2017/01/30 |
Back |
開講学期 /Semester |
2016年度/Academic Year 前期 /First Semester |
---|---|
対象学年 /Course for; |
1st year |
単位数 /Credits |
4.0 |
責任者 /Coordinator |
Akira Fujitsu |
担当教員名 /Instructor |
Takafumi Hayashi , Tongjun Huang , Akira Fujitsu , Hirohide Demura , Yuichi Okuyama , Akihito Nakamura |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/01/20 |
---|---|
授業の概要 /Course outline |
Using a computer and network have become a standard component of work within both laboratories and offices. In this course, students learn the basic skills of computers, including typing, composing documents, e-mail, file administration, and other convenient tools. Students are also exposed to effective ways in which to use the Internet. University experience is the cornerstone of preparation for entering into professional communities such as academic societies and research groups. Computer literacy provides students with the requisite skills and etiquette not only for university life, but for their future research and professional activities. |
授業の目的と到達目標 /Objectives and attainment goals |
Upon completion of this course, the student should be able to: Utilize a computer to effectively function in the university (LaTeX and File Management etc.); Know how to use Internet tools such as the web, e-mail, and netnews; Know proper security, law and Internet etiquette. |
授業スケジュール /Class schedule |
Lecture: 1. What is "Computer/Network Literacy" ?, Directory and Access Controle 2. UNIX, Mail and News 3. Network, WiFi 4. Kanji, Character Encode, Regular Expression 5. Files, How to get information (Man, Info, WWW) 6. Network Etiquette and Moral 7. LaTeX(1: Equation,Tabular,Citation,Itemize) 8. LaTeX(2: Figure), Drawing Tools 9. LaTeX(3: Logical Structure), Slide 10. Copyrights and Law 11. Information Management (File Types, Compress, Backup Method, Browser Setting) 12. Shell Environment (.login, .cshrc) 13. Shell Functions (history, alias, quarting, foreach) 14. Shell programming (Script) 15. Summary(3: Final) Exercise: 1. User account and login, Keyboard, Typing(1: Fundamental) 2. Password, X Window System(1), Emacs, Kanji 3. UNIX(1: Commands), Emacs(2: Point, Mark, Region, Buffer), News 4. UNIX(2: Directory, Filtering, Re-direction), X Window System(2) 5. How to Print, E-mail, Typing(4: LaTeX examples) 6. UNIX(3: Commands, Permissions, File system) 7. Convenient Tools(1: Grep and Sed) 8. Examination(1: UNIX), How to get information (Man, Info, WWW) 9. Network Etiquette and Laws(Case study) 10. Convenient Tools(2: Awk) 11. LaTeX(1: Sample, Preview, Fonts, Size, Equation) 12. LaTeX(2: Fonts, Size, Equation, Citation, Figure) 13. Drawing Tools(tgif) 14. LaTeX(3: Tabular, Macro) 15. LaTeX(4: Slide) 16. Graphs(Xmgrace, Mathematica), Images(ImageMagick), Making Report 17. Copyrights(Case study), Octave 18. Examination(2: Network Etiquette, Copyrights and Laws) 19. File Compress, Web Browser Setting, FP(1) 20. File Convert, Backup Method, R 21. Shell Environment, X Window System Environment, FTP(2) 22. Network Resources, Process Management, Internet 23. Shell Commands, Shell Programming 24. Trouble Shooting, How to Report Troubles, Maxima 25. Shell Programming(2), OpenOffice(1) 26. Make, Spell Check, OpenOffice(2) 27. Security 28. E-mail, Calculator, Convenient Tools |
教科書 /Textbook(s) |
The textbook will be distributed in class. It can be read using the computers in the exercise rooms. |
成績評価の方法・基準 /Grading method/criteria |
Reports and examination. Late submission of assignments will be subject to deduction of points. Absence of examinations and less attendance of lectures and exercises will be reasons for fail. |
履修上の留意点 /Note for course registration |
None Formal prerequisites:None |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
http://web-int.u-aizu.ac.jp/course/lit1/ |
Back |
開講学期 /Semester |
2016年度/Academic Year 後期 /Second Semester |
---|---|
対象学年 /Course for; |
1st year |
単位数 /Credits |
3.0 |
責任者 /Coordinator |
Akira Fujitsu |
担当教員名 /Instructor |
Tongjun Huang , Noriaki Asada , Akira Fujitsu , Yuichi Okuyama , Chikatoshi Honda , Peng Li , Akihito Nakamura |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/09/08 |
---|---|
授業の概要 /Course outline |
In this course, students learn several kinds of tools and softwares, and they have more experiences with computer usages. In particular, they learn tools to create, search, administrate informations. Finally, they will construct information system with the tools. |
授業の目的と到達目標 /Objectives and attainment goals |
Upon completion of this course, the student should: Be able to use tools to create, search and administrate database; Be able to create HTML doument; Be able to do mathematics using tool such as Mathematica; Be able to know network staus using tools; Know security in Internet; Be able to use some popular script languages. |
授業スケジュール /Class schedule |
1. HTML 2. Script Languages (perl, java-script) 3. Network 4. Security 5. Database 6. Mathematica |
教科書 /Textbook(s) |
This will be announced in class. |
成績評価の方法・基準 /Grading method/criteria |
