Hiroshima University Syllabus

Back to syllabus main page
Japanese
Academic Year 2026Year School/Graduate School Graduate School of Advanced Science and Engineering (Master's Course) Division of Advanced Science and Engineering Informatics and Data Science Program
Lecture Code WSN22201 Subject Classification Specialized Education
Subject Name 情報セキュリティ論
Subject Name
(Katakana)
ジョウホウセキュリティロン
Subject Name in
English
Information Security
Instructor NISHIMURA KOUJI,MURAKAMI YUKO,SHIMOJI HIROMU,WATANABE HIDENOBU
Instructor
(Katakana)
ニシムラ コウジ,ムラカミ ユウコ,シモジ ヒロム,ワタナベ ヒデノブ
Campus Higashi-Hiroshima Semester/Term 1st-Year,  Second Semester,  3Term
Days, Periods, and Classrooms (3T) Thur5-8
Lesson Style Lecture Lesson Style
(More Details)
Face-to-face, Online (simultaneous interactive)
In principle, lectures, discussions and student presentations are face-to-face, but face-to-face may be changed to online (simultaneous interactive). 
Credits 2.0 Class Hours/Week 4 Language of Instruction B : Japanese/English
Course Level 6 : Graduate Advanced
Course Area(Area) 25 : Science and Technology
Course Area(Discipline) 02 : Information Science
Eligible Students Master course students of Graduate School of Advanced Science and Engineering, Graduate School of Integrated Arts and Science
Keywords Information security, Security model, Crisis management 
Special Subject for Teacher Education   Special Subject  
Class Status
within Educational
Program
(Applicable only to targeted subjects for undergraduate students)
 
Criterion referenced
Evaluation
(Applicable only to targeted subjects for undergraduate students)
 
Class Objectives
/Class Outline
Information systems must be designed and operated with careful consideration of the balance among usability, security, and operational cost.
In this course, students will learn the fundamentals of information security and discuss basic cryptographic and authentication technologies that enable secure information exchange in the presence of security threats.
Case studies will be conducted on secure communication and user authentication systems that utilize these technologies.
The course also addresses system design and implementation models for information security that address contemporary security threats, as well as crisis management in information systems, with a particular focus on incident response.
In addition, humans themselves can be regarded as highly complex information systems that may encounter various types of trouble.
Even if technical countermeasures for information systems are well implemented, incidents involving users can still have a significant impact on those systems.
Based on this broad perspective of information systems—including human factors—students will discuss social systems, institutional frameworks, and human factors related to information security.
Through group discussions and presentations, students will examine societal challenges and explore possible responses and countermeasures. 
Class Schedule lesson1: Guidance and Introduction to Information Security (Murakami)
lesson2: Classification of Information Security and Security Threats (Watanabe)
lesson3: Cyber Attacks and Countermeasures (Nishimura)
lesson4: Fundamental Technologies of Information Security: Cryptography (Nishimura)
lesson5: Fundamental Technologies of Information Security: Authentication (Nishimura)
lesson6: Information Security Design (Watanabe)
lesson7: Zero Trust Security Model (Watanabe)
lesson8: Computer Security Incident Response (Watanabe)
lesson9: Implementation and Operational Management of Information Systems (Nishimura)
lesson10: Information Security Management Systems (Nishimura)
lesson11: Cloud Services and Security (Nishimura)
lesson12: Generative AI and Security (Nishimura)
lesson13: Group Discussion on Information Security (Shimoji, Murakami, Watanabe, Nishimura)
lesson14: Group Presentations on Information Security (Shimoji, Murakami, Watanabe, Nishimura)
lesson15: Group Presentations on Information Security (Shimoji, Murakami, Watanabe, Nishimura)

The lecturer may impose an assignment or report in the lecture.

The content, the lesson order or the lecturer may vary depending on the progress of the lecture. 
Text/Reference
Books,etc.
Handouts and other materials are provided in the lecture. 
PC or AV used in
Class,etc.
Handouts, Microsoft Teams, moodle
(More Details) The handouts will be placed on moodle, so please download them yourself.
Record the lesson so that you can look back on it later.  
Learning techniques to be incorporated Discussions, Quizzes/ Quiz format, Post-class Report
Suggestions on
Preparation and
Review
A basic knowledge of information systems and information networks are required. 
Requirements  
Grading Method Active participation in discussion (about 50%) and assignments or reports (about 50%). 
Practical Experience Experienced  
Summary of Practical Experience and Class Contents based on it The lecturer will instruct secure programming development techniques based on software development experience in an aeronautical system company and practical experience as an information security engineer who has licenses on registered information security specialist (RISS) and CAIS-Assistant. 
Message  
Other The main language used in the lesson will be Japanese, but English materials and subtitles will be provided. 
Please fill in the class improvement questionnaire which is carried out on all classes.
Instructors will reflect on your feedback and utilize the information for improving their teaching. 
Back to syllabus main page