2.0 Credits, 1, 2 Year, Sum Vac Intensive
Masato Terada
Course Overview
Unauthorized access containing Malware propagation is activated and causes a lot of damage. This course is focused on basic network security technologies such as security of network architecture and security of network application, which ensure secure information technology systems.
Remarks
「ネットワークセキュリティ特論II」との重複履修不可
8/31,9/1,9/2,9/3
教室は811と812を使用する。
Relationship with Major Educational Goals
This lecture is related mainly to "1. The basic theory for analyzing and assessing risk," partly to "2. The data processing skills for analyzing and assessing risk," "3. The real world problems that are the target of risk engineering" and "4. The ability to approach risk engineering from a wide range of perspectives."
Relationship with Student Achievement Assessment Attributes
For students majoring in this field, the lecture is related mainly to "1) Knowledge of fundamental/basic theory in the major field," and partly to "3) Understanding of real world problems" and "4) Ability in recognizing problems from a broad perspective."
For students majoring in other fields, this lecture is related mainly to "2) Knowledge of fundamental/basic theory of related fields," and partly to "3) Understanding of real world problems" and "4) Ability in recognizing problems from a broad perspective."
References
1. (独)情報処理推進機構「情報セキュリティ読本」実教出版 2006年発行
2. (独)情報処理推進機構「情報セキュリティ教本」実教出版 2007年発行
3. 瀬戸洋一他「情報セキュリティ概論」日本工業出版 2007年発行
1. IPA, ""Basic information security technologies"", Jikkyo 2006.
2. IPA, ""Mastering information security technologies"", Jikkyo 2007.
3. Yoichi Seto, ""Overview of information security technologies"", Nippon Kogyo, 2007.