Keio University Shonan Fujisawa Campus
Course Summary (Syllabus)

INTERNET SECURITY ARCHITECTURE (Jun Murai,Yasuo Sakamoto,Masaaki Sato,Keiji Takeda

    Semester : 2016 Fall
    Code : X1023 / 2 Credits

1. Objectives/Teaching method

    本授業では、現在の情報システムに対する脅威を明らかにし、個人、社会、組織でのセキュリティ対策について議論する。現在の情報システムは、目的、対象、実現方法、ステークホルダがシステム毎に異なっている。そのため、単純なセキュリティ対策では、さまざまなリスクに適切に対応することは難しい。インターネット時代のセキュリティ管理では、ステークホルダ、サービス、システム毎の特徴やリスクを網羅的に分析し、コストと利便性のトレードオフなどを考慮した上で包括的な対策が実行されることが望まれる。本授業では、テーマ毎にセキュリティ問題を多面的に分析し、望まれるセキュリティ対策について議論する。各学生が主体的に考えられるように、授業ではディスカッションを重視して行う。したがって、学生諸君が積極的に議論に参加することを履修条件とする。テーマ毎に読んでおくべき文献・資料を指示する場合があるので、事前に読んでから参加すること。 シラバスの内容は履修者の興味の対象や時事の問題によって、変更が生じる可能性がある。

    This lecture analyzes threats against current information systems and discusses security countermeasures performed in the society or in an organization. The purpose, target, realization method, and stakeholder are different for each in the current information systems. A simple security countermeasure, therefore, cannot properly cope with prevalent risks. The desired security countermeasure includes analysis of stakeholders, services, systems' features, and trade-off considerations between cost and convenience. Furthermore, these should be done properly and timely. In fact, it is necessary to understand security concepts and problems as well as taking proper measures against problems for each systems.  
    In this lecture, we will analyze security problems of each topic from many perspectives and discuss the preferred security countermeasures. Our lectures emphasize on group discussions to actively involve students. Thus, student participation in the discussions is a requirement. Also, students will be assigned with documents to read beforehand for each topic. Students are expected to read the assigned documents before attending each lecture.  The contents of the syllabus are subject to change depending on the students' interests and current events.

2. Materials/Reading List

    履修に必要な教科書は特になし。 参考書については講義内で必要に応じて紹介する。

    No required textbook. We introduce reference arbitrarily in the class.


    #1 Introduction
    In the beginning of the lecture, teachers will give opening remarks.

    #2 サイバーセキュリティ概論  Outline of Cyber Security
    Introduced outline, technology trend and incident of cyber security.
    Also, We analysis security problems from many perspectives and discuss the preferred security countermeasures.

    #3 サイバーセキュリティ(1) ストラテジー Cyber Security(1): Strategy
    We deal with security issues in the current Internet technology and explain countermeasures used in society and organization. We also discuss basic strategy of cyber security that is the Internet as Global System.

    #4 サイバーセキュリティ(2) アーキテクチャ Cyber Security(2): Architecture
    An architecture of current cyber security and protection methods would be discussed. We also discuss how to coordinate the basic rules, methods, and principles.

    #5 デジタルコンテンツとプライバシ Digital Contents and Privacy
    デジタルコンテンツの管理とその関連技術、セキュリティに関する課題を取り扱う。また、インターネットの時代の個人情報の取り扱いや情報の転送の際に生じるリスク, および集約された情報の管理や国際的な取扱いに関する課題を取り扱う。
    Management of digital contents, technologies for contents management and security issues on digital content would be discussed. Also, the handling of personal information, particularly, the risks arising from transferring personal information across nations, as well as policy issues will be discussed in this lecture.

    #6 Web とセキュリティ Web technologies and security
    We will discuss Web technologies, protocols and operation methods for Secure-WEB in this lecture.

    #7 学生発表 コンテンツとセキュリティ  Contents and Privacy
    Teams report and discuss their assignment. Topic is “digital contents and security”.

    #8 IoTとビッグデータ  IoT and Big data
    We discuss utilization of big data and related issues on personal data and privacy and discuss on political situation of personal data. In this lecture, Threat and risk analysis of big data from sensors (Internet of things: IoT) will be discussed.

    #9 デジタルファブリケーションとセキュリティ  Digital fabrication and security
    Introduced technology on digital fabrication and related security issues.

    #10 人工知能とセキュリティ  Artificial Intelligent, technology singularity and security
    We discuss utilization of big data and related issues on personal data and privacy and discuss on political situation of personal data. In this lecture, Threat and risk analysis of big data for deep learning and technology singularity of intelligence will be discussed.

    #11 新興サービスとセキュリティ  Emerging Services and Security
    ITS(Intelligent Transport Systems)や医療、農業等、近年よりサイバースペースと密接な関わりが生じているサービスやビジネス分野について述べ、それらについてのプライバシ、セキュリティに関する問題や課題について議論する。

    We deal with some emerging services in cyber space (ITS, Healthcare, Agriculture…), and discuss threat and risk analysis of these activities.
    Also, the handling of personal information, as well as security issues will be discussed in this lecture.

    #12 サイバーセキュリティとガバナンス  Cyber security and governance

    We discuss governance for global/cross-border security, international harmonization and cooperation. In this lecture, Threat and risk analysis of a world wide event (ex. Olympic game 2020) will be discussed. We also discuss governance of the Internet as Global System and their Security, Role of Nation, Society and International treaty etc.

    #13 最終発表(1) Final Presentation(1)

    Final presentation of the group work will be held.

    #14 最終発表(2) Final Presentation(2)

    Final presentation of the group work will be held. In this last lecture, we will sum up all the topics undergone.

4. Assignments/Examination/Grad Eval.


    Overall scoring will consist of reports or assignments, class participation, and group assignment report. The active participation in discussions and the contribution of ideas to increase the value of the lectures will be highly evaluated.

5. Special Note


    It would be better for participants to have a basic knowledge on computer network architecture and communication protocols. Participants should have taken the following lectures: 1. “Internet”, 2. “Network Architecture”, 3. “Internet Operation”, or participants should have equivalent knowledge.

6. Prerequisit / Related courses


7. Conditions to take this course


8. Relation with past courses


9. Course URL

2016-08-30 18:17:42.521817

Powered by SOI Copyright(c) 2002-2019, Keio University Shonan Fujisawa Campus. All rights reserved.