Course title
303830002
Introduction to Cybersecurity and Society

MOCHINAGA Dai
Course description
This lecture aims to enable students to analyze the impact of cyber security on society by studying the relationship between cyber security and society and deepening their understanding of related knowledge and skills. The practice of cyber security requires a comprehensive approach. For example, in order to strengthen cyber security, it is necessary to have a bird's eye view of political economy, organizational management, human engineering, law, policy, etc., in addition to technical knowledge. Therefore, this lecture will analyze cyber security incidents and cases of normative formation in the international cyber space from the above aspects in a multifaceted manner, and discuss technical and policy measures from the perspective of prevention, response, and prevention.

This lecture is taught by a lecturer with practical experience.
The lecturer has experience in policy planning related to cyber security, receiving reports of incidents, providing support for responses, understanding the situation, analyzing methods, considering and advising on measures to prevent recurrence, etc., at think tanks and related organizations, and will lecture on the impact of cyber security on society and the responsibilities that technology and society have towards society.
Purpose of class
The goal of this lecture is to be able to analyze given cyber security cases qualitatively and quantitatively from publicly available information, while paying attention to relevant laws and regulations. Students will be able to explain the technology and systems based on the objectives, principles and concepts of cyber security. In addition, in light of the fact that the impact of cyber security on society is expanding beyond individuals and organizations to include national relations, students will analyze the changing role of information and communication technology in the relationship between the state and the market. Students will also aim to be able to analyze familiar examples qualitatively and quantitatively by citing specific examples of technological and institutional responses to attacks using ransomware.
Goals and objectives
  1. サイバーセキュリティの原則と概念を説明できる(学修・教育到達目標B)
  2. サイバーセキュリティを通じて技術・科学が社会に対して負っている責任を説明できる(学修・教育到達目標B)
  3. サイバーセキュリティが社会に与える影響について、事例を挙げて説明できる(学修・教育到達目標G-2)
Relationship between 'Goals and Objectives' and 'Course Outcomes'

期末試験 課題 Total.
1. 20% 10% 30%
2. 20% 15% 35%
3. 20% 15% 35%
Total. 60% 40% -
Language
Japanese
Class schedule

Class schedule HW assignments (Including preparation and review of the class.) Amount of Time Required
1. サイバーセキュリティと社会の関わり 振り返りと次回に向けた予習 30minutes
2. サイバーセキュリティの目的、原則、概念 振り返りと次回に向けた予習 30minutes
3. セキュリティガバナンスとリスク管理 振り返りと次回に向けた予習 30minutes
4. サイバーセキュリティに関する戦略・政策・法律・規制 振り返りと次回に向けた予習 30minutes
5. 暗号の概要・共通鍵暗号・公開鍵暗号・暗号に対する攻撃 振り返りと次回に向けた予習 30minutes
6. 情報管理・セキュリティモデル 振り返りと次回に向けた予習 30minutes
7. ソフトウェアの脆弱性、脅威、対抗策 振り返りと次回に向けた予習 30minutes
8. 物理的なセキュリティ、論理的なセキュリティ、ゼロトラスト 振り返りと次回に向けた予習 30minutes
9. ネットワークセキュリティと攻撃手法 振り返りと次回に向けた予習 30minutes
10. 識別・認証の管理 振り返りと次回に向けた予習 30minutes
11. マルウェアとサイバー攻撃 振り返りと次回に向けた予習 30minutes
12. セキュリティテスト、インシデント対応 振り返りと次回に向けた予習 30minutes
13. 国家と市場、国際政治とサイバーセキュリティ 振り返りと次回に向けた予習 30minutes
14. ランサムウェアと経済制裁、国家の責任ある情報通信技術の利用、途上国開発支援とサイバーセキュリティ 振り返りと次回に向けた予習 30minutes
15. サイバーセキュリティの展望、関連する職業(行政関係を含む)
Total. - - 420minutes
Evaluation method and criteria
- The final exam (60%) and in-class assignments (40%) will be graded, and participation in class discussions (extra credit, up to 25%) will also be taken into account.
- Students who achieve a grade of 60% or higher will be awarded credit. Meeting this standard is assumed to indicate that a student has reached a level where they can explain the technologies and systems based on the objectives, principles, and concepts of cyber security.
- The use of AI is not prohibited when creating assignments. However, points will be deducted for inappropriate actions, such as directly copying AI results.
- Points will be deducted from the grade if an assignment does not meet the format or requirements or is submitted after the deadline.
- If students submit the same content for an assignment, students will receive significant point deductions, regardless of the reason.
Feedback on exams, assignments, etc.
ways of feedback specific contents about "Other"
Feedback in the class
Textbooks and reference materials
教科書は定めない。
参考書:
- 八木毅ほか「コンピュータネットワークセキュリティ」コロナ社、2015年
- 鎮目征樹ほか「情報刑法」弘文堂、2021年
- 岡本栄司「暗号理論入門」共立出版、2002年
- 持永大ほか「サイバー空間を支配する者」、2018年
Prerequisites
コンピュータネットワークの基礎について学修することが望ましい。
Office hours and How to contact professors for questions
  • 木曜日、15:00 - 16:00 @Teams
Regionally-oriented
Non-regionally-oriented course
Development of social and professional independence
  • Course that cultivates an ability for utilizing knowledge
  • Course that cultivates a basic problem-solving skills
Active-learning course
About half of the classes are interactive
Course by professor with work experience
Work experience Work experience and relevance to the course content if applicable
Applicable 講義では、座学だけでなくオープンクエスチョンを通じて、自身の価値観をもとにサイバーセキュリティと社会について議論を行う。
Education related SDGs:the Sustainable Development Goals
  • 1.NO POVERTY
  • 9.INDUSTRY, INNOVATION AND INFRASTRUCTURE
  • 16.PEACE, JUSTICE AND STRONG INSTITUTIONS
Last modified : Tue Feb 11 04:17:13 JST 2025