IIST (Institute of Integrated Science and Technology)

Back to List

COT500D1(計算基盤 / Computing technologies 500)
IIST Special Lecture 2
Cyber Security

Keping YU

Class code etc
Faculty/Graduate school IIST (Institute of Integrated Science and Technology)
Attached documents
Year 2024
Class code YD966
Previous Class code
Previous Class title
Term 春学期授業/Spring
Day/Period 木4/Thu.4
Class Type
Campus 小金井 / Koganei
Classroom name 小西館‐ゼミ室1/W Seminar 1(6F)
Grade
Credit(s) 2
Notes
Class taught by instructors with practical experience

Show all

Hide All

Outline and objectives

This course provides students with basic knowledge and skills in the fundamental theories and practices of cyber security. A comprehensive introduction to the basic theory and application practice of cyberspace security, covering almost all aspects of the security field, focusing on basic concepts rather than overly in-depth technical details. Through the study of this course, students will be able to recognize security risks, enhance security awareness, and master prevention methods for future study.

Goal

1. To understand the basics of cyber security.
2. To outline the framework of cyber security.
3. To recognize the hidden dangers of cyber security, master the methods of cyberspace prevention, and raise awareness of cyber security.

Default language used in class

英語 / English

Method(s)(学期の途中で変更になる場合には、別途提示します。 /If the Method(s) is changed, we will announce the details of any changes. )

The lectures will be given in a highly interactive manner. The students will be asked to discuss the fundamental cybersecurity issues and consider their own solutions. Most homework assignments will be on open questions without standard answers. The students will be encouraged not only to learn the knowledge but also to think about how it can be used.

Active learning in class (Group discussion, Debate.etc.)

あり / Yes

Fieldwork in class

あり / Yes

Schedule

授業形態/methods of teaching:対面/face to face

※各回の授業形態は予定です。教員の指示に従ってください。

1[対面/face to face]:Introduction of Cyber Security

What is cyber security? Why is cyber security Important?

2[対面/face to face]:Toolbox

Fundamentals of authentication, access control, and cryptography.

3[対面/face to face]:Programs and Programming

Malicious Code—Malware. Countermeasures.

4[対面/face to face]:The Web—User Side

Browser Attacks. Web Attacks Targeting Users. Obtaining User or Website Data. Email Attacks.

5[対面/face to face]:Operating System

Security in Operating Systems. Security in the Design of Operating Systems. Rootkit.

6[対面/face to face]:Networks

Network Concepts. Threats to Network Communications. Wireless Network Security. Denial of Service. Distributed Denial-of-Service Strategic Defenses: Security Countermeasures. Cryptography in Network Security. Firewalls. Intrusion Detection and Prevention Systems. Network Management.

7[対面/face to face]:Databases

Introduction to Databases. Security Requirements of Databases. Reliability and Integrity. Database Disclosure. Data Mining and Big Data.

8[対面/face to face]:Cloud Computing

Cloud Computing Concepts. Moving to the Cloud. Cloud Security Tools and Techniques. Cloud Identity Management.

9[対面/face to face]:Internet of Things

Overview of IoT Security. Security and Privacy Protection in IoT Applications.

10[対面/face to face]:Privacy

Privacy Concepts. Privacy Principles and Policies. Authentication and Privacy. Data Mining. Privacy on the Web. Email Security. Privacy Impacts of Emerging Technologies. Where is the field headed?

11[対面/face to face]:Management and Incidents

Security Planning. Business Continuity Planning. Handling Incidents. Risk Analysis. Dealing with Disaster.

12[対面/face to face]:Physical and Environmental Security

Physical Security and Security Management. Industrial Control Device Security. Chip Security. Trusted Computing.

13[対面/face to face]:Legal Issues and Ethics

Protecting Programs and Data. Information and the Law. Redress for Software Failures. Computer Crime.
Ethical Issues in Computer Security. Incident Analysis with Ethics.

14[対面/face to face]:Blockchain

Blockchain Concepts. Digital Currency and Cryptocurrency. Consensus Mechanism. Smart Contracts. Blockchain Applications.

Work to be done outside of class (preparation, etc.)

【Preparatory study and review time for this class are 4 hours each.】Homework (reports and presentation).

Textbooks

Handouts and prints will be distributed.

References

Charles P. Pfleeger, Security in Computing, 5th Edition, Prentice Hall, 2015, ISBN-10: 0134085043

Grading criteria

Homework 50% + Final Presentation 50%

Changes following student comments

None in particular.