Security - Peter Gutmann (2013)
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen

More Related Content

PDF
Stream ciphers
PDF
Classical ciphers
PDF
Key Exchange
PDF
Background Knowledge
PDF
Introduction to Information Security Course
PDF
Multiple processor systems
PDF
XML DOM
PPTX
Basic XML
Stream ciphers
Classical ciphers
Key Exchange
Background Knowledge
Introduction to Information Security Course
Multiple processor systems
XML DOM
Basic XML

More from Hoang Nguyen (20)

PDF
GANs and Applications
PDF
Scrum - An introduction
PDF
ORM in Django
PDF
Introduction to Cross-platform App Development
PDF
Conistency of random forests
PDF
Trust - Digital Signature
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PDF
Confidentiality
PDF
Multiprocessor Systems
PDF
Introduction to AOS course
PDF
Introduction to CNS Course
PDF
Dynamic Testing
PDF
Nosql intro
PDF
Static Testing
PDF
Testing in the lifecycle
PDF
Fundamentals of Testing 2
PDF
Fundamentals of testing 1
PDF
Why the Semantic Web will nerver work
PDF
IS sum up 2011
PDF
GANs and Applications
Scrum - An introduction
ORM in Django
Introduction to Cross-platform App Development
Conistency of random forests
Trust - Digital Signature
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Confidentiality
Multiprocessor Systems
Introduction to AOS course
Introduction to CNS Course
Dynamic Testing
Nosql intro
Static Testing
Testing in the lifecycle
Fundamentals of Testing 2
Fundamentals of testing 1
Why the Semantic Web will nerver work
IS sum up 2011
Ad

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Big Data Technologies - Introduction.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Encapsulation theory and applications.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Spectroscopy.pptx food analysis technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
A Presentation on Artificial Intelligence
The Rise and Fall of 3GPP – Time for a Sabbatical?
Big Data Technologies - Introduction.pptx
A comparative analysis of optical character recognition models for extracting...
sap open course for s4hana steps from ECC to s4
Encapsulation theory and applications.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectroscopy.pptx food analysis technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Ad

Information, Data and Decision Making