3303090A
3 Cyber Security
Middle-level Diploma Policy (mDP)
| Program / Major |
mDP |
Goals |
| IoT Course |
DP-4a・2 |
キャリアを見据えた高度な専門知識 情報処理やネットワーキングに関する技術を駆使し、情報社会の基盤となるIoTシステムを開発できる。
|
| Software Course |
DP-4b・2 |
キャリアを見据えた高度な専門知識 ソフトウェア開発手法、情報ネットワーク、および機械学習に関する技術を駆使し、社会的ニーズに適切に対応したソフトウェアを開発できる。
|
| Media Course |
DP-4c・2 |
キャリアを見据えた高度な専門知識 画像や音響、サイバースペース等のメディア処理・デザイン技術を駆使し、社会的ニーズに適切に対応したシステムを開発できる。
|
| Data Science Course |
DP-4d・2 |
キャリアを見据えた高度な専門知識 多様なデータを収集・分析・予測する技術を駆使し、社会に存在する実際の課題に対してエビデンスを基に解決法を考え提案できる。
|
The learning objectives of this course are for students to be able to explain the principles and technologies of cybersecurity
and to acquire the ability to implement them in practice. In addition, because cybersecurity requires knowledge specific to
the business domain of organizations that utilize information systems, the course aims to enable students to explain, based
on case studies, how methods of implementing security measures differ depending on the organizational and domain context.
This course aims to deepen students’ understanding of knowledge and skills related to cybersecurity so that they can ensure
secure information processing and communication environments. It addresses both attacks that compromise security and methods
for achieving and maintaining security.
Ensuring security requires not only knowledge of computers but also an understanding of the specific business domains of organizations
that use information systems. Accordingly, the course provides a multifaceted analysis of operating system security, privilege
separation mechanisms, cryptography, network protocols, hardware security, web application security, and mobile phone security,
and discusses these topics from the perspectives of prevention, response, and mitigation.
- able to explain the principles and technologies of cybersecurity
Relationship between 'Goals and Objectives' and 'Course Outcomes'
Evaluation method and criteria
- Assessment will be based on the final examination (60%) and assignments given during the semester (40%), as well as participation
in class discussions (additional points, up to 25%).
- Students may earn course credit by achieving an overall score of 60% or higher. Meeting this standard is understood to indicate
that the student has reached a level at which they can explain hardware, software, and network security based on the objectives,
principles, and core concepts of cybersecurity.
- The use of AI in completing assignments is not prohibited. However, points may be deducted if chatbot outputs are copied
verbatim or submitted without appropriate critical engagement.
- Points will be deducted for assignments that fail to meet the required format or submission guidelines, or that are submitted
after the deadline.
- If multiple students submit substantially identical answers for an assignment, all such students will receive a significant
deduction of points, regardless of the reason.
Japanese(English accepted)
|
Class schedule |
HW assignments (Including preparation and review of the class.) |
Amount of Time Required |
| Total. |
Feedback on exams, assignments, etc.
| ways of feedback |
specific contents about "Other" |
| Feedback in the class |
|
Textbooks and reference materials
八木毅ほか「コンピュータネットワークセキュリティ」コロナ社、2015年
岡本栄司「暗号理論入門」共立出版、2002年
To study low-level programming and the fundamentals of networking. Students are also expected to develop the ability to read
academic papers written in English.
Office hours and How to contact professors for questions
Non-regionally-oriented course
Development of social and professional independence
- Course that cultivates an ability for utilizing knowledge
- Course that cultivates a basic problem-solving skills
Most classes are interactive
Course by professor with work experience
| Work experience |
Work experience and relevance to the course content if applicable |
| Applicable |
The faculty member has experience at think tanks and related organizations in areas such as cybersecurity policymaking; receiving
and processing incident reports; providing response support; assessing incident trends; analyzing attack methods; and examining
and advising on measures to prevent recurrence. Drawing on this experience, the faculty member lectures on the societal impact
of cybersecurity and on the responsibilities that technology and society bear toward the broader community.
|
Education related SDGs:the Sustainable Development Goals
- 1.NO POVERTY
- 9.INDUSTRY, INNOVATION AND INFRASTRUCTURE
- 16.PEACE, JUSTICE AND STRONG INSTITUTIONS
Last modified : Sat Mar 14 14:46:30 JST 2026