HTML Report 2/14, Exam. 0 Network Report 1/14, Exam. 1/14 Security Report 1/28, Exam. 1/28 Perl/Java Script Report 3/14, Exam. 0 Database Report 3/28, Exam. 3/28 Mathematica Report 3/14, Exam. 0 Late submission of assignments will be subject to deduction of points. Absence of examinations and less attendance of lectures and exercises will be reasons for fail. |
履修上の留意点 /Note for course registration |
None Formal prerequisites:None |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
http://web-int.u-aizu.ac.jp/course/lit2/ |
Back |
開講学期 /Semester |
2016年度/Academic Year 1学期 /First Quarter |
---|---|
対象学年 /Course for; |
1st year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Ryuichi Oka |
担当教員名 /Instructor |
Ryuichi Oka , Toshiaki Miyazaki |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/01/26 |
---|---|
授業の概要 /Course outline |
この講義では、主に新入生に対して、コンピュータについて、さまざまな分野の専門家によるさまざまな観点からの話を提供し、コンピュータ理工学の学問分野の内容と、コンピュータ理工学を学ぶ意義を理解し、コンピュータがあまねく社会に使われている時代に、社会がコンピュータに何を期待しているか、コンピュータがもたらす社会へのリスク等、コンピュータ理工学に期待されていることを多方面から学び、今後の進路設計に役立たせる。他の多くの科目と異なり、本講義ではさまざまな分野の専門家に講義をしていただく。具体的には、学長や学部長、各フィールド・トラックの責任教授の他に、外部の専門家の話を伺う機会も設ける。 |
授業の目的と到達目標 /Objectives and attainment goals |
コンピュータ理工学の多くの分野の専門家の話を聴講することにより,学生自身の進路決定のための指針とする。具体的な進路としては,どの フィールド、トラックを選択するか、研究テーマと所属研究室の決定,卒業研究の方向,進学,就職時の分野決定等の参考となるような内容を提供 する。さらに,学習中あるいは今後学習予定の各授業の位置付けを理解し,学習の目的の把握,学習意欲の向上を図る。 |
授業スケジュール /Class schedule |
具体的な日程等については、 講義予定者の日程を調整して決まり次第発表する。 1 理工学のすすめ(学長) コンピュータ理工学の学問分野の内容と、コンピュータ理工学を学ぶ意義を理解する。 2〜6 学部履修ガイド(学部長、各フィールド、トラックの代表教員) 履修ガイドの全体概要、ならびに、5フィールド・9トラックの内容を理解する。 7 大学院紹介(専攻長、在学大学院生、大学院卒業生) 大学院の概要、ならびに、教育プログラムの内容を理解する。 8〜15 産業界の最新状況 産業界から招いた講師の講演を通して、コンピュータ理工学が社会の中でどう活用されているかの最新状況を学ぶ。 |
教科書 /Textbook(s) |
なし。毎回資料を配布する。 |
成績評価の方法・基準 /Grading method/criteria |
出席点60%、レポート40% |
履修上の留意点 /Note for course registration |
なし Formal prerequisites:なし |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
【履修上の留意点】 外部講師を呼ぶ場合が多いので、居眠り、私語等の受講態度については十分注意すること。 |
Back |
開講学期 /Semester |
2016年度/Academic Year 3学期 /Third Quarter |
---|---|
対象学年 /Course for; |
1st year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Kohei Otsuyama |
担当教員名 /Instructor |
Kohei Otsuyama , Keitaro Naruse , Shigeru Kanemoto |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/02/02 |
---|---|
授業の概要 /Course outline |
By the end of the semester, you will be able to obtain -Basic knowledge of computer basics (expression of numbers, Boolean algebra, logic circuits, etc.), software and hardware. -Overview of CPU(Central Processing Unit) architecture and its instruction behavior. |
授業の目的と到達目標 /Objectives and attainment goals |
By the end of the semester, you will be able to: Understand the binary notation - Binary, decimal, and hexadecimal number expression (integer, floating point) and conversion between each other. - Arithmetic calculation (addition, subtraction, multiplication) Understand the logical expression and the formulas - Formula can be proved by the transformation of logical expressions and truth table. - Logic circuits can be created based on logical expressions. Understand computer instructions and assembly language - Make a small program by assembly language. Understand the basic operation of the RISC processor. - MIPS processor instruction flow can be explained |
授業スケジュール /Class schedule |
Week 1: Overview / number (1) - Computer Systems - Concepts and Configuration - Brief History of computer - Number (binary / decimal / hexadecimal) expression - Radix Conversion Week 2: The number (2) - Addition of binary number - Complement representation of negative numbers - Binary Subtraction Week 3: Floating Point - Binary representation of floating-point number (single, double) - Floating-point arithmetic calculation Week 4: Computer Instruction (1) - Computer's language = instruction - Instruction format - Operand (data required by instruction): registers, memory - Load and store instructions - Addition and subtraction Week 5: Computer Instruction (2) - Addressing Modes - Branch instructions - Sample assembly program - SPIM Simulator Basics Week 6: Computer Instruction (3) / logic operation - Saving and restoring register - Stack - Assembler - Sample assembly program - Logical operation - Boolean algebra - Logic Gates - Synthesizing logic circuits from logical expressions Week 7: Logical operations - Logic - Convert a logical expression from the truth table - Multiplexer - Arithmetic and Logical Unit (ALU) - Adder Week 8: Multiplier shift - Arithmetic shift and logical shift - Multiplier(version1 and 2) Week 9: The behavior of the processor (1) - CPU(Central Processing Unit) as a center of the computer system. - Data path and control path - PC / register / ALU / Memory - The flow of instruction execution (ADD / ORI) - Control signal Week 10: The behavior of the processor (2) - The flow of instruction execution (LW / SW / BEQ) Week11: The behavior of the processor (3) - Processor - Summary and Review - Implementation of control signal by logic circuits - Multiple clock cycles architecture and single clock cycle architecture - Pipeline architecture Week12: Performance - Why do we need performance ? - Definition of Performance - Various performance measures (execution time / response time / throughput) - Clock - CPI (Clock Per Instruction) - MIPS(Million Instructions Per Second) Week13: review/overview In addition to the above lecture classes, 2 exercise classes below are held. Exercise 1: - Create and execute basic assemble programs. Exercise 2: - Arithmetic, logical (and shift) Experience. - Create and execute basic assemble programs. |
