Course title | |||||
情報工学特別講義(情報セキュリティ) [Dedicated Lecture on Information Engineering] | |||||
Course category | technology speciality courses,ets. | Requirement | Credit | 2 | |
Department | Year | 4~4 | Semester | 3rd | |
Course type | 3rd | Course code | 025815 | ||
Instructor(s) | |||||
桑原 悟, 有馬 卓司 [KUWAHARA Satoru, ARIMA Takuji] | |||||
Facility affiliation | Graduate School of Engineering | Office | afjgxte/L1151 | Email address |
Course description |
[Purpose] Information security is an important field in terms of learning information technology and making it useful in society, especially in the society where the Internet is developed and will continue to be developed. The purpose of this lecture is to acquire basic knowledge and basic ideas for application in this field. [Abstract] This lecture will be conducted online remotely. The class code = 4s3xu7r In this lecture, students will first learn about the relationship between information security and society, and then learn about information security measures and their meanings and necessity. Then, learn the basics of technical components for realizing information security. In almost every lecture, comprehension test will be performed on the Web, these comprehension tests are not related to grade evaluation. Since this field is progressing rapidly, we will use not existing printed materials (books), but lecture materials distributed on the Web. |
Expected Learning |
The students can understand and explain the relationship between information security and society. The students can understand and explain the implementation of information security and its meaning and necessity. The students can understand and explain the basics of technical components for realizing information security. |
Course schedule |
01 Class Guidance / Internet and Business 02 Organizations and Information Security (The situation of organizations in the IT society) 03 Organizations and Information Security (Information Security Policy) 04 Risk management (risk analysis-1) 05 Risk management (risk analysis-2) 06 Risk management (risk treatment) 07 Information Security Technology (1) (firewall-1) 08 Information Security Technology (2) (firewall-2) 09 Information Security Technology (3) (peripheral technology of firewall, server security settings) 10 Information Security Technology (4) (load balancing and redundancy, authentication, password management, etc.) 11 Information Security Technology (5) (computer virus) 12 Information Security Technology (6) (encryption and its applications) 13 Information Security Technology (7) (PKI: Public Key Infrastructure) 14 Cunning cyber-attack / Explanation of Regular examination via the Web 15 Summary / Regular examination via the Web |
Prerequisites |
Required Text(s) and Materials |
The original materials will be distributed via the web. |
References |
Assessment/Grading |
Regular Examination 100% (will be held on web at the final lecture) |
Message from instructor(s) |
I hope that the students will learn about information security in a balanced manner in order to become sensible researchers, engineers, and managers. |
Course keywords |
Information security, information assets, threats, vulnerabilities, risks |
Office hours |
Remarks 1 |
The order and/or the contents of this course including the examinations would be adjusted because of degree of understanding of the students. Therefore, the students are required to attend at all class hours (all unit lesson). |
Remarks 2 |
Related URL |
Lecture Language |
Japanese |
Language Subject |
Last update |
9/22/2021 10:39:09 AM |