Introduction to modern cryptography and information security

MORI, Takuo
  Elective  2 credits
【 Informatics Science〈Correspondence Course〉(Master's Degree Program)・full year】
19-3-1713-2349

1.
Outline
Information security covers broad fields, from the cryptography to practice information networks or systems. In this course, we aim at systematically understanding the way to deal with security problems which may happen in practical information systems, from basic.


This course relates to the diploma policy 1, 2 and 4 of the division of informatics science, graduated school of Teikyo University.

<Comments>
Information security covers broad fields, from the cryptography to practice information networks or systems. In this course, we aim at systematically understand the way to deal with security problems which may happen in practical information systems, from basic.

This course relates to the diploma policy 1, 2 and 4 of the division of informatics science, graduated school of Teikyo University.\
2.
Objectives
The goal of this course is that students master the following abilities;

Students can explain how to prevent from unauthorized accesses, and show basic countermeasures against unauthorized accesses.
Students can explain how to protect Web-applications, and show basic countermeasures against attack to the Web-applications.
Students can explain the operation principles of malware, and show basic countermeasures against malware.
Students can explain the operation principles of intrusion detection/protection systems(IDS/IPS) and, how to introduce IDS/IPS.
Students can show basic access control techniques and choose appropriate ones according to the situation.
Students can explain information security protocols.
Students can explain foundations of constructing/operating information systems.
Students can show outlines basics of Information Management Systems.
Students can explain new trends in information security technology.
Students can explain and write basic cyber-security programmings.

<Comments>
訂正無し
3.
Grading Policy
Grading policy: Examination(100%)

The way of feedback;
Answers for questions or feedback for the contents of class and reports will be given in a class, through LMS.

<Comments>
訂正無し
4.
Textbook and Reference
Text: 佐々木良一監修、電子情報通信学会編、"現代電子情報通信選書「知識の森」 ネットワークセキュリティ、" オーム社、ISBN-13: 978-4274215179
Reference: 参考書: Justin Seitz著,‎ 青木 一史 訳,‎ 新井 悠 訳、‎ 一瀬 小夜訳、 岩村 誠訳、‎ 川古谷 裕平訳、‎ 星澤 裕二訳、"サイバーセキュリティプログラミング ―Pythonで学ぶハッカーの思考、" オライリージャパン、ISBN-13: 978-4873117317
Teaching Materials: LMS

<Comments>
訂正無し
5.
Requirements (Assignments)
For each class, students should review notes and related materials published through LMS.
In a semester, students should study over 30 hours.

Teaching materials of this or last years will be published through LMS. In addition, small quizzes for each class will be published through LMS. Though quizzes are not used for grading. students should utilize to review each class.

<Comments>
For each class, students should review notes and related materials published through LMS.
In a semester, students should study over 30 hours.

Teaching materials of this or last years will be published through LMS. In addition, small quizzes for each class will be published through LMS. Although, quizzes are not used for grading, students should utilize to review each class.
6.
Note
In order to earn credits of this course, students must submit two reports and take the examination.

Students should have basic (at least, undergraduate level) knowledge of the following source,
Mathematical logic, Algebraic systems, Elementary number theory, Complexity theory, Network technology, Programming language, Database theory.

After taking this course, students should take Quantum Information Science.

<Comments>
In order to earn credits in this course, students must submit two reports and take the examination.

Students should have basic (at least, undergraduate level) knowledge of the following source,
Mathematical logic, Algebraic systems, Elementary number theory, Complexity theory, Network technology, Programming language, Database theory.

After taking this course, students should take Quantum Information Science.
7.
Schedule
1. A trends in network security

<Comments>
訂正無し
2. Unauthorized access1 -Password Cracking-

<Comments>
訂正無し
3. Unauthorized access2 -Basics of Web-application security-

<Comments>
訂正無し
4. Unauthorized access 3 -Injection, XSS-

<Comments>
訂正無し
5. Unauthorized access 4 -CSRF, Buffere-overflow, Drive-by-download-

<Comments>
訂正無し
6. Malwares

<Comments>
訂正無し
7. Intrusion detection/protection systems.

<Comments>
訂正無し
8. Access control1 -An introduction to the access control-

<Comments>
訂正無し
9. Access control2 -Identification, Fire wall-

<Comments>
訂正無し
10. Information security protocols

<Comments>
訂正無し
11. Construction/Operation of information security systems

<Comments>
訂正無し
12. Information security management systems

<Comments>
訂正無し
13. New Trends in network security1 -APT/IPv6-

<Comments>
訂正無し
14. New Trends in network security2 -Threat to smart phones/tables-

<Comments>
訂正無し
15. Cyber security programming

<Comments>
訂正無し
1.
Outline
Information security covers broad fields, from the cryptography to practice information networks or systems. In this course, we aim at systematically understanding the way to deal with security problems which may happen in practical information systems, from basic.


