大学院
HOME 大学院 Case Study (Cybersecurity: Critical Infrastructure Protection)
過去(2017年度)の授業の情報です
学内のオンライン授業の情報漏洩防止のため,URLやアカウント、教室の記載は削除しております。
最終更新日:2024年4月1日

授業計画や教室は変更となる可能性があるため、必ずUTASで最新の情報を確認して下さい。
UTASにアクセスできない方は、担当教員または部局教務へお問い合わせ下さい。

Case Study (Cybersecurity: Critical Infrastructure Protection)

The national and economic security depends on the reliable functioning of critical infrastructure. This course encourages collaboration efforts among individuals and organizations responsible for both physical and cybersecurity toward development of integrated risk management strategies that lead to enhanced capabilities necessary for the protection of our Nation’s critical infrastructure. Students will identify physical and cybersecurity concerns impacting overall infrastructure security posture, examine integrated physical and cybersecurity incidents and the evolving risks and impacts they pose to critical infrastructure, and explore resources that can be applied to improve security within an organization, business, or government entity.
MIMA Search
時間割/共通科目コード
コース名
教員
学期
時限
5140079
Case Study (Cybersecurity: Critical Infrastructure Protection)
林 良造
A1 A2
月曜5限
マイリストに追加
マイリストから削除
講義使用言語
英語
単位
2
実務経験のある教員による授業科目
NO
他学部履修
開講所属
公共政策学教育部
授業計画
Week 1(9/25): Introduction Speaker/instructor Prof.Hayashi & Prof.Onishi What is cybersecurity? What does it mean to protect or defend cyberspace from online attacks? How does it influence, change, or (re-)shape our perceptions of security today? Week 2(10/2): What is cyberspace? Technical evolution of network communications and its economic incentives Speaker/instructor Prof.Onishi & Mr. Asaba What are the technical elements of cyberspace? How has it re-shaped our understanding of security today? Also: What are economic incentives for government and business organizations to invest in cybersecurity? Why is it so important? How does it help them to protect their intellectual properties and/or assets without compromising their operations? Week 3(10/16): Governing cybersecurity and infrastructure: policy and regulatory challenges Speaker/instructor Mr. Uryu(NISC) What is critical infrastructure? What does it mean to protect critical infrastructure in the context of cybersecurity? How many sectors are covered? What are the guideline and procedure for choosing the sectors that would need protection from cyberattacks? What challenges does the CIIP pose in terms of conflict between regulations and operational practice? Week 4 (10/23): Cyberattack and protection 1: government sectors Speaker/instructor TBA What are common framework and standard procedure to implement cyber-based infrastructure protection model within government entities? Week 5(10/30): Cyberattack and protection 2: Finance Sector Speaker/instructor Mr. Kamata (Financial ISAC) How does the national government manage critical infrastructure in finance sector? Week 6(11/6): Field Trip #1(SiSOC Yaesu Office) Speaker/instructor Mr.Mitsunaga(Interfaculty Initiative in Information Studies) Class will meet at SiSOC Tokyo Office. Details coming soon. Week 7(11/13): Cyberattack and Protection 3: Telecommunications& Energy Speaker/instructor TBA How would the development of ICT and its proliferation (re-)shape our understanding of critical infrastructure in telecommunications industries and/or any sectors (e.g., energy)? What are the effective measurements to protect/manage assets and resources from cyberattacks from business continuity and growth? Week 8(11/20): Cyberattack and Protection 4: military and national security Speaker/instructor Dr. Heng(Graduate School of Public Policy) How does coalition of cybersecurity practice into national security and defense shape our understanding? Week 9 (11/27): Student’s Research Paper Proposal Speaker/instructor Prof.Hayashi/Prof.Onishi Students will discuss their research topics related to cybersecurity from the dimension of critical infrastructure protection. Week 10 (12/04): Effective Information Sharing Mechanism on Cyberattack Speaker/instructor Mr. Yokohama(NTT) How can operators and businesses share information about cyber incidents and threats that would cause substantial damages to their commercial and non-commercial interests? What is ISAC? How is it organized? What are the elements of effective information sharing mechanism? (Use the model in the US) Week 11 (12/11): Growing Cyber Risk in Healthcare System: Ransomware and Security Threat Speaker/instructor TBA What are the challenges in implementing Critical Infrastructure Protection? When do regulations become an obstacle for reducing security risk and vulnerability? Week 12(12/18): Field Trip TBA. Details coming soon. Week13 (12/25): Course Review, Student Presentations No guest lecture. Summary. Oral report on student research project.
授業の方法
Lecture, gust speakers, student presentations
成績評価方法
Class participation and engagement 40% Paper/Report 60%
参考書
To be provided during the course