Recap of my works 2 Outline Prologue Software

  • Slides: 10
Download presentation
Recap of my works

Recap of my works

2 Outline Prologue Software development Information security

2 Outline Prologue Software development Information security

3 Prologue Although sharing my work can help you to decide whatever you can

3 Prologue Although sharing my work can help you to decide whatever you can assign task to me or not. I am rather to hide the details of my work because those works are confidential. All I can do is sharing a few resources that I used in my work for proofing my capabilities on software development and information security.

4 Software Development Experienced topics related to software development UML (Unified Modeling Language) DB,

4 Software Development Experienced topics related to software development UML (Unified Modeling Language) DB, DBMS (include DB 2, MS-SQL, My. SQL…) Frontend (includes j. Query, JSON, RWD, Typescript…) Backend (includes SOAP, RESTful, Spring, Hibernate, ISO 8583…) Crypto modules (digital certificate, PKCS#11, MAC, AES, RSA, ECC, SHA 2…) OS (AIX, Windows, DOS, Android, Mac)

5 Software development KMS (Key Management System) development HSM (Hardware Security Module) G/W (Gateway)

5 Software development KMS (Key Management System) development HSM (Hardware Security Module) G/W (Gateway) SP (a service point that I cannot let you know)

6 Software development (cont. ) Building gateway for LINE Pay integration

6 Software development (cont. ) Building gateway for LINE Pay integration

7 Information Security (cont. ) Experienced topics related to information security GDPR (General Data

7 Information Security (cont. ) Experienced topics related to information security GDPR (General Data Protection Regulation) Blockchain Creditcard payment service Apple. Pay, Google. Pay, LINE Pay and Samsung. Pay OWASP top 10 ECC (Elliptic curve cryptography)

8 Information Security Concept of Time-Bound Hierarchical Key Assignment The diagram came from my

8 Information Security Concept of Time-Bound Hierarchical Key Assignment The diagram came from my master's thesis

9 Information Security (cont. ) Memo of CISSP (Certified Information Systems Security Professional) course

9 Information Security (cont. ) Memo of CISSP (Certified Information Systems Security Professional) course

10 Find me LINE: @nickjjs E-mail: nicknelous@gmail. com

10 Find me LINE: @nickjjs E-mail: nicknelous@gmail. com