教科書 /Textbook(s) |
- Computer Arcitecture Nakajou,Osima Suuri-kogaku sha ISBN978-4-86481-014-2 - Original handout (sold in the university shop, predetermined price is 1250yen) |
成績評価の方法・基準 /Grading method/criteria |
Evaluated by the following three items. - In class quiz 30% - exercise reports 20% - Final examination 50% The quiz also serves as confirmation of attendance. Student whose attendance rate is under 66% cannot take final examination. [Registration Considerations] Students must observe the following things closely. - You have to attend classes without being late. - Student whose attendance rate is under 66% cannot take final examination. - According to school regulations, student who cheat on quizzes, exams and exercises shall be punished. |
履修上の留意点 /Note for course registration |
You should have the knowledge of address and pointer of the C programming language. Formal prerequisites:None |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
- Off Campus URL => http://www.u-aizu.ac.jp/course/csI/ - From the WS inside the university => file:///home/course/csI/public_html/2016/welcome.html |
Back |
開講学期 /Semester |
2016年度/Academic Year 前期 /First Semester |
---|---|
対象学年 /Course for; |
2nd year |
単位数 /Credits |
3.0 |
責任者 /Coordinator |
Hirohide Demura |
担当教員名 /Instructor |
Hirohide Demura , Tsuneo Tsukahara , Junji Kitamichi , Chikatoshi Honda , Kenta Ofuji , Xin Zhu , Yu Nakajima |
推奨トラック /Recommended track |
CF,SD,VD,VH,RC,BM |
履修規程上の先修条件 /Prerequisites |
NS1 or NS2 |
更新日/Last updated on | 2016/02/01 |
---|---|
授業の概要 /Course outline |
実際の電気現象に触れる本学で最初の機会であり、学生によってはこれが最後の実験となる。 抵抗計測、ハイパス・ローパスフィルタおよび共振回路を例にとって、電気回路の基礎と計測機器の取扱方法を学ぶ。 最後に、コンピュータ論理演算の基礎となるデジタル信号がアナログ回路からどのように生み出されるかを体験する。 |
授業の目的と到達目標 /Objectives and attainment goals |
本科目を履修して身に付けることは次の通りである。 (知識) ・次元解析、計測値の統計的取扱、誤差伝搬、グラフの描き方等を学んで、データの定量的評価・解析が行えるようになる。 ・受動素子と交流の取扱、回路方程式(オームの法則、キルヒホフの法則、重ねあわせの理)。 ・ハイパス・ローパスフィルタ、共振回路を理解し、ラジオなどの仕組みが分かる。 (態度・習慣) ・準備や実験中の作業分担およびレポートの執筆を通じて、段取りの仕方、計画的かつ効率的な行動、きちんとした記録の大切さを学ぶ。 ・盲目的な追試ではなく、実験結果を合理的に解釈できるだけの科学的素養と態度を身につける。 (技能) ・実験ノートおよび技術レポートが書けるようになる。 ・直流・交流の基礎的な回路方程式が解けるようになる。 ・電気回路に関わる基礎的な実験器具・測定器が扱えるようになる。 |
授業スケジュール /Class schedule |
第1単元 直流回路の座学と実験 第01週 他科目との関係、成績評価方法、SI単位系、次元解析、誤差伝搬、基本統計量 第02週 受動回路素子3種の導入、ブレッドボード・テスターの使い方、オームの法則、直並列接続 第03週 誤差の統計的取扱方法、グラフの描き方、対数グラフの導入、キルヒホッフの法則、重ねあわせの理 第04週 実験とは何か、実験ノートの書き方、レポートの書き方、抵抗測定の実験 第2単元 交流回路の座学と実験 第05週 複素数、交流の表現方法、 第06週 複素インピーダンスの導入、オシロスコープ・ファンクションジェネレータの導入 第07週 抵抗分圧測定、素子特性の観察と計測 第3単元 RC回路周波数特性測定(フィルタ) 第08週 RC回路の導入、ハイパス・ローパスフィルタについて、ボード線図、 第09週 周波数特性の測定 第10週 過渡応答特性の測定 第4単元 LCR回路特性測定(共振) 第11週 LCR回路の導入、直列共振・並列共振について、リアクタンス線図、寄生抵抗 第12週 直列共振回路の測定 第13週 並列共振回路の測定 第5単元 総合演習 第14週 ラジオ(変調と検波の原理、並列共振;同調回路)、 Inverterを用いたFlipFlop(メモリの原理)とクロック動作(発振回路)の実験 第15週 総合課題演習 |
教科書 /Textbook(s) |
エッセンシャル電気回路 - 工学のための基礎演習 森北出版 ISBN-10: 4627735618 ISBN-13: 978-4627735613 |
成績評価の方法・基準 /Grading method/criteria |
各単元レポート、クイズ、期末試験それぞれ40%、10%、50%で合算する。 実験は座席指定の2人1組で行い、1人ずつが単元ごとに実験レポートを提出する。オプション実験等でボーナス加算もある。レポートの期限を守れなかったものは減点される。時間外追加実験は、教員の許可のもとで行える。 期末試験欠席、2単元以上のレポート未提出、履修規定にあるの出席数以上に欠けた場合は、単位を与えられない。但し、欠席届が出されたうえで相応の理由と認められた場合は、授業実施時間の分母から該当週数を減じる。すなわち、履修規定で3分の1を超える欠席という規定の分母が15週から該当週だけ差し引かれる。 |
履修上の留意点 /Note for course registration |
先修科目は、NS1力学もしくはNS2電磁気学 関連科目は、NS4半導体デバイス、M7確率統計学、S2電子回路、S3電子回路特論、A5ロボット工学と自動制御、A8ディジタル信号処理論 履修規程上の先修条件:NS1 力学 または NS2 電磁気学 |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
教科書正誤表・ハンドアウト等の資料(学内アクセスのみ) http://web-int.u-aizu.ac.jp/course/cselab/ |
Back |
開講学期 /Semester |
2016年度/Academic Year 4学期 /Fourth Quarter |
---|---|
対象学年 /Course for; |
2nd year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Akihito Nakamura |
担当教員名 /Instructor |
Yodai Watanabe , Akihito Nakamura |
推奨トラック /Recommended track |
CN,SE |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/02/01 |
---|---|
授業の概要 /Course outline |
/Course outline Information Security covers wide variety of fields. To study information secruty is to study computer, network, systems, services, and so forth. This course will provide the basics of information security, various approaches, methods, and theory of information security and information management. Information security is essential to ensure the availability, integrity, and confidentiality of the computer services, computing systems, and networks. This course provides the introduction to the information security. In each lectuire, the followings will be discussed: ・Foundational Concepts in Security ・Human Factors and Security ・Principles of Secure Design and Security Planning ・Threats and Attacks ・Network Security, Web Security, XML Security, and SOA Security ・Security Policy and Governance ・Internet Standadrs ・Security Management ・Enterprise Archiecture and Enterprise Security Plannnig |
授業の目的と到達目標 /Objectives and attainment goals |
