Differences

This shows you the differences between two versions of the page.

Link to this comparison view

events:individual_past_events:2009-02-23_edward_jung_lecture [2009/02/27 10:11] (current)
Line 1: Line 1:
 +/* If you have not already done so, please begin the heading below 
 +   with a date in YYYY-MM-DD format followed by a short description.
 +   This is what will appear in the event listing and the event list 
 +   ​itself is sorted by this.   */
 +
 +==== 2009-02-23 Edward Jung Lecture ====
 +
 +<​html><​center></​html>​
 +Edward Jung\\
 +\\
 +Murray Visiting Professor\\ ​
 +Dept. of Computer Science at Rutgers University\\
 +Monday, February 23, 2009\\
 +OLB classroom 105, 4pm\\
 +\\
 +**Information Security: Is this a good field to study?**
 +<​html></​center></​html>​
 +\\
 +Historically,​ the need for security goes back to almost 4000 years ago, B.C. 2000. However, it was during World War II when many modern security solutions were developed. The target application was primarily the war-related events. More recently, in the late ‘70s, the application of the modern security solution into the commercial realm became a reality with the advent of a security concept and technology known as “public-key cryptography”. For instance, the e-commerce application such as Internet banking was built based on this model. ​ As we enter society in the 21st century, new reliable services are and will be in demand (in both public and private sectors); it will be worthwhile to review and discuss the current status and future prospects on the work of information security. \\
 +
 +In this talk, we will start with reviewing historical perspectives on information security. Two fundamental human activities, i.e., various types of attacks and their counter-measures,​ will be studied in order to understand the risks involved in our daily life. Some of the topics include technical issues such as wireless security and mobile anti-virus protection, as well as social issues such as privacy (e.g., location privacy) and identity theft. Then, a list of practical applications and industry sectors where information security plays an important role will be presented. Finally, a list of potential undergraduate research topics will be briefly introduced. The primary goal of this talk is to provide undergraduate students with minimum technical background on this area with the opportunity to learn (‘feel’) this interesting field of study. \\
 +
 +Bio: \\
 +
 +Edward Jung is a Murray Visiting Professor in the Dept. of Computer Science at Rutgers University. His current research interest is in secure and reliable computing and networking with an emphasis on enhancing trustworthiness of mobile computing and wireless networks. From 1997 until 2003, he was a member of Technical Staff at Bell Labs, where he conducted research work in the areas of wireless data networks and network security. From 2003 until 2007, he worked on information security at Samsung Research, where he was director of the research group. He has co-authored about 30 technical publications and holds 60 US/​international patents on these topics. He received an undergraduate degree (B.S. with Distinction) and a Ph.D. in Computer Science from University of Minnesota, Minneapolis.
 +