Final examination | Total. | |
---|---|---|
1. | 40% | 40% |
2. | 40% | 40% |
3. | 20% | 20% |
Total. | 100% | - |
Class schedule | HW assignments (Including preparation and review of the class.) | Amount of Time Required | |
---|---|---|---|
1. | - Briefing of this course - Overview of information and communication security |
Preparation: check the material of 1st class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
2. | Cryptography (1) - Overview of cryptography - Symmetric key cryptography - DES - AES - Security evaluation of symmetric key cryptography |
Preparation: check the material of 2nd class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
3. | Cryptography (2) Public-key cryptography - Communication procedure using public key cryptography - Overview of RSA cryptosystem - Implementation of public key cryptography - Security evaluation of public key cryptography - Digital signature |
Preparation: check the material of 3rd class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
4. | Authorization (1) - Overview of authorization - Authorization methods by using cryptographic technologies |
Preparation: check the material of 4th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
5. | Authorization (2) Public Key Infrastructure (PKI) - Configuration and components of PKI - Examples of PKI |
Preparation: check the material of 5th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
6. | - Secure communication protocol (1) - WWW securities -TLS(SSL) - Email securities - S/MIME |
Preparation: check the material of 6th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
7. | - Secure communication protocol (2) - Overview of VPN - VPN protocols and applications |
Preparation: check the material of 7th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
8. | - Wireless LAN security (1) - Standard of wired and wireless LAN - Security of IEEE802.11 wireless LAN - WEP |
Preparation: check the material of 8th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
9. | - Wireless LAN security (2) - WPA/WPA2 - TKIP/AES-CCMP - Authorization and key generation in Enterprise/Personal mode - WPA3 |
Preparation: check the material of 9th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
10. | - Unauthorized access and Information hiding - Overview of unauthorized access - Measures for unauthorized access - Overview of information hiding |
Preparation: check the material of 10th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
11. | - P2P technologies - Overview of P2P - P2P applications - Non-technical problems of P2P |
Preparation: check the material of 11th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
12. | - Wireless communication network which is useful in an emergency (1) - Existing networks in emergencies - Overview of wireless ad hoc networks - Technical issues of wireless ad hoc networks |
Preparation: check the material of 12th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
13. | - Wireless communication network which is useful in an emergency (2) - Routing protocols of wireless ad hoc networks - DSR (Dynamic Source Routing) - OLSR (Optimized Link State Routing) |
Preparation: check the material of 13th class which can be downloaded from scombZ and read though them, filling in the blanks as much as possible. | 70minutes |
Review: Download complete version material from scombZ, and review it. | 120minutes | ||
14. | - Final examination | Review all materials | 190minutes |
Total. | - | - | 2660minutes |
ways of feedback | specific contents about "Other" |
---|---|
Feedback in the class |
Work experience | Work experience and relevance to the course content if applicable |
---|---|
Applicable | Based on experience in research and development of wireless communication networks usable in emergency situations such as disasters at the Communications Research Laboratory of the Ministry of Posts and Telecommunications, ATR Adaptive Communication Research Laboratories, and the National Institute of Information and Communications Technology (NICT) from 1991 to 2007, he teaches the basic technologies and concepts required for communication networks usable in emergency situations such as disasters. |