2017 Advanced Information Security

Font size  SML

Register update notification mail Add to favorite lecture list
Academic unit or major
Graduate major in Computer Science
Instructor(s)
Watanabe Yuji  Munetou Seiji  Mizutani Masayoshi 
Class Format
Lecture     
Media-enhanced courses
Day/Period(Room No.)
Tue1-2(W834)  Fri1-2(W834)  
Group
-
Course number
CSC.T525
Credits
2
Academic year
2017
Offered quarter
3Q
Syllabus updated
2017/3/17
Lecture notes updated
-
Language used
Japanese
Access Index

Course description and aims

 Currently, information technology occupies an important position in the social infrastructure and information security supports its safety and security. The information security includes various aspects. Extensive knowledge about information security is required in order to ensure the security. In this lecture, we teach the broad and balanced knowledge on the information security without sticking to a specific research field.

Student learning outcomes

A student gets extensive knowledge knowledge on the information security, specifically, network security, software security, cryptography, authentication protocols, and protection of intellectual property, from the various viewpoints of the advanced information security.

Keywords

information security, network security, intrusion detection, public key infrastructure, applied cryptography, electronic commerce, copyright protection

Competencies that will be developed

Specialist skills Intercultural skills Communication skills Critical thinking skills Practical and/or problem-solving skills

Class flow

We give lectures.

Course schedule/Required learning

  Course schedule Required learning
Class 1 Overview of information security Understand the overview of the information security
Class 2 Public key infrastructure Understand the position and the usage of the public key infrastructure in the information society
Class 3 Security protocol Understand the role of the security protocol in order to ensure the safe communication in the internet
Class 4 cloud and privacy Understand the issues and the traditional techniques on the security and the privacy
Class 5 Security Evaluation and Vulnerability Analysis Understand the global standard of the security evaluation and the vulnerability analysis
Class 6 Secure Software Development Understand the security requirement acquisition and quality assurance of the information security
Class 7 Security Mechanism in Virtual Machines and OS  Understand the various mechanisms provided by OS and Hypervisors
Class 8 Trusted Computing  Understand the foundation of the trusted computing from the viewpoint of secure computing environments
Class 9 Web Security  Understand the vulnerabilities and their mechanism in Web computing
Class 10 Malwares Understand the mechanisms and the today's situation of malwares such as computer virus
Class 11 Security Management  Understand the knowledge and state-of-arts of security management in the real organization
Class 12 Human Aspect in Security Understand human's mind in the information security

Textbook(s)

We will give handouts to students as necessary 

Reference books, course materials, etc.

 1 Network Security Private Communication in a PUBLIC World, Charlie Kaufman, Rdia Perlman, Mike Speciner Prentice Hall
2. Practical Unix & Internet Security Simon Garfinkel, Gene Spafford O'Reilly & Associates

Assessment criteria and methods

Evaluated by reports

Related courses

  • CSC.T371 : System Software
  • CSC.T345 : Computer Networks

Prerequisites (i.e., required knowledge, skills, courses, etc.)

Fundamental knowledge on operating systems and computer networks.

Page Top