2017 Cybersecurity Governance

Font size  SML

Register update notification mail Add to favorite lecture list
Academic unit or major
School of Computing
Instructor(s)
Mamiya Masayuki  Mamiya Masayuki  Tanaka Keisuke 
Class Format
Lecture / Exercise     
Media-enhanced courses
Day/Period(Room No.)
Wed5-8(W832)  
Group
-
Course number
XCO.T478
Credits
2
Academic year
2017
Offered quarter
3Q
Syllabus updated
2017/3/21
Lecture notes updated
-
Language used
Japanese
Access Index

Course description and aims

Cybersecurity is important for our daily lives including various types of activities. There is a growing demand for students who can be researchers and engineers capable of understanding cybersecurity.
In order to satisfy this demand, Tokyo Tech has launched Progressive Graduate Minor in Cybersecurity in April, 2016. We design the curriculum of Progressive Graduate Minor in Cybersecurity in collaboration with NRI as the core, also with Rakuten, NTT, AIST, and NISC. The following six courses are organized in School of Computing: Foundation of Cybersecurity (1Q, 2-0-0), Theory of Cryptography for Cybersecurity (3Q, 2-0-0), Cybersecurity Governance (3Q, 1-1-0), Attack and Defense on Cybersecurity I (2Q, 1-1-0), Attack and Defense on Cybersecurity II (3Q, 1-1-0), and Attack and Defense on Cybersecurity III (4Q, 1-1-0).
This course is one of the core courses in this minor. In this course, you will understand the basic framework of management measures related to information security and master methods for corporate governance with security consideration.

Student learning outcomes

By studying this lecture, you understand the following and learn how to think.
1) Understand the framework on information security management.
2) You can understand concrete security measures for corporate governance.
3) You can plan for information security.
4) We can make recommendations, support and report to management.

Keywords

security, information security, cybersecurity, incident, risk control, IoT

Competencies that will be developed

Specialist skills Intercultural skills Communication skills Critical thinking skills Practical and/or problem-solving skills

Class flow

Classes will be advanced through lectures and dialogues, related exercises.

Course schedule/Required learning

  Course schedule Required learning
Class 1 Orientation, recent topics, basic idea of information security management Understanding security management framework.
Class 2 Organization/structure/rules for information security management, employee management and education and training Understanding internal control, human resources definition.
Class 3 Responding and managing information security incidents Understanding incident handling.
Class 4 Security management of information assets, information security management of facilities and environment, security management of terminals and media Understanding controls and guidelines.
Class 5 Network security management, information security systemization Understanding support system/tool.
Class 6 Risk assessment, information security audit Understanding risk control.
Class 7 Information security management of group companies and overseas bases Understanding corporate governance.
Class 8 Laws on information security Understanding law, institution, standard.
Class 9 Overview of regulations on information security in financial institutions, various problems by business type Understanding regulation on business law, FinTech.
Class 10 Information security of control system, information security of embedded systems Understanding IoT, Industrial equipment.
Class 11 Information use and information security management, information security management Understanding management level.
Class 12 Information security management and personnel and labor problems, information security and public relations Understanding organizational behavior, stakeholders, risk communication.
Class 13 Information security of government agencies, information security of universities/research and development agencies Understanding security issues related to educational research institutes.
Class 14 Formulation of information security response plan, education and training plan, creation of required specifications for outsourcing Understanding planning, procurement.
Class 15 Information security for researchers, information security as a carrier Understanding expected role and career development.

Textbook(s)

Textbooks will be used in this course.

Reference books, course materials, etc.

References will be announced in the classes.

Assessment criteria and methods

The evaluation consists of several reports as homework assignments during the course. Instructors also give exercises in the classes.

Related courses

  • XCO.T473 : Foundation of Cybersecurity
  • XCO.T474 : Theory of Cryptography for Cybersecurity
  • XCO.T475 : Attack and Defense on Cybersecurity I
  • XCO.T476 : Attack and Defense on Cybersecurity II
  • XCO.T477 : Attack and Defense on Cybersecurity III

Prerequisites (i.e., required knowledge, skills, courses, etc.)

None. However, the knowledge on the basic notions of computer science can help students to understand the contents of the course smoothly.

Contact information (e-mail and phone)    Notice : Please replace from "[at]" to "@"(half-width character).

keisuke[at]is.titech.ac.jp

Office hours

Appointment by e-mail is required.

Page Top