/Objectives and attainment goals The objectives of this course is to provide the scheme to research and deveop things related information security. Important objectives of this course are thinking of the future computer, study of the next generation information infrastructure, new pardigm of infroamtion security. The followings will be provided in the course: • tradeoffs of balancing key security properties (Confidentiality, Integrity, Availability). • concepts of risk, threats, vulnerabilities and attack vectors (including the fact that there is no such thing as perfect security). • concept of trust and trustworthiness. • ethical issues to consider in computer security, including ethical issues associated with fixing or not fixing vulnerabilities and disclosing or not disclosing vulnerabilities. • principle of least privilege and isolation as applied to system design. • fail-safe and deny-by-default. • secrecy of design for security and open design ・ end-to-end data security. • multiple layers of defenses. • security as a consideration from the point of initial design and throughout the lifecycle of a product. • costs and tradeoffs related with security • input validation and data sanitization in the face of adversarial control of the input channel. • type-safe language • common input validation errors, and write correct input validation code. ・ Human Error and System Accsident • identification and graceful handling of error conditions. ・ concept of mediation and the principle of complete mediation. • standard components for security operations, instead of re-inventing fundamentals operations. • concept of trusted computing including trusted computing base and attack surface and the principle of minimizing trusted computing base. • Discuss the importance of usability in security mechanism design. •security issues at the boundaries between multiple components. • prevention mechanisms and detection/deterrence mechanisms. • risks with misusing interfaces with third-party code and correct use third-party code. • update software to fix security vulnerabilities and the lifecycle management of the fix. • direct and indirect information flows. ・limitations of malware countermeasures (eg, signature-based detection, behavioral detection). • social engineering attacks and Denial of Service attacks. • Identification and Mitigation of Denial of Service attacks • Risks to privacy and anonymity in commonly used applications. • covert channels and other data leakage procedures. • security properties and limitations of other non-wired networks. |
授業スケジュール /Class schedule |
L1 Summary of The Course -Goal -Information Security Techniques -Informatoon Security Management -Situation at homeland and abroad -Information Security Relates Social Systems L2 Fundamental concepts - Goal of information security - Risk, threat, vulnerability, and control - Confidentiality, integrity, availability and related properties - Attack paradigm and protection paradigm - Mindsets - Defense in dept L3 Cracking - Trends of cracking - Malicious codes and attacks - Controls for cracking L4. Introduction to Modern Cryptography a) Elements of cryptography b) Classical ciphers c) Demonstration of breaking simple substitution cipher d) From classical to modern cryptography L5. Public Key Encryptions a) Introduction to public key encryptions b) RSA encryption L6. Provable Security a) Information-theoretic security and computational security b) Security proof for Vernam cipher c) Security proof for Rabin encryption L7. Secret sharing schemes a) Introduction to secret sharing schemes b) Shamir's construction c) Visual secret sharing schemes L8. Cryptographic Protocols a) Introduction to cryptographic protocols b) Constructions and security proofs L9 Authentication and authorization - Basic authentication method - Access control - Password management and cracking - New authentication methods - Authentication and authorization on the Web L10 Vulnerability management - Classes of vulnerabilities - Trends of vulnerability - Vulnerability management life cycle - Vulnerability assessment data model - Open standards for vulnerability management L11 Risks of Web applications and controls - Best practices - Critical web application security risks - Critical security controls - Assessment tools L12 Legal issues - Information security laws - Cyber security act - Criminal law, the civil law L13 Information Security Management and Enterprise Security -Information Security Management -Information Security Planning -Enterprise Architecture -Enterprise Security Planning L14 Cyber Security -Cyber Attack and Defense -Evacuation -Rescue and Recovery L15 Conclusions |
教科書 /Textbook(s) |
The textbook to be used in this course will be informed |
成績評価の方法・基準 /Grading method/criteria |
Homework assignments 35%, and final exam 65%. |
履修上の留意点 /Note for course registration |
None. Formal prerequisites:None |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
Lecture slides (cryptography) http://web-int.u-aizu.ac.jp/~yodai/course/IS/welcome.html |
Back |
開講学期 /Semester |
2016年度/Academic Year 3学期 /Third Quarter |
---|---|
対象学年 /Course for; |
1st year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Akihito Nakamura |
