IISTIIST (Institute of Integrated Science and Technology)
COT500D1(計算基盤 / Computing technologies 500)IIST Special Lecture 2IIST Special Lecture 2
Cyber Security
余 恪平Keping YU
授業コードなどClass code etc
学部・研究科Faculty/Graduate school | IISTIIST (Institute of Integrated Science and Technology) |
添付ファイル名Attached documents | |
年度Year | 2024 |
授業コードClass code | YD966 |
旧授業コードPrevious Class code | |
旧科目名Previous Class title | |
開講時期Term | 春学期授業/Spring |
曜日・時限Day/Period | 木4/Thu.4 |
科目種別Class Type | |
キャンパスCampus | 小金井 / Koganei |
教室名称Classroom name | 小西館‐ゼミ室1/W Seminar 1(6F) |
配当年次Grade | |
単位数Credit(s) | 2 |
備考(履修条件等)Notes | |
実務経験のある教員による授業科目Class taught by instructors with practical experience |
すべて開くShow all
すべて閉じるHide All
授業の概要と目的(何を学ぶか)Outline and objectives
This course provides students with basic knowledge and skills in the fundamental theories and practices of cyber security. A comprehensive introduction to the basic theory and application practice of cyberspace security, covering almost all aspects of the security field, focusing on basic concepts rather than overly in-depth technical details. Through the study of this course, students will be able to recognize security risks, enhance security awareness, and master prevention methods for future study.
到達目標Goal
1. To understand the basics of cyber security.
2. To outline the framework of cyber security.
3. To recognize the hidden dangers of cyber security, master the methods of cyberspace prevention, and raise awareness of cyber security.
授業で使用する言語Default language used in class
英語 / English
授業の進め方と方法Method(s)(学期の途中で変更になる場合には、別途提示します。 /If the Method(s) is changed, we will announce the details of any changes. )
The lectures will be given in a highly interactive manner. The students will be asked to discuss the fundamental cybersecurity issues and consider their own solutions. Most homework assignments will be on open questions without standard answers. The students will be encouraged not only to learn the knowledge but also to think about how it can be used.
アクティブラーニング(グループディスカッション、ディベート等)の実施Active learning in class (Group discussion, Debate.etc.)
あり / Yes
フィールドワーク(学外での実習等)の実施Fieldwork in class
あり / Yes
授業計画Schedule
授業形態/methods of teaching:対面/face to face
※各回の授業形態は予定です。教員の指示に従ってください。
1[対面/face to face]:Introduction of Cyber Security
What is cyber security? Why is cyber security Important?
2[対面/face to face]:Toolbox
Fundamentals of authentication, access control, and cryptography.
3[対面/face to face]:Programs and Programming
Malicious Code—Malware. Countermeasures.
4[対面/face to face]:The Web—User Side
Browser Attacks. Web Attacks Targeting Users. Obtaining User or Website Data. Email Attacks.
5[対面/face to face]:Operating System
Security in Operating Systems. Security in the Design of Operating Systems. Rootkit.
6[対面/face to face]:Networks
Network Concepts. Threats to Network Communications. Wireless Network Security. Denial of Service. Distributed Denial-of-Service Strategic Defenses: Security Countermeasures. Cryptography in Network Security. Firewalls. Intrusion Detection and Prevention Systems. Network Management.
7[対面/face to face]:Databases
Introduction to Databases. Security Requirements of Databases. Reliability and Integrity. Database Disclosure. Data Mining and Big Data.
8[対面/face to face]:Cloud Computing
Cloud Computing Concepts. Moving to the Cloud. Cloud Security Tools and Techniques. Cloud Identity Management.
9[対面/face to face]:Internet of Things
Overview of IoT Security. Security and Privacy Protection in IoT Applications.
10[対面/face to face]:Privacy
Privacy Concepts. Privacy Principles and Policies. Authentication and Privacy. Data Mining. Privacy on the Web. Email Security. Privacy Impacts of Emerging Technologies. Where is the field headed?
11[対面/face to face]:Management and Incidents
Security Planning. Business Continuity Planning. Handling Incidents. Risk Analysis. Dealing with Disaster.
12[対面/face to face]:Physical and Environmental Security
Physical Security and Security Management. Industrial Control Device Security. Chip Security. Trusted Computing.
13[対面/face to face]:Legal Issues and Ethics
Protecting Programs and Data. Information and the Law. Redress for Software Failures. Computer Crime.
Ethical Issues in Computer Security. Incident Analysis with Ethics.
14[対面/face to face]:Blockchain
Blockchain Concepts. Digital Currency and Cryptocurrency. Consensus Mechanism. Smart Contracts. Blockchain Applications.
授業時間外の学習(準備学習・復習・宿題等)Work to be done outside of class (preparation, etc.)
【Preparatory study and review time for this class are 4 hours each.】Homework (reports and presentation).
テキスト(教科書)Textbooks
Handouts and prints will be distributed.
参考書References
Charles P. Pfleeger, Security in Computing, 5th Edition, Prentice Hall, 2015, ISBN-10: 0134085043
成績評価の方法と基準Grading criteria
Homework 50% + Final Presentation 50%
学生の意見等からの気づきChanges following student comments
None in particular.