Course title
6M0207001
Cybersecurity and governance

MOCHINAGA Dai
Purpose of class
The objective of this course is to cultivate foundational skills that enable students to apply basic knowledge of cybersecurity to real-world concepts such as strategy and norms.
- Students will be able to explain the various forms and characteristics of cyberattacks.
- Students will be able to describe key considerations in formulating strategies in cyberspace.
- Students will be able to analyze issues and challenges related to cyberspace from cross-cutting technological and societal perspectives.

In the course, students will not only engage in traditional lectures but also discuss cybersecurity issues through open-ended questions, reflecting on and articulating their own values.
Course content
This course covers the fundamentals of cybersecurity through representative case studies of cyberattacks; the tactical characteristics of cyber operations; strategic issues in cyberspace such as deterrence and escalation; and international law and norms that govern appropriate state behavior in cyberspace. The course proceeds in a discussion-based format: students are expected to complete assigned readings from the designated textbook in advance and then engage in structured discussions on each of these themes.

The course aims to develop professionals who are well versed in both security technologies—such as techniques for analyzing cyberattacks—and legal and institutional frameworks, by examining governance grounded in technical expertise. Effective cybersecurity practice requires a comprehensive approach. For example, strengthening cybersecurity demands not only technical knowledge but also broad perspectives encompassing political economy, organizational management, human factors, law, and public policy. Accordingly, the course conducts multi-faceted analyses of strategies based on technical knowledge of cybersecurity and cases of norm formation in the international cyber domain from these various perspectives, and discusses technical and policy measures from the standpoints of prevention, response, and mitigation.

The learning objective of the course is for students to be able to qualitatively and quantitatively analyze given cybersecurity cases using publicly available information, while taking relevant laws and regulations into account.
Goals and objectives
  1. Students will be able to explain the various forms and characteristics of cyberattacks.
  2. Students will be able to describe key considerations in formulating strategies in cyberspace.
  3. Students will be able to analyze issues and challenges related to cyberspace from cross-cutting technological and societal perspectives.
Relationship between 'Goals and Objectives' and 'Course Outcomes'

Total.
Total. -
Language
Japanese(English accepted)
Class schedule

Class schedule HW assignments (Including preparation and review of the class.) Amount of Time Required
Total.
Evaluation method and criteria
Evaluation will be based on regularly assigned reports and essays. Assessment criteria include the ability to identify and articulate the problem, the originality of the report or essay, the organization and clarity of the writing, and proper citation and overall academic format.
Feedback on exams, assignments, etc.
ways of feedback specific contents about "Other"
Feedback in the class
Textbooks and reference materials
- Martin Libicki, ”Cyberspace in Peace and War, Second Edition,” Naval Institute Press, 2021.
- Michael P. Fischerkeller, et. al., ”Cyber Persistence Theory: Redefining National Security in Cyberspace (Bridging the Gap),” Oxford Univ Pr on Demand, 2022.
Prerequisites
Technologies and concepts related to programming, networking, and cybersecurity.
Office hours and How to contact professors for questions
  • Thursday 12:30 - 13:20
Regionally-oriented
Non-regionally-oriented course
Development of social and professional independence
  • Course that cultivates an ability for utilizing knowledge
  • Course that cultivates a basic problem-solving skills
Active-learning course
Most classes are interactive
Course by professor with work experience
Work experience Work experience and relevance to the course content if applicable
Applicable The faculty member has experience at think tanks and related organizations in areas such as cybersecurity policymaking; receiving and processing incident reports; providing response support; assessing incident trends; analyzing attack methods; and examining and advising on measures to prevent recurrence. Drawing on this experience, the faculty member lectures on the societal impact of cybersecurity and on the responsibilities that technology and society bear toward the broader community.
Education related SDGs:the Sustainable Development Goals
  • 1.NO POVERTY
  • 6.CLEAN WATER AND SANITATION
  • 7.AFFORDABLE AND CLEAN ENERGY
  • 8.DECENT WORK AND ECONOMIC GROWTH
  • 9.INDUSTRY, INNOVATION AND INFRASTRUCTURE
  • 12.RESPONSIBLE CONSUMPTION & PRODUCTION
  • 16.PEACE, JUSTICE AND STRONG INSTITUTIONS
Last modified : Sat Mar 14 14:13:24 JST 2026