| Academic Year |
2026Year |
School/Graduate School |
Graduate School of Advanced Science and Engineering (Master's Course) Division of Advanced Science and Engineering Informatics and Data Science Program |
| Lecture Code |
WSN22201 |
Subject Classification |
Specialized Education |
| Subject Name |
情報セキュリティ論 |
Subject Name (Katakana) |
ジョウホウセキュリティロン |
Subject Name in English |
Information Security |
| Instructor |
NISHIMURA KOUJI,MURAKAMI YUKO,SHIMOJI HIROMU,WATANABE HIDENOBU |
Instructor (Katakana) |
ニシムラ コウジ,ムラカミ ユウコ,シモジ ヒロム,ワタナベ ヒデノブ |
| Campus |
Higashi-Hiroshima |
Semester/Term |
1st-Year, Second Semester, 3Term |
| Days, Periods, and Classrooms |
(3T) Thur5-8 |
| Lesson Style |
Lecture |
Lesson Style (More Details) |
Face-to-face, Online (simultaneous interactive) |
| In principle, lectures, discussions and student presentations are face-to-face, but face-to-face may be changed to online (simultaneous interactive). |
| Credits |
2.0 |
Class Hours/Week |
4 |
Language of Instruction |
B
:
Japanese/English |
| Course Level |
6
:
Graduate Advanced
|
| Course Area(Area) |
25
:
Science and Technology |
| Course Area(Discipline) |
02
:
Information Science |
| Eligible Students |
Master course students of Graduate School of Advanced Science and Engineering, Graduate School of Integrated Arts and Science |
| Keywords |
Information security, Security model, Crisis management |
| Special Subject for Teacher Education |
|
Special Subject |
|
Class Status within Educational Program (Applicable only to targeted subjects for undergraduate students) | |
|---|
Criterion referenced Evaluation (Applicable only to targeted subjects for undergraduate students) | |
Class Objectives /Class Outline |
Information systems must be designed and operated with careful consideration of the balance among usability, security, and operational cost. In this course, students will learn the fundamentals of information security and discuss basic cryptographic and authentication technologies that enable secure information exchange in the presence of security threats. Case studies will be conducted on secure communication and user authentication systems that utilize these technologies. The course also addresses system design and implementation models for information security that address contemporary security threats, as well as crisis management in information systems, with a particular focus on incident response. In addition, humans themselves can be regarded as highly complex information systems that may encounter various types of trouble. Even if technical countermeasures for information systems are well implemented, incidents involving users can still have a significant impact on those systems. Based on this broad perspective of information systems—including human factors—students will discuss social systems, institutional frameworks, and human factors related to information security. Through group discussions and presentations, students will examine societal challenges and explore possible responses and countermeasures. |
| Class Schedule |
lesson1: Guidance and Introduction to Information Security (Murakami) lesson2: Classification of Information Security and Security Threats (Watanabe) lesson3: Cyber Attacks and Countermeasures (Nishimura) lesson4: Fundamental Technologies of Information Security: Cryptography (Nishimura) lesson5: Fundamental Technologies of Information Security: Authentication (Nishimura) lesson6: Information Security Design (Watanabe) lesson7: Zero Trust Security Model (Watanabe) lesson8: Computer Security Incident Response (Watanabe) lesson9: Implementation and Operational Management of Information Systems (Nishimura) lesson10: Information Security Management Systems (Nishimura) lesson11: Cloud Services and Security (Nishimura) lesson12: Generative AI and Security (Nishimura) lesson13: Group Discussion on Information Security (Shimoji, Murakami, Watanabe, Nishimura) lesson14: Group Presentations on Information Security (Shimoji, Murakami, Watanabe, Nishimura) lesson15: Group Presentations on Information Security (Shimoji, Murakami, Watanabe, Nishimura)
The lecturer may impose an assignment or report in the lecture.
The content, the lesson order or the lecturer may vary depending on the progress of the lecture. |
Text/Reference Books,etc. |
Handouts and other materials are provided in the lecture. |
PC or AV used in Class,etc. |
Handouts, Microsoft Teams, moodle |
| (More Details) |
The handouts will be placed on moodle, so please download them yourself. Record the lesson so that you can look back on it later. |
| Learning techniques to be incorporated |
Discussions, Quizzes/ Quiz format, Post-class Report |
Suggestions on Preparation and Review |
A basic knowledge of information systems and information networks are required. |
| Requirements |
|
| Grading Method |
Active participation in discussion (about 50%) and assignments or reports (about 50%). |
| Practical Experience |
Experienced
|
| Summary of Practical Experience and Class Contents based on it |
The lecturer will instruct secure programming development techniques based on software development experience in an aeronautical system company and practical experience as an information security engineer who has licenses on registered information security specialist (RISS) and CAIS-Assistant. |
| Message |
|
| Other |
The main language used in the lesson will be Japanese, but English materials and subtitles will be provided. |
Please fill in the class improvement questionnaire which is carried out on all classes. Instructors will reflect on your feedback and utilize the information for improving their teaching. |