担当教員名 /Instructor |
Yodai Watanabe , Akihito Nakamura |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/02/01 |
---|---|
授業の概要 /Course outline |
Information Security covers wide variety of fields. To study information secruty is to study computer, network, systems, services, and so forth. This course will provide the basics of information security, various approaches, methods, and theory of information security and information management. Information security is essential to ensure the availability, integrity, and confidentiality of the computer services, computing systems, and networks. This course provides the introduction to the information security. In each lectuire, the followings will be discussed: ・Foundational Concepts in Security ・Human Factors and Security ・Principles of Secure Design and Security Planning ・Threats and Attacks ・Network Security, Web Security, XML Security, and SOA Security ・Security Policy and Governance ・Internet Standadrs ・Security Management ・Enterprise Archiecture and Enterprise Security Plannnig |
授業の目的と到達目標 /Objectives and attainment goals |
/Objectives and attainment goals The objectives of this course is to provide the scheme to research and deveop things related information security. Important objectives of this course are thinking of the future computer, study of the next generation information infrastructure, new pardigm of infroamtion security. The followings will be provided in the course: • tradeoffs of balancing key security properties (Confidentiality, Integrity, Availability). • concepts of risk, threats, vulnerabilities and attack vectors (including the fact that there is no such thing as perfect security). • concept of trust and trustworthiness. • ethical issues to consider in computer security, including ethical issues associated with fixing or not fixing vulnerabilities and disclosing or not disclosing vulnerabilities. • principle of least privilege and isolation as applied to system design. • fail-safe and deny-by-default. • secrecy of design for security and open design ・ end-to-end data security. • multiple layers of defenses. • security as a consideration from the point of initial design and throughout the lifecycle of a product. • costs and tradeoffs related with security • input validation and data sanitization in the face of adversarial control of the input channel. • type-safe language • common input validation errors, and write correct input validation code. ・ Human Error and System Accsident • identification and graceful handling of error conditions. ・ concept of mediation and the principle of complete mediation. • standard components for security operations, instead of re-inventing fundamentals operations. • concept of trusted computing including trusted computing base and attack surface and the principle of minimizing trusted computing base. • Discuss the importance of usability in security mechanism design. •security issues at the boundaries between multiple components. • prevention mechanisms and detection/deterrence mechanisms. • risks with misusing interfaces with third-party code and correct use third-party code. • update software to fix security vulnerabilities and the lifecycle management of the fix. • direct and indirect information flows. ・limitations of malware countermeasures (eg, signature-based detection, behavioral detection). • social engineering attacks and Denial of Service attacks. • Identification and Mitigation of Denial of Service attacks • Risks to privacy and anonymity in commonly used applications. • covert channels and other data leakage procedures. • security properties and limitations of other non-wired networks. |
授業スケジュール /Class schedule |
L1 Summary of The Course -Goal -Information Security Techniques -Informatoon Security Management -Situation at homeland and abroad -Information Security Relates Social Systems L2 Fundamental concepts - Goal of information security - Risk, threat, vulnerability, and control - Confidentiality, integrity, availability and related properties - Attack paradigm and protection paradigm - Mindsets - Defense in dept L3 Cracking - Trends of cracking - Malicious codes and attacks - Controls for cracking L4. Introduction to Modern Cryptography a) Elements of cryptography b) Classical ciphers c) Demonstration of breaking simple substitution cipher d) From classical to modern cryptography L5. Public Key Encryptions a) Introduction to public key encryptions b) RSA encryption L6. Provable Security a) Information-theoretic security and computational security b) Security proof for Vernam cipher c) Security proof for Rabin encryption L7. Secret sharing schemes a) Introduction to secret sharing schemes b) Shamir's construction c) Visual secret sharing schemes L8. Cryptographic Protocols a) Introduction to cryptographic protocols b) Constructions and security proofs L9 Authentication and authorization - Basic authentication method - Access control - Password management and cracking - New authentication methods - Authentication and authorization on the Web L10 Vulnerability management - Classes of vulnerabilities - Trends of vulnerability - Vulnerability management life cycle - Vulnerability assessment data model - Open standards for vulnerability management L11 Risks of Web applications and controls - Best practices - Critical web application security risks - Critical security controls - Assessment tools L12 Legal issues - Information security laws - Cyber security act - Criminal law, the civil law L13 Information Security Management and Enterprise Security -Information Security Management -Information Security Planning -Enterprise Architecture -Enterprise Security Planning L14 Cyber Security -Cyber Attack and Defense -Evacuation -Rescue and Recovery L15 Conclusions |
