大学院
HOME 大学院 Case Study (Cybersecurity)
過去(2018年度)の授業の情報です
学内のオンライン授業の情報漏洩防止のため,URLやアカウント、教室の記載は削除しております。
最終更新日:2024年4月22日

授業計画や教室は変更となる可能性があるため、必ずUTASで最新の情報を確認して下さい。
UTASにアクセスできない方は、担当教員または部局教務へお問い合わせ下さい。

Case Study (Cybersecurity)

Capacity building strategy and its practice
The course objectives include but not limited to
● Understanding the policy issues that center on international relations, business continuity, and risk/crisis management to protect intellectual property, assets, reputation, and other organizational assets from any threat or attack related to cybersecurity.
● Understanding the role of technical standards to supplement legal and regulatory requirements;
● Analyzing critical incidents including data breaches or related events to design and implement organizational strategies to address such risks;
● Gaining a basic understanding for future technical and other research in security (whether it is public or public sector)
● Gaining a basic grounding for policy via the examination of current research issues and prob-lems
● Gaining experience handling real-world security policy challenges through analysis of public documents and artifacts using written and oral communication.
● Developing the multidisciplinary skills needed to analyze, manage, and resolve the challenges associated with public policy, international relations, and governance.
● Students are encouraged to take experiment provided by Interfaculty Initiative in Information Studies/Graduate School of Interdisciplinary Information Studies
MIMA Search
時間割/共通科目コード
コース名
教員
学期
時限
5140079
GPP-MP6Z40S3
Case Study (Cybersecurity)
林 良造
A1 A2
月曜5限
マイリストに追加
マイリストから削除
講義使用言語
英語
単位
2
実務経験のある教員による授業科目
NO
他学部履修
開講所属
公共政策学教育部
授業計画
*Note: This schedule is tentative. It is subject to change without notice. Week 1(10/01): Course Introduction Speaker/instructor Prof.Hayashi & Prof.Onishi *No class on Oct.8 due to national holiday. Week 2(10/15): What is cyberspace? Network communications and economic as-pects of security Speaker/instructor Prof.Onishi & Mr. Asaba Week 3(10/22): National strategy to governing internet security Speakers/instructor Dr. Misumi (NISC/METI) Week 4(10/29): Capacity building through international coalition Speaker/instructor Mr. Fujii (NRI) Week 5(11/05): Security related technology development Speakers/instructors Dr. Inoue (NICT) or director from LAC Week 6(11/08; Redefined Monday): Field Trip to SiSOC Yaesu Office Class will meet at SiSOC Yaesu Office nearby the Tokyo Station. See the map for the directions. Week 7(11/12): Security and business administration: effective leadership, risk management, and in-house security training Speaker/instructor Mr. Furusawa (NTT) Week 8(11/19): Security of Critical Infrastructure: Building effective communication for information and knowledge sharing(ISAC) Speaker/instructor Mr. Tanaka (Citibank/F-ISAC) Week 9(11/26): Security Capacity Building in US: the case of Citibank Speakers/instructors Mr. Frank Marsillo (Citibank) Week 10(12/03): Security as business: monitoring cyber threats around the globe Speakers/instructors Human Resource or senior analysts from Symantec Inc. Week 11(12/10): Equipping intelligence with security: cybercrime and/or national defense Speaker/instructor Mr. Ide (MSDF) or representative from NPA Week 12(12/17): Brining back to academia: teaching cybersecurity at university campus Speaker/instructor Mr. Mitsunaga (Univ.of Tokyo) or Prof.Sudo (Univ.of Tokyo) *No class on Dec.24 due to national holiday. Work on your paper proposal and presentation. Week 13(12/26; Redefined Monday) Students Paper presentation *Final paper due: 23:59 p.m (JST), Jan.25, 2019
授業の方法
Lecture, gust speakers, student presentations
成績評価方法
A. Class Contribution: 30% Attendance: 30% (X12 classes, except for course guidance on Week 1) B. Final Research Paper: 70% Proposal: 5% Final Paper: 65 %
教科書
There’s no need to purchase a textbook for the class. Handouts and/or brochures provided in weekly guest lectures will provide a chunk of course materials for you.
参考書
National Research Council. At the Nexus of Cybersecurity and Public Policy: Some Basic Con-cepts and Issues. Washington, DC: The National Academies Press, 2014. Free download: http://www.nap.edu/openbook.php?record_id=18749 P. W. Singer & Allan Friedman. Cybersecurity and Cyberwar. Oxford, UK: Oxford University Press, 2014. Susan Landau. Listening In: Cybersecurity in an Insecure Age. Hartford: Yale University Press. 2017. Milton Mueller. Will the Internet Fragment? Sovereignty, Globalization and Cyberspace Sovereignty, Globalization and Cyberspace. Cambridge(UK)/MA(USA): Polity, 2017. James Andrew Lewis. US-Japan Cooperation in Cybersecurity. Center for Strategic & Interna-tional Studies. November 2015. https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/151105_Lewis_USJapanCyber_Web.pdf Scott W. Harold, Martin C. Libicki, Motohiro Tsuchiya, Yurie Ito, Roger Cliff, Ken Jimbo & Yuki Tatsumi. US-Japan Alliance Conference:Strengthening Strategic Cooperation. Santa Monica, CA: RAND Corporation, 2016. https://www.rand.org/content/dam/rand/pubs/conf_proceedings/CF300/CF351/RAND_CF351.pdf Mirko Hohmann, Alexander Pirang, & Thorsten Benner. Advancing Cybersecurity Capacity Building: Implementing a Principle-Based Approach. The Global Public Policy Institute. March 2017. http://www.gppi.net/fileadmin/user_upload/media/pub/2017/Hohmann__Pirang__Benner__2017__Advancing_Cybersecurity_Capacity_Building.pdf Patryk Pawlak & Panagiota-Nayia Barmpaliou. “Politics of Cybersecurity Capacity Building: Conundrum And Opportunity.” Journal of Cyber Security 2(1): 123-144 (March 2017). doi.10.1080/23738871.2017.1294610
履修上の注意
This course offers students political, economic, and technology perspectives to examine cybersecurity from the standpoint of national governments, international laws and/or politics, and private sector. Interdisciplinary nature of cybersecurity, this course also welcomes students from outside the Graduate School of Public Policy, particularly students from law, computer science, information management, or sociology. Students will encounter some basic technical terms and principles regarding the nature of the internet, cyberspace, vulnerabilities, exploits, incidence response, etc. This is not a technical course, and computer skills or special knowledge are not required.