Keio University Shonan Fujisawa Campus
Course Summary (Syllabus)
1. Objectives/Teaching method
This lecture analyzes threats against current information systems and discusses security countermeasures performed in the society or in an organization. The purpose, target, realization method, and stakeholder are different for each in the current information systems. A simple security countermeasure, therefore, cannot properly cope with prevalent risks. The desired security countermeasure includes analysis of stakeholders, services, systems' features, and trade-off considerations between cost and convenience. Furthermore, these should be done properly and timely. In fact, it is necessary to understand security concepts and problems as well as taking proper measures against problems for each systems.
In this lecture, we will analyze security problems of each topic from many perspectives and discuss the preferred security countermeasures. Our lectures emphasize on group discussions to actively involve students. Thus, student participation in the discussions is a requirement. Also, students will be assigned with documents to read beforehand for each topic. Students are expected to read the assigned documents before attending each lecture. The contents of the syllabus are subject to change depending on the students' interests and current events.
2. Materials/Reading List
In the beginning of the lecture, teachers will give opening remarks.
#2 Outline of Cyber Security
Introduced outline, technology trend and incident of cyber security.
Also, We analysis security problems from many perspectives and discuss the preferred security countermeasures.
#3 Cyber Security(1): Strategy
We deal with security issues in the current Internet technology and explain countermeasures used in society and organization. We also discuss basic strategy of cyber security that is the Internet as Global System.
#4 Cyber Security(2): Architecture
An architecture of current cyber security and protection methods would be discussed. We also discuss how to coordinate the basic rules, methods, and principles
#5 Digital Contents and Privacy
Management of digital contents, technologies for contents management and security issues on digital content would be discussed. Also, the handling of personal information, particularly, the risks arising from transferring personal information across nations, as well as policy issues will be discussed in this lecture.
#6 Web technologies and security
We will discuss Web technologies, protocols and operation methods for Secure-WEB in this lecture.
#7 Students’ Presentation
Teams report and discuss their assignment.
#8 security and governance
We discuss governance of the Internet as Global System and their Security, Role of Nation, Society and International treaty etc.
#9 IoT and Big data
We discuss utilization of big data and related issues on personal data and privacy and discuss on political situation of personal data. In this lecture, Threat and risk analysis of big data from sensors (Internet of things: IoT) will be discussed.
#10 Digital fabrication and security
Introduced technology on digital fabrication and related security issues
#11 Students’ Presentation
Teams report and discuss their assignment.
#12 Artificial Intelligent, technology singularity and security
We discuss utilization of big data and related issues on personal data and privacy and discuss on political situation of personal data. In this lecture, Threat and risk analysis of big data for deep learning and technology singularity of intelligence will be discussed.
#13 security for cyber physical system
We discuss governance for global/cross-border security, international harmonization and cooperation. In this lecture, Threat and risk analysis of a world wide event (ex. Olympic game 2020) will be discussed.
#14 Final Presentation
Final presentation of the group work will be held. In this last lecture, we will sum up all the topics undergone.
4. Assignments/Examination/Grad Eval.
Overall scoring will consist of reports or assignments, class participation, and group assignment report. The active participation in discussions and the contribution of ideas to increase the value of the lectures will be highly evaluated.
5. Special Note
It would be better for participants to have a basic knowledge on computer network architecture and communication protocols. Participants should have taken the following lectures: 1. “Internet”, 2. “Network Architecture”, 3. “Internet Operation”, or participants should have equivalent knowledge.
6. Prerequisit / Related courses
7. Conditions to take this course
8. Relation with past courses
9. Course URL