2018 Cybersecurity Governance

Font size  SML

Register update notification mail Add to favorite lecture list
Academic unit or major
School of Computing
Instructor(s)
Mamiya Masayuki  Mamiya Masayuki  Tanaka Keisuke 
Class Format
Lecture / Exercise     
Media-enhanced courses
Day/Period(Room No.)
Wed5-8(W832)  
Group
-
Course number
XCO.T478
Credits
2
Academic year
2018
Offered quarter
3Q
Syllabus updated
2018/3/20
Lecture notes updated
-
Language used
Japanese
Access Index

Course description and aims

Cybersecurity is important for our daily lives including various types of activities. There is a growing demand for students who can be researchers and engineers capable of understanding cybersecurity.
In order to satisfy this demand, Tokyo Tech has launched Progressive Graduate Minor in Cybersecurity in April, 2016. We design the curriculum of Progressive Graduate Minor in Cybersecurity in collaboration with NRI as the core, also with Rakuten, NTT, AIST, and NISC. The following six courses are organized in School of Computing: Foundation of Cybersecurity (1Q, 2-0-0), Theory of Cryptography for Cybersecurity (3Q, 2-0-0), Cybersecurity Governance (3Q, 1-1-0), Attack and Defense on Cybersecurity I (2Q, 1-1-0), Attack and Defense on Cybersecurity II (3Q, 1-1-0), and Attack and Defense on Cybersecurity III (4Q, 1-1-0).
This course is one of the core courses in this minor. In this course, you will understand the basic framework of management measures related to information security and master methods for corporate governance with security consideration.

Student learning outcomes

By studying this lecture, you understand the following and learn how to think.
1) Understand the framework on information security management.
2) You can understand concrete security measures for corporate governance.
3) You can plan for information security.
4) We can make recommendations, support and report to management.

Keywords

security, information security, cybersecurity,Governance, incident, risk control, IoT

Competencies that will be developed

Specialist skills Intercultural skills Communication skills Critical thinking skills Practical and/or problem-solving skills

Class flow

Classes will be advanced through lectures and dialogues, related exercises.

Course schedule/Required learning

  Course schedule Required learning
Class 1 Orientation, recent topics, basic idea of information security management. Understanding security management framework.
Class 2 Organization/structure/rules for information security management, employee management and education and training. Understanding internal control, human resources definition.
Class 3 Information security concerning government agencies. Understand the information security policy and the efforts of government agencies.
Class 4 Information security management of information assets · facilities and environments. Understanding controls and guidelines.
Class 5 Network security management, information security systemization. Understanding support system/tool.
Class 6 Risk assessment, information security audit. Understanding risk control.
Class 7 Information security management of group companies and overseas bases Understanding corporate governance.
Class 8 Overview of regulations on information security, various problems of industry type and business type. Understand the regulations on business law, information security issues specific to industry type / business type.
Class 9 Information security of control system, information security of embedded systems. Understanding IoT, Industrial equipment.
Class 10 Information security management and personnel labor, information security and public relations. Understand organizational behavior, stakeholder, risk communication.
Class 11 Responding and managing information security incidents. Understanding incident handling.
Class 12 Case Study (1). Understand cyber security governance by taking examples of information leakage cases as an example.
Class 13 Case Study (2). Understand what people and organizations were doing until the worst happens, why people and organizations misjudge.
Class 14 Formulation of an information security response plan and preparation of a request specification for outsourcing. Understanding planning, procurement.
Class 15 Information security of educational research institutes, information security as a carrier. Understand the roles and career development expected for researchers and engineers.

Textbook(s)

Textbooks will not be used in this course.

Reference books, course materials, etc.

References will be announced in the classes.

Assessment criteria and methods

The evaluation consists of several reports as homework assignments during the course. Instructors also give exercises in the classes.

Related courses

  • XCO.T473 : Foundation of Cybersecurity
  • XCO.T474 : Theory of Cryptography for Cybersecurity
  • XCO.T475 : Attack and Defense on Cybersecurity I
  • XCO.T476 : Attack and Defense on Cybersecurity II
  • XCO.T477 : Attack and Defense on Cybersecurity III

Prerequisites (i.e., required knowledge, skills, courses, etc.)

None. However, the knowledge on the basic notions of computer science can help students to understand the contents of the course smoothly.

Contact information (e-mail and phone)    Notice : Please replace from "[at]" to "@"(half-width character).

keisuke[at]is.titech.ac.jp

Office hours

Appointment by e-mail is required.

Page Top