Course Objectives
Learning purposes : Information security is focus, including technical mechanisms. In addition, specific methods of attack and defense, with examples, are addressed.
Course Objectives :
1. To be able to explain the basics of information security and its importance.
2. To explain the basic knowledge necessary for security measures for individuals.
3. To be able to explain the basic knowledge necessary for security measures as a member of an organization.
4. Explain information security technologies and related laws and systems.
Rubric
| Excellent | Good | Acceptable | Not acceptable |
Achievement 1 | Explain the basics of information security and its importance in concrete terms. | Explain the basics of information security and the concept of its importance. | Can provide examples of the basics of information security and its importance. | Does not meet the requirements. |
Achievement 2 | Be able to comprehensively explain the basics of security measures needed as an individual. | Explain the basic knowledge concepts required for security measures as an individual. | Be able to give examples of the basic knowledge required for security measures as an individual. | Does not meet the requirements. |
Achievement 3 | Be able to explain in detail the fundamentals required for security measures as a member of an organization. | Explain the basic knowledge concepts required for security measures as a member of an organization. | Be able to give examples of the basic knowledge required for security measures as a member of an organization. | Does not meet the requirements. |
Achievement 4 | Be able to explain the technology and related laws and systems related to information security in detail. | Explain many concepts of information-security technologies and related laws and institutions. | Be able to give examples of information security technologies and related laws and institutions. | Does not meet the requirements. |
Assigned Department Objectives
Teaching Method
Outline:
General or Specialized : Specialized
Field of learning : Information Systems, Programming and Networking
Required, Elective, etc. :Required subjects
Foundational academic disciplines : :Information science, computer engineering, and related fields / Information security-related
Relationship with Educational Objectives : This class is equivalent to (3) Acquire deep foundation knowledge of the major subject area
Relationship with JABEE programs : The main goals of learning / education in this class are "(A) ..., A-2: ...".
Course outline : In the first semester, students learn about general information security. In the second semester, students learn about specific methods of attack, defense methods, and related laws.
Style:
Course method : The class will be taught mainly on the board, using a textbook. Related technologies are also explained in addition to the textbook, if necessary. Exercises will be given to deepen students' understanding.
Grade evaluation method : The results of the two regular exams will be weighted (60%, Latter Middle: Latter End = 1:1).
Students are not allowed to bring their own notes for each examination.
Students who score less than 60 points on examinations can improve marks if their understanding is confirmed through make-up exams and retests. However, change will not exceed 60 points.
Evaluation is based on exercises and reports (40%).
Notice:
Precautions on the enrollment : Students must take this class (no more than one-fifth of the required number of class hours missed) and earn the credit in order to complete the 4th year course.
Course advice : Be sure to understand meanings and definitions of terms in the textbook. Solve the examples and exercises at the end of each chapter to make sure that you understand concepts.
Foundational subjects : Fundamentals of Integrated Science and Technology(1st year), Information Literacy(1st year) , etc.
Related subjects : Graduation Thesis(5th year), etc.
Attendance advice : In addition to the basic knowledge, students are expected to learn about communication devices and wireless devices used in modern society. Tardiness will be dealt with in one-quarter (=0.5) of the class time.
Course Plan
|
|
|
Theme |
Goals |
2nd Semester |
3rd Quarter |
1st |
Guidance |
Understand the overview of the lecture.
|
2nd |
Cases of Damage in Information Security |
Investigate and understand cases of damage in information security.
|
3rd |
Information Security Crisis Recognition and Countermeasures |
Research and understand how to recognize and address crises related to information security.
|
4th |
External and Internal Risk Factors |
Investigate and understand external and internal risk factors
|
5th |
Malware |
Research and understand malware
|
6th |
Common Measures for Information Security |
Research and understand common measures for information security
|
7th |
Response to Targeted and Guided Attacks Threats to Smartphones and Wireless LANs |
Investigate and understand the threats to smartphones and wireless LANs and how to respond to targeted and guided attacks.
|
8th |
midterm examination |
midterm examination
|
4th Quarter |
9th |
Midterm exam returns and answer explanations |
Understand the return of the midterm exam and answer explanations.
|
10th |
Organizational security measures |
Research and understand your organization's security measures.
|
11th |
Security Technology (1) Account, ID and password |
Research and understand your accounts, IDs and passwords.
|
12th |
Security Technology (2) Firewall Encryption and Digital Signatures |
Investigate and understand firewalls, encryption and digital signatures.
|
13th |
Information Security Laws |
Research and understand the laws related to information security.
|
14th |
Information security related systems and systems that do not specialize in information |
Research and understand information security related systems and information security of non-specialized systems.
|
15th |
final exams |
final exams
|
16th |
Return of the late final exam and explanation of the answers |
Understand the questions and answers to the late final exam.
|
Evaluation Method and Weight (%)
| Examination | Presentation | Mutual Evaluations between students | Behavior | Portfolio | Other | Total |
Subtotal | 60 | 0 | 0 | 0 | 40 | 0 | 100 |
Basic Proficiency | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Specialized Proficiency | 60 | 0 | 0 | 0 | 40 | 0 | 100 |
Cross Area Proficiency | 0 | 0 | 0 | 0 | 0 | 0 | 0 |