2018 Foundation of Cybersecurity

Font size  SML

Register update notification mail Add to favorite lecture list
Academic unit or major
School of Computing
Instructor(s)
Isshiki Tsuyoshi  Ito Toshiya  Ogata Wakaha  Kitaguchi Yoshiaki  Koike Hideki  Shimakawa Masaya  Shudo Kazuyuki  Suzuki Taiji  Tanaka Keisuke  Defago Xavier  Tomoishi Masahiko  Nishizaki Shin-Ya  Masuhara Hidehiko  Matsuura Satoshi  Minamide Yasuhiko  Yamaoka Katsunori  Yokota Haruo  Wakita Ken  Watanabe Osamu  Watanabe Takuo 
Class Format
Lecture     
Media-enhanced courses
Day/Period(Room No.)
Tue3-4(W531)  Fri3-4(W531)  
Group
-
Course number
XCO.T473
Credits
2
Academic year
2018
Offered quarter
1Q
Syllabus updated
2018/4/19
Lecture notes updated
-
Language used
Japanese
Access Index

Course description and aims

Cybersecurity is important for our daily lives including various types of activities. There is a growing demand for students who can be researchers and engineers capable of understanding cybersecurity.
In order to satisfy this demand, Tokyo Tech has launched Progressive Graduate Minor in Cybersecurity in April, 2016. We design the curriculum of Progressive Graduate Minor in Cybersecurity in collaboration with NRI as the core, also with Rakuten, NTT, AIST, and NISC. The following six courses are organized in School of Computing: Foundation of Cybersecurity (1Q, 2-0-0), Theory of Cryptography for Cybersecurity (3Q, 2-0-0), Cybersecurity Governance (3Q, 1-1-0), Attack and Defense on Cybersecurity I (2Q, 1-1-0), Attack and Defense on Cybersecurity II (3Q, 1-1-0), and Attack and Defense on Cybersecurity III (4Q, 1-1-0).
This course is one of the core courses in this minor. This course aims to help students to understand the overview and the background of cybersecurity. This course also focuses on the relationships between cybersecurity and other research topics in computer science, and on the primitives and the tools in cybersecurity.

Student learning outcomes

By the end of this course, students will be able to understand:
1) the backgrounds of cybersecurity
2) the overview of cybersecurity
3) the relationships between cybersecurity and other research fields in computer science
4) the primitives and the tools used in cybersecurity.

Keywords

security, information security, cybersecurity, cryptography, network, software, programming, web application, algorithm, computational complexity

Competencies that will be developed

Specialist skills Intercultural skills Communication skills Critical thinking skills Practical and/or problem-solving skills

Class flow

The class offers a standard type of lecture. The instructors give the small exams solved in classes or as homework assignments.

Course schedule/Required learning

  Course schedule Required learning
Class 1 The overview of this course (Keisuke Tanaka (School of Computing)), and the basic notions of cybersecurity (Satoshi Matsuura (GSIC)) Understand the basic notion of cybersecurity.
Class 2 Foundation of network security (Yoshiaki Kitaguchi (GSIC), and identification and authentication (Masahiko Tomoishi (GSIC)) Understand the notions of network security, identification, and authentication.
Class 3 Theory of algorithms as a foundation of cybersecurity (Toshiya Ito (School of Computing)) Understand the notion of algorithms.
Class 4 Theory of cryptography as a fundamental element of cybersecurity (Wakaha Ogata (School of Engineering)) Understand the notion of cryptography.
Class 5 Information and communication network and its security (Katsunori Yamaoka (School of Engineering)) Understand the notion of Information and communication network.
Class 6 Programming language design and its application to cybersecurity (Hidehiko Masuhara (School of Computing)) Understand the notion of programming language design.
Class 7 Workshop for understanding cybersecurity (Keisuke Tanaka (School of Computing) Understand the notion of cybersecurity.
Class 8 Intrusion-tolerant computer systems (Xavier Defago (School of Computing)) Understand the notion of intrusion-tolerant computer systems.
Class 9 Concurrent systems and its security (Shin-ya Nishizaki (GSIC)) Understand the notion of concurrent systems.
Class 10 Database and its security (Haruo Yokota (School of Computing)) Understand the notion of database.
Class 11 Intrusion detection in cybersecurity (Hideki Koike (School of Computing)) Understand the notion of intrusion detection.
Class 12 Visualization of security information (Ken Wakita (School of Computing)) Understand the techniques for visualization.
Class 13 Software verification and its application to cybersecurity (Yasuhiko Minamide (School of Computing)) Understand the notion of software verification.
Class 14 Formal methods and secure computing (Takuo Watanabe (School of Computing)) Understand the notion of formal methods and secure computing.
Class 15 Machine learning and its application to cybersecurity (Taiji Suzuki (The University of Tokyo)) Understand the notion of machine learning.

Textbook(s)

Textbooks will not be used in this course.

Reference books, course materials, etc.

References will be announced in each class.

Assessment criteria and methods

The evaluation consists of the small exams solved in classes or as homework assignments. The weights of the scores of the small exams are equal. The total score is calculated by omitting the worst three scores.

Related courses

  • XCO.T474 : Theory of Cryptography for Cybersecurity
  • XCO.T478 : Cybersecurity Governance
  • XCO.T475 : Attack and Defense on Cybersecurity I
  • XCO.T476 : Attack and Defense on Cybersecurity II
  • XCO.T477 : Attack and Defense on Cybersecurity III

Prerequisites (i.e., required knowledge, skills, courses, etc.)

None. However, the knowledge on the basic notions of computer science can help students to understand the contents of the course smoothly.

Contact information (e-mail and phone)    Notice : Please replace from "[at]" to "@"(half-width character).

keisuke[at]is.titech.ac.jp

Office hours

Appointment by e-mail is required.

Page Top