教科書 /Textbook(s) |
The textbook to be used in this course will be informed in July. |
成績評価の方法・基準 /Grading method/criteria |
Homework assignments 35%, and final exam 65%. |
履修上の留意点 /Note for course registration |
None. Formal prerequisites:None |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
Lecture slides (cryptography) http://web-int.u-aizu.ac.jp/~yodai/course/IS/welcome.html |
Back |
開講学期 /Semester |
2016年度/Academic Year 2学期集中 /2ndQuarter Intensive |
---|---|
対象学年 /Course for; |
4th year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Hayato Karimazawa |
担当教員名 /Instructor |
Shiro Ishibashi , Hayato Karimazawa |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/01/28 |
---|---|
授業の概要 /Course outline |
Goals of this course is to consider,about how to work and how to live, in the information society. |
授業の目的と到達目標 /Objectives and attainment goals |
In the information society, we consider the occupation from a social point and personal point. |
授業スケジュール /Class schedule |
Social perspective (1) Involvement of information technology and information systems of society Social perspective (2) The industrial structure in the information society Social perspective (3)The business activities in the information society Social perspective (4) Occupation in the information society Social perspective (5) Occupation in the information industry Social perspective (6) Ethics of professionals in the information society Social perspective (7) Human resource development in the information society Personal perspective (1) Ways of working in the information society Personal perspective (2) The working environment in the information society Personal perspective (3) And professional life in the information society Personal perspective (4) Way of professionals in the information society Personal perspective (5) And career development in the information society Personal perspective (6) Self-development and the e-Learning in information society Occupation of the challenges in information society (1) Human Resources Development Occupation of challenges in the information society (2) connection of schools and society |
教科書 /Textbook(s) |
It distributed the article |
成績評価の方法・基準 /Grading method/criteria |
Evaluation by report |
履修上の留意点 /Note for course registration |
nothing special |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
nothing special |
Back |
開講学期 /Semester |
2016年度/Academic Year 2学期 /Second Quarter |
---|---|
対象学年 /Course for; |
1st year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Masaya Seino |
担当教員名 /Instructor |
Masaya Seino |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/03/16 |
---|---|
授業の概要 /Course outline |
In this course, lectures and discussions will be conducted through presentation of specific solutions and problem-solving thought processes for problems which have occurred or are expected to occur in the digital network information society from the perspective of computer ethics. In conducting this course, education from a practical perspective and case studies will be emphasized through the introduction of special lectures given by faculty members and professionals who are actually playing active roles in the field of computer ethics. In addition, general knowledge as well as legal knowledge related to information will be incorporated into the course content. Therefore, students of the University of Aizu will be strongly encouraged to take this course as the field of computer ethics is an area indispensable for the information-based society in the future. |
授業の目的と到達目標 /Objectives and attainment goals |
Both technology and security depend on humans. This course is aimed at fostering of students who have a good sense of balance, through education from a practical point of view, including consultations with IT-related companies, engineering companies, security companies, etc. |
授業スケジュール /Class schedule |
1. Characteristics and problems of information society 2. Why is computer ethics being addressed now? What is “computer ethics”? 3. Computer ethics and social norms/rules 4. Academic fields and rules related to information 5. Problems and rules regarding digital networks and content (1) 6. Problems and rules regarding digital networks and content (2) 7. Information technology and ethics (1) 8. Information technology and ethics (2) 9. Computer ethics and security (1) 10. Computer ethics and security (2) 11. Case studies (e.g., Problems related to employees’ personal privacy in relation to information management by companies) 12. Case studies (e.g., Problems related to personal information and privacy in relation to business development by security companies) 13. Computer ethics and self-help (1) 14. Computer ethics and self-help (2) 15. Summary |
