Keio University Syllabus and Timetable

INTRODUCTION TO CYBERSECURITY

Lecturer(s)BANA, GERGELY I.
Credit(s)2
Academic Year/Semester2024 Fall
Day/PeriodFri.4
CampusMita
Class FormatFace-to-face classes (conducted mainly in-person)
Registration Number25535
Faculty/Graduate SchoolINTERNATIONAL CENTER
Year Level2, 3, 4
Grade TypeThis item will appear when you log in (Keio ID required).
Course DescriptionA course to aim to introduce the basic concepts of Cybersecurity. We talk about the challenges the interconnectedness of the cyberspace poses to computer networks, the concept of risk, typical patterns of vulnerabilities, attacks and mitigation strategies. We introduce, in a non-technical fashion, the basic concepts of cryptography, and the typical cryptographic building blocks: encryption, digital signatures, authentication codes, public key and secret key infrastructures.
K-Number CIN-CO-00313-212-60
Course AdministratorFaculty/Graduate SchoolCININTERNATIONAL CENTER
Department/MajorCO
Main Course NumberLevel0Faculty-wide
Major Classification0Other Course
Minor Classification31International Center Course (Natural Sciences) - Science
Subject Type3Elective subject
Supplemental Course InformationClass Classification2Lecture
Class Format1Face-to-face classes (conducted mainly in-person)
Language of Instruction2English
Academic Discipline60Information science, computer engineering, and related fields

Course Contents/Objectives/Teaching Method/Intended Learning Outcome

In this course we introduce the basic concepts of Cybersecurity. We talk about the challenges the interconnectedness of the cyberspace poses to computer networks, the concept of risk, typical patterns of vulnerabilities, attacks and mitigation strategies. We introduce, in a non-technical fashion, the basic concepts of cryptography, and the typical cryptographic building blocks: encryption, digital signatures, authentication codes, public key and secret key infrastructures. We talk about how these building blocks are used to construct secure networks. We also touch upon the legal frameworks handling cyber attacks. Finally we discuss cybersecurity in the context of Japan and East Asia.

Active Learning MethodsDescription

This item will appear when you log in (Keio ID required).

Preparatory Study

This item will appear when you log in (Keio ID required).

Course Plan

This item will appear when you log in (Keio ID required).

Method of Evaluation

This item will appear when you log in (Keio ID required).

Reference Books

Robin Sharp: Introduction to Cybersecurity
Ajay Singh: Introduction to Cybersecurity