This lecture analyzes threats against current information systems and discusses security countermeasures performed in the society or in an organization. The purpose, target, realization method, and stakeholder are different for each in the current information systems. A simple security countermeasure, therefore, cannot properly cope with prevalent risks. The desired security countermeasure includes analysis of stakeholders, services, systems' features, and trade-off considerations between cost and convenience. Furthermore, these should be done properly and timely. In fact, it is necessary to understand security concepts and problems as well as taking proper measures against problems for each systems.
No required textbook. We introduce reference arbitrarily in the class.
第2回 Outline of Cyber Security
第3回 Cyber Security(1): Strategy
第4回 Cyber Security(2): Architecture
第5回 Digital Contents and Privacy
第6回 Web technologies and security
第7回 Students’ Presentation：Contents and Secutiry
第8回 IoT and Big data
第9回 Digital fabrication and security
第10回 Students’ Presentation：Big data and Privacy
第11回 Artificial Intelligent, technology singularity and security
第12回 Cyber security and governance
第13回 Final Presentation(1)
第14回 Final Presentation(2)
Overall scoring will consist of reports or assignments, class participation, and group assignment report. The active participation in discussions and the contribution of ideas to increase the value of the lectures will be highly evaluated.
It would be better for participants to have a basic knowledge on computer network architecture and communication protocols. Participants should have taken the following lectures: 1. “Internet”, 2. “Network Architecture”, 3. “Internet Operation”, or participants should have equivalent knowledge.
Copyright(c) 2002-2016, Keio University Shonan Fujisawa Campus. All rights reserved.