教科書 /Textbook(s) |
情報倫理(中央経済社) の改訂版として「情報社会の法・ルールと倫理」(中央経済社)を使用 |
成績評価の方法・基準 /Grading method/criteria |
Student attitudes in class (class attendance, etc.), Final examination etc. |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
Jurisprudence Constitution of Japan |
Back |
開講学期 /Semester |
2016年度/Academic Year 1学期 /First Quarter |
---|---|
対象学年 /Course for; |
4th year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Jiro Iwase |
担当教員名 /Instructor |
Jiro Iwase |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
(L1 or L2) & L4 |
更新日/Last updated on | 2016/01/26 |
---|---|
授業の概要 /Course outline |
Study software development and project management as the base for IT engineer. IT business and technology trend, skill required for IT engineer and career model are introduced. This course provides the hints and tips to the students who want to join IT vendors and IT related business. The course contents are based on the training program attested at leading IT vendor. Note) This course is delivered in Japanese |
授業の目的と到達目標 /Objectives and attainment goals |
Study software development, project management and IT business trend as the base for IT engineer. 1. Study software development process including requirement analysis, design, programming and test. 2. Study fundamental of project management 3. Study IT business and technology trend, skill required, and career model. |
授業スケジュール /Class schedule |
I. IT business today - IT business and technology trend - Role of system engineer and project manager II.System Development Process - Requirement Analysis, Design, Development, Test III.Project Management IV. Career Design |
教科書 /Textbook(s) |
None. Hands out ( soft copy) will be provided. |
成績評価の方法・基準 /Grading method/criteria |
Final Examination (50%), Report ( 40%), Attendance ( 10%) |
履修上の留意点 /Note for course registration |
Programming and software development expertise helps the understanding of this course. Formal prerequisites:L1 Literacy I or L2 Literacy II L4 Intro. Computer Systems |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
「ソフトウェアエンジニアリング講座1,2」(岩瀬、内藤他著 日経BP社) |
Back |
開講学期 /Semester |
2016年度/Academic Year 1学期 /First Quarter |
---|---|
対象学年 /Course for; |
3rd year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Noriaki Asada |
担当教員名 /Instructor |
Noriaki Asada |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
L1 or L2 |
更新日/Last updated on | 2016/02/02 |
---|---|
授業の概要 /Course outline |
Recently, we are said to be in the highly-networked information society or in IT revolution society, and "Multimedia" is no more than a popular word. However, multimedia used before is too poor in content, and the true multimedia can become a representative technology of the new age. The word multimedia is used to be used as a media with only image and sound, while it should be an information transmission form with plural media such as image, sound, smell, taste, feeling and so on. We should consider about the reason of calling “multimedia,” while the function of simultaneous treatment of image and sound has already been achieved with television. The present computer is exchanging information reciprocally in the environment of the Internet and changing to the central equipment to play a role of actualizing multimedia, while it was a mere computer over ten years ago. In this class, multimedia is thought as utilization form of a computer, and physical concept, constitution equipment, information communication and peripheral technology, recognition of present condition and prospect of future performance would be considered. |
授業の目的と到達目標 /Objectives and attainment goals |
Understanding and being applicable about the equipment and the multimedia, basic technology to actualize the multimedia, meaning of existence of the multimedia in Internet environment, application of multimedia technology, prospect of future performance of the multimedia. |
授業スケジュール /Class schedule |
・What is multimedia ・Human perception and multimedia What is light, Human eyes and cameras, Eyesight What is sound, Human ears and microphone, Hearing ・Basic technology of multimedia Sampling theorem and Quantization, Sound, Still image, Moving image, Information compression technology ・Equipment and multimedia Display, Memory, Computer technology ・Simulation and visualization ・Communication technology of multimedia Network, Internet, CATV, Digital TV ・Multimedia system technology Authoring and contents ・Multimedia service ・Problems and prospect of multimedia |
教科書 /Textbook(s) |
Not decided yet. |
成績評価の方法・基準 /Grading method/criteria |
Final exam(50%), exercises and questionnaires in class(50%). |
履修上の留意点 /Note for course registration |
No prerequisite. |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
URL: http://web-int.u-aizu.ac.jp/~asada/class/MMS.html |
Back |
開講学期 /Semester |
2016年度/Academic Year 2学期 /Second Quarter |
---|---|
対象学年 /Course for; |
