6M020700
1 Cybersecurity and governance
The objective of this course is to cultivate foundational skills that enable students to apply basic knowledge of cybersecurity
to real-world concepts such as strategy and norms.
- Students will be able to explain the various forms and characteristics of cyberattacks.
- Students will be able to describe key considerations in formulating strategies in cyberspace.
- Students will be able to analyze issues and challenges related to cyberspace from cross-cutting technological and societal
perspectives.
In the course, students will not only engage in traditional lectures but also discuss cybersecurity issues through open-ended
questions, reflecting on and articulating their own values.
This course covers the fundamentals of cybersecurity through representative case studies of cyberattacks; the tactical characteristics
of cyber operations; strategic issues in cyberspace such as deterrence and escalation; and international law and norms that
govern appropriate state behavior in cyberspace. The course proceeds in a discussion-based format: students are expected to
complete assigned readings from the designated textbook in advance and then engage in structured discussions on each of these
themes.
The course aims to develop professionals who are well versed in both security technologies—such as techniques for analyzing
cyberattacks—and legal and institutional frameworks, by examining governance grounded in technical expertise. Effective cybersecurity
practice requires a comprehensive approach. For example, strengthening cybersecurity demands not only technical knowledge
but also broad perspectives encompassing political economy, organizational management, human factors, law, and public policy.
Accordingly, the course conducts multi-faceted analyses of strategies based on technical knowledge of cybersecurity and cases
of norm formation in the international cyber domain from these various perspectives, and discusses technical and policy measures
from the standpoints of prevention, response, and mitigation.
The learning objective of the course is for students to be able to qualitatively and quantitatively analyze given cybersecurity
cases using publicly available information, while taking relevant laws and regulations into account.
- Students will be able to explain the various forms and characteristics of cyberattacks.
- Students will be able to describe key considerations in formulating strategies in cyberspace.
- Students will be able to analyze issues and challenges related to cyberspace from cross-cutting technological and societal
perspectives.
Relationship between 'Goals and Objectives' and 'Course Outcomes'
Japanese(English accepted)
|
Class schedule |
HW assignments (Including preparation and review of the class.) |
Amount of Time Required |
| Total. |
Evaluation method and criteria
Evaluation will be based on regularly assigned reports and essays. Assessment criteria include the ability to identify and
articulate the problem, the originality of the report or essay, the organization and clarity of the writing, and proper citation
and overall academic format.
Feedback on exams, assignments, etc.
| ways of feedback |
specific contents about "Other" |
| Feedback in the class |
|
Textbooks and reference materials
- Martin Libicki, ”Cyberspace in Peace and War, Second Edition,” Naval Institute Press, 2021.
- Michael P. Fischerkeller, et. al., ”Cyber Persistence Theory: Redefining National Security in Cyberspace (Bridging the Gap),”
Oxford Univ Pr on Demand, 2022.
Technologies and concepts related to programming, networking, and cybersecurity.
Office hours and How to contact professors for questions
Non-regionally-oriented course
Development of social and professional independence
- Course that cultivates an ability for utilizing knowledge
- Course that cultivates a basic problem-solving skills
Most classes are interactive
Course by professor with work experience
| Work experience |
Work experience and relevance to the course content if applicable |
| Applicable |
The faculty member has experience at think tanks and related organizations in areas such as cybersecurity policymaking; receiving
and processing incident reports; providing response support; assessing incident trends; analyzing attack methods; and examining
and advising on measures to prevent recurrence. Drawing on this experience, the faculty member lectures on the societal impact
of cybersecurity and on the responsibilities that technology and society bear toward the broader community.
|
Education related SDGs:the Sustainable Development Goals
- 1.NO POVERTY
- 6.CLEAN WATER AND SANITATION
- 7.AFFORDABLE AND CLEAN ENERGY
- 8.DECENT WORK AND ECONOMIC GROWTH
- 9.INDUSTRY, INNOVATION AND INFRASTRUCTURE
- 12.RESPONSIBLE CONSUMPTION & PRODUCTION
- 16.PEACE, JUSTICE AND STRONG INSTITUTIONS
Last modified : Sat Mar 14 14:13:24 JST 2026