Edward Jung

Murray Visiting Professor
Dept. of Computer Science at Rutgers University
Monday, February 23, 2009
OLB classroom 105, 4pm

Information Security: Is this a good field to study?

Historically, the need for security goes back to almost 4000 years ago, B.C. 2000. However, it was during World War II when many modern security solutions were developed. The target application was primarily the war-related events. More recently, in the late ‘70s, the application of the modern security solution into the commercial realm became a reality with the advent of a security concept and technology known as “public-key cryptography”. For instance, the e-commerce application such as Internet banking was built based on this model. As we enter society in the 21st century, new reliable services are and will be in demand (in both public and private sectors); it will be worthwhile to review and discuss the current status and future prospects on the work of information security.

In this talk, we will start with reviewing historical perspectives on information security. Two fundamental human activities, i.e., various types of attacks and their counter-measures, will be studied in order to understand the risks involved in our daily life. Some of the topics include technical issues such as wireless security and mobile anti-virus protection, as well as social issues such as privacy (e.g., location privacy) and identity theft. Then, a list of practical applications and industry sectors where information security plays an important role will be presented. Finally, a list of potential undergraduate research topics will be briefly introduced. The primary goal of this talk is to provide undergraduate students with minimum technical background on this area with the opportunity to learn (‘feel’) this interesting field of study.

Bio:

Edward Jung is a Murray Visiting Professor in the Dept. of Computer Science at Rutgers University. His current research interest is in secure and reliable computing and networking with an emphasis on enhancing trustworthiness of mobile computing and wireless networks. From 1997 until 2003, he was a member of Technical Staff at Bell Labs, where he conducted research work in the areas of wireless data networks and network security. From 2003 until 2007, he worked on information security at Samsung Research, where he was director of the research group. He has co-authored about 30 technical publications and holds 60 US/international patents on these topics. He received an undergraduate degree (B.S. with Distinction) and a Ph.D. in Computer Science from University of Minnesota, Minneapolis.