到達目標
With the development of ICT technology, the Internet has become an everyday part of our lives, and we enjoy its convenience. On the other hand, however, the Internet also poses threats to us, and can cause damage if appropriate countermeasures are not taken. This class aims to allow the students to understand the security technologies to keep us safe and secure in the Internet age.
ルーブリック
| Ideal Level | Standard Level | Unacceptable Level |
Evaluation Item (1) | Can explain TCP/IP. | Knows TCP/IP. | Does not know TCP/IP. |
Evaluation Item (2) | Can explain the various protocols in the application layer. | Knows the various protocols in the application layer. | Does not know the various protocols in the application layer. |
Evaluation Item (3) | Can explain the current state and measures of cybersecurity. | Knows the current state and measures of cybersecurity. | Does not know the current state and measures of cybersecurity. |
学科の到達目標項目との関係
教育方法等
概要:
In this course, the students will learn about security technologies for maintaining safety and security in the Internet age.
This class is taught by an invited expert who has practical experience (specialized in network security at the Networking and Computing Service Center of the college), and povides fourth-year students with lectures and practice training intensively during the summer vacation and specific periods.
授業の進め方・方法:
Lectures on information security technologies will be given.
注意点:
授業の属性・履修上の区分
授業計画
|
|
週 |
授業内容 |
週ごとの到達目標 |
前期 |
1stQ |
1週 |
How the Internet works |
Understands the basic technologies of the Internet. D2:1
|
2週 |
〃
|
〃
|
3週 |
TCP/IP
|
Understands TCP/IP. D2:1,3
|
4週 |
〃
|
〃
|
5週 |
OSI reference model |
Understands hierarchization. D2:1,3
|
6週 |
〃
|
〃
|
7週 |
Applications |
Learns the various protocols (DNS, HTTP, SMTP, IMAP) in the application layer.
|
8週 |
〃
|
〃
|
2ndQ |
9週 |
Basics of information security |
Understands the basic concepts of information security. D2:1
|
10週 |
〃
|
〃
|
11週 |
Common-key cryptography |
Understands the principle and characteristics of common-key cryptography.
|
12週 |
〃
|
〃
|
13週 |
Public-key cryptography |
Uderstands the mechanism of the RSA cryptosystem of public-key cryptography.
|
14週 |
〃
|
〃
|
15週 |
Public-key cryptography 2 |
Performs the calculations of RSA encryption and decryption.
|
16週 |
|
|
後期 |
3rdQ |
1週 |
Public-key cryptography 2 |
Performs the calculations of RSA encryption and decryption.
|
2週 |
Authentication technologies |
Understands cryptographic hash functions.
|
3週 |
〃 |
〃
|
4週 |
PKI
|
Gets acquianted with PKI (public key infrastructure). D2:1,3
|
5週 |
〃
|
〃
|
6週 |
Cybersecurity |
Malware and DDOS attacks are introduced. Understands the current state and measures of cybersecurity.
|
7週 |
〃
|
〃
|
8週 |
Cybersecurity 2 |
〃
|
4thQ |
9週 |
〃
|
〃
|
10週 |
Server vulnerabilities |
Vulnerabilities on the web server side, such as XSS and SQL injection, are introduced.
|
11週 |
〃
|
〃
|
12週 |
Network security |
Security testing measures in networks, such as FIREWALL and IDS, are introduced.
|
13週 |
〃
|
〃
|
14週 |
Exam |
|
15週 |
Exam solutions |
|
16週 |
|
|
モデルコアカリキュラムの学習内容と到達目標
分類 | 分野 | 学習内容 | 学習内容の到達目標 | 到達レベル | 授業週 |
評価割合
| examination | Report | Mutual Evaluations between students | Behavior | Portfolio | Other | 合計 |
総合評価割合 | 70 | 30 | 0 | 0 | 0 | 0 | 100 |
Basic Proficiency | 35 | 15 | 0 | 0 | 0 | 0 | 50 |
Specialized Proficiency | 35 | 15 | 0 | 0 | 0 | 0 | 50 |
Cross Area Proficiency | 0 | 0 | 0 | 0 | 0 | 0 | 0 |