This course relates to the diploma policy 1, 2 and 4 of the division of informatics science, graduated school of Teikyo University.

<Comments>
Information security covers broad fields, from the cryptography to practice information networks or systems. In this course, we aim at systematically understand the way to deal with security problems which may happen in practical information systems, from basic.

This course relates to the diploma policy 1, 2 and 4 of the division of informatics science, graduated school of Teikyo University.\
2.
Objectives
The goal of this course is that students master the following abilities;

Students can explain how to prevent from unauthorized accesses, and show basic countermeasures against unauthorized accesses.
Students can explain how to protect Web-applications, and show basic countermeasures against attack to the Web-applications.
Students can explain the operation principles of malware, and show basic countermeasures against malware.
Students can explain the operation principles of intrusion detection/protection systems(IDS/IPS) and, how to introduce IDS/IPS.
Students can show basic access control techniques and choose appropriate ones according to the situation.
Students can explain information security protocols.
Students can explain foundations of constructing/operating information systems.
Students can show outlines basics of Information Management Systems.
Students can explain new trends in information security technology.
Students can explain and write basic cyber-security programmings.

<Comments>
訂正無し
3.
Grading Policy
Grading policy: Examination(100%)

The way of feedback;
Answers for questions or feedback for the contents of class and reports will be given in a class, through LMS.

<Comments>
訂正無し
4.
Textbook and Reference
Text: 佐々木良一監修、電子情報通信学会編、"現代電子情報通信選書「知識の森」 ネットワークセキュリティ、" オーム社、ISBN-13: 978-4274215179
Reference: 参考書: Justin Seitz著,‎ 青木 一史 訳,‎ 新井 悠 訳、‎ 一瀬 小夜訳、 岩村 誠訳、‎ 川古谷 裕平訳、‎ 星澤 裕二訳、"サイバーセキュリティプログラミング ―Pythonで学ぶハッカーの思考、" オライリージャパン、ISBN-13: 978-4873117317
Teaching Materials: LMS

<Comments>
訂正無し
5.
Requirements (Assignments)
For each class, students should review notes and related materials published through LMS.
In a semester, students should study over 30 hours.

Teaching materials of this or last years will be published through LMS. In addition, small quizzes for each class will be published through LMS. Though quizzes are not used for grading. students should utilize to review each class.

<Comments>
For each class, students should review notes and related materials published through LMS.
In a semester, students should study over 30 hours.

Teaching materials of this or last years will be published through LMS. In addition, small quizzes for each class will be published through LMS. Although, quizzes are not used for grading, students should utilize to review each class.
6.
Note
In order to earn credits of this course, students must submit two reports and take the examination.

Students should have basic (at least, undergraduate level) knowledge of the following source,
Mathematical logic, Algebraic systems, Elementary number theory, Complexity theory, Network technology, Programming language, Database theory.

After taking this course, students should take Quantum Information Science.

<Comments>
In order to earn credits in this course, students must submit two reports and take the examination.

Students should have basic (at least, undergraduate level) knowledge of the following source,
Mathematical logic, Algebraic systems, Elementary number theory, Complexity theory, Network technology, Programming language, Database theory.

After taking this course, students should take Quantum Information Science.
7.
Schedule
1. A trends in network security

<Comments>
訂正無し
2. Unauthorized access1 -Password Cracking-

<Comments>
訂正無し
3. Unauthorized access2 -Basics of Web-application security-

<Comments>
訂正無し
4. Unauthorized access 3 -Injection, XSS-

<Comments>
訂正無し
5. Unauthorized access 4 -CSRF, Buffere-overflow, Drive-by-download-

<Comments>
訂正無し
6. Malwares

<Comments>
訂正無し
7. Intrusion detection/protection systems.

<Comments>
訂正無し
8. Access control1 -An introduction to the access control-

<Comments>
訂正無し
9. Access control2 -Identification, Fire wall-

<Comments>
訂正無し
10. Information security protocols

<Comments>
訂正無し
11. Construction/Operation of information security systems

<Comments>
訂正無し
12. Information security management systems

<Comments>
訂正無し
13. New Trends in network security1 -APT/IPv6-

<Comments>
訂正無し
14. New Trends in network security2 -Threat to smart phones/tables-

<Comments>
訂正無し
15. Cyber security programming

<Comments>
訂正無し