Communication and Information Systems

Course Information

College Tsuyama College Year 2021
Course Title Communication and Information Systems
Course Code 0156 Course Category Specialized / Compulsory
Class Format Lecture Credits Academic Credit: 2
Department Department of Integrated Science and Technology Advanced Science Program Student Grade 5th
Term Second Semester Classes per Week 2
Textbook and/or Teaching Materials Information Security Reader
Instructor HATA Yoshikazu,MORI Yoshiya

Course Objectives

Learning purposes : Information security is focus, including technical mechanisms. In addition, specific methods of attack and defense, with examples, are addressed.

Course Objectives :
1. To be able to explain the basics of information security and its importance.
2. To explain the basic knowledge necessary for security measures for individuals.
3. To be able to explain the basic knowledge necessary for security measures as a member of an organization.
4. Explain information security technologies and related laws and systems.

Rubric

ExcellentGoodAcceptableNot acceptable
Achievement 1Explain the basics of information security and its importance in concrete terms.Explain the basics of information security and the concept of its importance.Can provide examples of the basics of information security and its importance.Does not meet the requirements.
Achievement 2Be able to comprehensively explain the basics of security measures needed as an individual.Explain the basic knowledge concepts required for security measures as an individual.Be able to give examples of the basic knowledge required for security measures as an individual.Does not meet the requirements.
Achievement 3Be able to explain in detail the fundamentals required for security measures as a member of an organization.Explain the basic knowledge concepts required for security measures as a member of an organization.Be able to give examples of the basic knowledge required for security measures as a member of an organization.Does not meet the requirements.
Achievement 4Be able to explain the technology and related laws and systems related to information security in detail.Explain many concepts of information-security technologies and related laws and institutions.Be able to give examples of information security technologies and related laws and institutions.Does not meet the requirements.

Assigned Department Objectives

Teaching Method

Outline:
General or Specialized : Specialized
Field of learning : Information Systems, Programming and Networking
Required, Elective, etc. :Required subjects
Foundational academic disciplines : :Information science, computer engineering, and related fields / Information security-related
Relationship with Educational Objectives : This class is equivalent to (3) Acquire deep foundation knowledge of the major subject area
Relationship with JABEE programs : The main goals of learning / education in this class are "(A) ..., A-2: ...".
Course outline : In the first semester, students learn about general information security. In the second semester, students learn about specific methods of attack, defense methods, and related laws.
Style:
Course method : The class will be taught mainly on the board, using a textbook. Related technologies are also explained in addition to the textbook, if necessary. Exercises will be given to deepen students' understanding.
Grade evaluation method : The results of the two regular exams will be weighted (60%, Latter Middle: Latter End = 1:1).
Students are not allowed to bring their own notes for each examination.
Students who score less than 60 points on examinations can improve marks if their understanding is confirmed through make-up exams and retests. However, change will not exceed 60 points.
Evaluation is based on exercises and reports (40%).
Notice:
Precautions on the enrollment : Students must take this class (no more than one-fifth of the required number of class hours missed) and earn the credit in order to complete the 4th year course.
Course advice : Be sure to understand meanings and definitions of terms in the textbook. Solve the examples and exercises at the end of each chapter to make sure that you understand concepts.
Foundational subjects : Fundamentals of Integrated Science and Technology(1st year), Information Literacy(1st year) , etc.
Related subjects : Graduation Thesis(5th year), etc.
Attendance advice : In addition to the basic knowledge, students are expected to learn about communication devices and wireless devices used in modern society. Tardiness will be dealt with in one-quarter (=0.5) of the class time.

Characteristics of Class / Division in Learning

Active Learning
Aided by ICT
Applicable to Remote Class
Instructor Professionally Experienced

Course Plan

Theme Goals
2nd Semester
3rd Quarter
1st Guidance Understand the overview of the lecture.
2nd Cases of Damage in Information Security Investigate and understand cases of damage in information security.
3rd Information Security Crisis Recognition and Countermeasures Research and understand how to recognize and address crises related to information security.
4th External and Internal Risk Factors Investigate and understand external and internal risk factors
5th Malware Research and understand malware
6th Common Measures for Information Security Research and understand common measures for information security
7th Response to Targeted and Guided Attacks
Threats to Smartphones and Wireless LANs
Investigate and understand the threats to smartphones and wireless LANs and how to respond to targeted and guided attacks.
8th midterm examination midterm examination
4th Quarter
9th Midterm exam returns and answer explanations Understand the return of the midterm exam and answer explanations.
10th Organizational security measures Research and understand your organization's security measures.
11th Security Technology (1)
Account, ID and password
Research and understand your accounts, IDs and passwords.
12th Security Technology (2)
Firewall Encryption and Digital Signatures
Investigate and understand firewalls, encryption and digital signatures.
13th Information Security Laws Research and understand the laws related to information security.
14th Information security related systems and systems that do not specialize in information Research and understand information security related systems and information security of non-specialized systems.
15th final exams final exams
16th Return of the late final exam and explanation of the answers Understand the questions and answers to the late final exam.

Evaluation Method and Weight (%)

ExaminationPresentationMutual Evaluations between studentsBehaviorPortfolioOtherTotal
Subtotal60000400100
Basic Proficiency0000000
Specialized Proficiency60000400100
Cross Area Proficiency0000000