Academic Year |
2024Year |
School/Graduate School |
Graduate School of Advanced Science and Engineering (Master's Course) Division of Advanced Science and Engineering Informatics and Data Science Program |
Lecture Code |
WSN22201 |
Subject Classification |
Specialized Education |
Subject Name |
情報セキュリティ論 |
Subject Name (Katakana) |
ジョウホウセキュリティロン |
Subject Name in English |
Information Security |
Instructor |
NISHIMURA KOUJI,IWASAWA KAZUO,MURAKAMI YUKO,WATANABE HIDENOBU |
Instructor (Katakana) |
ニシムラ コウジ,イワサワ カズオ,ムラカミ ユウコ,ワタナベ ヒデノブ |
Campus |
Higashi-Hiroshima |
Semester/Term |
1st-Year, Second Semester, 3Term |
Days, Periods, and Classrooms |
(3T) Thur5-8 |
Lesson Style |
Lecture |
Lesson Style (More Details) |
|
In principle, lectures, discussions and student presentations are face-to-face, but face-to-face may be changed to online (simultaneous interactive). |
Credits |
2.0 |
Class Hours/Week |
|
Language of Instruction |
B
:
Japanese/English |
Course Level |
6
:
Graduate Advanced
|
Course Area(Area) |
25
:
Science and Technology |
Course Area(Discipline) |
02
:
Information Science |
Eligible Students |
Master course students of Graduate School of Advanced Science and Engineering, Graduate School of Integrated Arts and Science |
Keywords |
Information security, Security model, Crisis management |
Special Subject for Teacher Education |
|
Special Subject |
|
Class Status within Educational Program (Applicable only to targeted subjects for undergraduate students) | |
---|
Criterion referenced Evaluation (Applicable only to targeted subjects for undergraduate students) | |
Class Objectives /Class Outline |
Information systems must consider the balance between convenience, security, and operating costs. Humans themselves are advanced information systems and encounter various troubles in the surrounding environment. Even if you can protect the data on your PC, if you find yourself in trouble, the work you are in charge of will be affected. We will discuss information systems in a broad sense, including human systems, mainly from the perspective of trouble prevention, based on social systems and human factors. (Iwasawa) Through recent cases of information security threats, we will discuss system design and implementation models in information security, as well as incident response. (Watanabe) We will discuss cryptographic technologies and authentication technologies for realizing secure information distribution against information security threats, and conduct case studies of secure communication systems and user authentication systems that use them. In addition, we will discuss crisis management in information systems. (Nishimura) In addition to learn the basics of information security, group discussions and presentations will be conducted on responses and measures to social issues related to information security. (Murakami) |
Class Schedule |
lesson1: Guidance, Introduction to information security (Nishimura, Watanabe, Iwasawa and Murakami) lesson2: Managing and understanding information systems (Iwasawa) lesson3: Social information systems: Tools (Iwasawa) lesson4: Social information systems: Social systems and actions based on information (Iwasawa) lesson5: Information systems and human factors (Iwasawa) lesson6: Information security classification and threats (Watanabe) lesson7: Information security design (Watanabe) lesson8: Zero trust security model (Watanabe) lesson9: Computer security incident response (Watanabe) lesson10: Basic technologies for information security: Cryptography (Nishimura) lesson11: Basic technologies for information security: Authentication (Nishimura) lesson12: Basic technologies for information security: Access control (Nishimura) lesson13: Crisis management in information systems (Nishimura) lesson14: Group Discussion on information security (Murakami, Nishimura, Watanabe and Iwasawa) lesson15: Group Presentation on information security (Murakami, Nishimura, Watanabe and Iwasawa)
The lecturer may impose an assignment or report in the lecture.
The content or the order of the lesson may vary due to the progress of the lecture. |
Text/Reference Books,etc. |
Handouts and other materials are provided in the lecture. |
PC or AV used in Class,etc. |
|
(More Details) |
The handouts will be placed on moodle, so please download them yourself. Record the lesson so that you can look back on it later. |
Learning techniques to be incorporated |
|
Suggestions on Preparation and Review |
A basic knowledge of information systems and information networks are required. |
Requirements |
|
Grading Method |
Active participation in discussion (about 50%) and assignments or reports (about 50%). |
Practical Experience |
Experienced
|
Summary of Practical Experience and Class Contents based on it |
The lecturer will instruct secure programming development techniques based on software development experience in an aeronautical system company and practical experience as an information security engineer who has licenses on registered information security specialist (RISS) and CAIS-Assistant. |
Message |
|
Other |
The language of instruction will be decided and announced by the lecturer on the first day of the lesson based on the language proficiency of the students. |
Please fill in the class improvement questionnaire which is carried out on all classes. Instructors will reflect on your feedback and utilize the information for improving their teaching. |