Hiroshima University Syllabus

Back to syllabus main page
Japanese
Academic Year 2024Year School/Graduate School Graduate School of Advanced Science and Engineering (Master's Course) Division of Advanced Science and Engineering Informatics and Data Science Program
Lecture Code WSN22201 Subject Classification Specialized Education
Subject Name 情報セキュリティ論
Subject Name
(Katakana)
ジョウホウセキュリティロン
Subject Name in
English
Information Security
Instructor NISHIMURA KOUJI,IWASAWA KAZUO,MURAKAMI YUKO,WATANABE HIDENOBU
Instructor
(Katakana)
ニシムラ コウジ,イワサワ カズオ,ムラカミ ユウコ,ワタナベ ヒデノブ
Campus Higashi-Hiroshima Semester/Term 1st-Year,  Second Semester,  3Term
Days, Periods, and Classrooms (3T) Thur5-8
Lesson Style Lecture Lesson Style
(More Details)
 
In principle, lectures, discussions and student presentations are face-to-face, but face-to-face may be changed to online (simultaneous interactive). 
Credits 2.0 Class Hours/Week   Language of Instruction B : Japanese/English
Course Level 6 : Graduate Advanced
Course Area(Area) 25 : Science and Technology
Course Area(Discipline) 02 : Information Science
Eligible Students Master course students of Graduate School of Advanced Science and Engineering, Graduate School of Integrated Arts and Science
Keywords Information security, Security model, Crisis management 
Special Subject for Teacher Education   Special Subject  
Class Status
within Educational
Program
(Applicable only to targeted subjects for undergraduate students)
 
Criterion referenced
Evaluation
(Applicable only to targeted subjects for undergraduate students)
 
Class Objectives
/Class Outline
Information systems must consider the balance between convenience, security, and operating costs. Humans themselves are advanced information systems and encounter various troubles in the surrounding environment. Even if you can protect the data on your PC, if you find yourself in trouble, the work you are in charge of will be affected. We will discuss information systems in a broad sense, including human systems, mainly from the perspective of trouble prevention, based on social systems and human factors. (Iwasawa)
Through recent cases of information security threats, we will discuss system design and implementation models in information security, as well as incident response. (Watanabe)
We will discuss cryptographic technologies and authentication technologies for realizing secure information distribution against information security threats, and conduct case studies of secure communication systems and user authentication systems that use them. In addition, we will discuss crisis management in information systems. (Nishimura)
In addition to learn the basics of information security, group discussions and presentations will be conducted on responses and measures to social issues related to information security. (Murakami) 
Class Schedule lesson1: Guidance, Introduction to information security  (Nishimura, Watanabe, Iwasawa and Murakami)
lesson2: Managing and understanding information systems (Iwasawa)
lesson3: Social information systems: Tools (Iwasawa)
lesson4: Social information systems: Social systems and actions based on information (Iwasawa)
lesson5: Information systems and human factors (Iwasawa)
lesson6: Information security classification and threats (Watanabe)
lesson7: Information security design (Watanabe)
lesson8: Zero trust security model (Watanabe)
lesson9: Computer security incident response (Watanabe)
lesson10: Basic technologies for information security: Cryptography (Nishimura)
lesson11: Basic technologies for information security: Authentication (Nishimura)
lesson12: Basic technologies for information security: Access control (Nishimura)
lesson13: Crisis management in information systems (Nishimura)
lesson14: Group Discussion on information security (Murakami, Nishimura, Watanabe and Iwasawa)
lesson15: Group Presentation on information security (Murakami, Nishimura, Watanabe and Iwasawa)

The lecturer may impose an assignment or report in the lecture.

The content or the order of the lesson may vary due to the progress of the lecture. 
Text/Reference
Books,etc.
Handouts and other materials are provided in the lecture. 
PC or AV used in
Class,etc.
 
(More Details) The handouts will be placed on moodle, so please download them yourself.
Record the lesson so that you can look back on it later.  
Learning techniques to be incorporated  
Suggestions on
Preparation and
Review
A basic knowledge of information systems and information networks are required. 
Requirements  
Grading Method Active participation in discussion (about 50%) and assignments or reports (about 50%). 
Practical Experience Experienced  
Summary of Practical Experience and Class Contents based on it The lecturer will instruct secure programming development techniques based on software development experience in an aeronautical system company and practical experience as an information security engineer who has licenses on registered information security specialist (RISS) and CAIS-Assistant. 
Message  
Other The language of instruction will be decided and announced by the lecturer on the first day of the lesson based on the language proficiency of the students. 
Please fill in the class improvement questionnaire which is carried out on all classes.
Instructors will reflect on your feedback and utilize the information for improving their teaching. 
Back to syllabus main page