シラバス参照

公式版のシラバスを表示  
最終更新日:2019/12/10  
筑波大学 教育課程編成支援システム(EN)

01CF211 Advanced Course in Network Security

2.0 Credits, 1, 2 Year, Sum Vac Intensive
Masato Terada

Course Overview

Unauthorized access containing Malware propagation is activated and causes a lot of damage. This course is focused on basic network security technologies such as security of network architecture and security of network application, which ensure secure information technology systems.

Remarks

「ネットワークセキュリティ特論II」との重複履修不可
8/31,9/1,9/2,9/3
教室は811と812を使用する。

Course Type

lectures

Field

Cyber Risk

Relationship with Major Educational Goals

This lecture is related mainly to "1. The basic theory for analyzing and assessing risk," partly to "2. The data processing skills for analyzing and assessing risk," "3. The real world problems that are the target of risk engineering" and "4. The ability to approach risk engineering from a wide range of perspectives."

Course Highlight

Understand the risks and typical security technologies of network systems.

Calendar

1)Introduction and recognizing potential threats in the network society   
2)Network architecture and Security   
3)TCP/IP and Security (1)   
4)TCP/IP and Security (2)   
5)Network application and Security (1)   
6)Network application and Security (2)   
7)DNS and Security   
8)Email and Security   
9)Web and Security (1)   
10)Web and Security (2)   
11)Network layer security   
12)Application layer security   
13)Unauthorized access activities (1)   
14)Unauthorized access activities (2)   
15)Tabletop exercise (1)   
16)Tabletop exercise (2)   

Outcomes

1) Students should understand network architecture.
2) Students should understand network security technologies.
3) Students should understand unauthorized access activities and countermeasures.

Grading

Evaluation based on reports
Pass level is over 60% in overall evaluation

Relationship with Student Achievement Assessment Attributes

For students majoring in this field, the lecture is related mainly to "1) Knowledge of fundamental/basic theory in the major field," and partly to "3) Understanding of real world problems" and "4) Ability in recognizing problems from a broad perspective."
For students majoring in other fields, this lecture is related mainly to "2) Knowledge of fundamental/basic theory of related fields," and partly to "3) Understanding of real world problems" and "4) Ability in recognizing problems from a broad perspective."

Text

Handouts

References

1. (独)情報処理推進機構「情報セキュリティ読本」実教出版 2006年発行
2. (独)情報処理推進機構「情報セキュリティ教本」実教出版 2007年発行
3. 瀬戸洋一他「情報セキュリティ概論」日本工業出版 2007年発行

1. IPA, ""Basic information security technologies"", Jikkyo 2006.
2. IPA, ""Mastering information security technologies"", Jikkyo 2007.
3. Yoichi Seto, ""Overview of information security technologies"", Nippon Kogyo, 2007.

Office Hour

Prerequisites

Some knoweldge on TCP/IP network technologies are required

Other Information

Three reports as additional class work

Related Courses

Self-study

There will be 3 exercises outside the class.