2nd year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Shigeo Takahashi |
担当教員名 /Instructor |
Shigeo Takahashi |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
L1 or L2 |
更新日/Last updated on | 2016/02/02 |
---|---|
授業の概要 /Course outline |
Recently, we are said to be in the highly-networked information society or in IT revolution society, and "Multimedia" is no more than a popular word. However, multimedia used before is too poor in content, and the true multimedia can become a representative technology of the new age. The word multimedia is used to be used as a media with only image and sound, while it should be an information transmission form with plural media such as image, sound, smell, taste, feeling and so on. We should consider about the reason of calling “multimedia,” while the function of simultaneous treatment of image and sound has already been achieved with television. The present computer is exchanging information reciprocally in the environment of the Internet and changing to the central equipment to play a role of actualizing multimedia, while it was a mere computer over ten years ago. In this class, multimedia is thought as utilization form of a computer, and physical concept, constitution equipment, information communication and peripheral technology, recognition of present condition and prospect of future performance would be considered. |
授業の目的と到達目標 /Objectives and attainment goals |
Understanding and being applicable about the equipment and the multimedia, basic technology to actualize the multimedia, meaning of existence of the multimedia in Internet environment, application of multimedia technology, prospect of future performance of the multimedia. |
授業スケジュール /Class schedule |
- What is multimedia - Human perception and multimedia What is light, Human eyes and cameras, Eyesight What is sound, Human ears and microphone, Hearing - Basic technology of multimedia Sampling theorem and Quantization, Sound, Still image, Moving image, Information compression technology - Equipment and multimedia Display, Memory, Computer technology - Simulation and visualization - Communication technology of multimedia Network, Internet, CATV, Digital TV - Multimedia system technology Authoring and contents - Multimedia service - Problems and prospect of multimedia |
教科書 /Textbook(s) |
Not decided yet. |
成績評価の方法・基準 /Grading method/criteria |
Final exam (50%), exercises and questionnaires in class (50%). |
履修上の留意点 /Note for course registration |
No prerequisites. |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
http://www.u-aizu.ac.jp/~shigeo/course/mms/ (to be available until the course starts) |
Back |
開講学期 /Semester |
2016年度/Academic Year 3学期 /Third Quarter |
---|---|
対象学年 /Course for; |
2nd year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Hirokuni Kurokawa (Aiguo HE) |
担当教員名 /Instructor |
Hirokuni Kurokawa (Aiguo HE) , Anh T. Pham , Lei Jing , Cong-Thang Truong , Shigaku Tei |
推奨トラック /Recommended track |
SD,VD,CN,BM,RC,VH |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/02/04 |
---|---|
授業の概要 /Course outline |
This is the first course on computer networking. |
授業の目的と到達目標 /Objectives and attainment goals |
The course is about the basic concept, fundamental design and operation of computer networks. Students will be able to understand basic principles of network architectures, protocols and data communication. The largest and most typical computer communication network, the Internet, will be the subject of study. This course is NOT about how to use, construct or implement computer networks. It is NOT about commercial aspects of computer network either. |
授業スケジュール /Class schedule |
- Session 1. Introduction to the comm. and networks - Session 2. Application layer - Session 3. Application layer: Socket programming (1) - Session 4. Application layer: Socket programming (2) - Session 5. Transport Layer: Basic concept and UDP - Lecture 6. Transport Layer: Transmission Control Protocol - Session 7. Internetworking - Session 8. Mid-term Examination - Session 9. Internet and TCP/IP Protocol Suite - Session 10. Internet Protocol and Addressing - Session 11. NAT, ICMP and IPv6 - Session 12. Routing algorithms - Session 13. Routing in the Internet - Session 14. Link Layer: Principles, Error detection and correction, multiple-access protocols - Session 15. Ethernet and Network Devices |
教科書 /Textbook(s) |
Required: Computer Networking: A Top-Down Approach Featuring the Internet, 4/E by Kurose, ISBN 0321513258 (or any edition is also OK if you already have one) Other References: -「ネットワークはなぜつながるのか」 戸根 勤 著/日経ネットワーク監修, 日経BP - TCP/IP Tutorial and Technical Overview, IBM Redbooks, by A. Rodriguez, et al, 2001 (free, online book). |
成績評価の方法・基準 /Grading method/criteria |
• Attendance (出席): 10% • Homework (ホームワーク) : 20% • Projects: 20%, in which • Mid-term: 25% • Final (期末試験): 25% |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
course website: http://web-int.u-aizu.ac.jp/~pham/cn1/ |
Back |
開講学期 /Semester |
2016年度/Academic Year 4学期 /Fourth Quarter |
---|---|
対象学年 /Course for; |
1st year |
単位数 /Credits |
2.0 |
責任者 /Coordinator |
Hirokuni Kurokawa (Aiguo HE) |
担当教員名 /Instructor |
Hirokuni Kurokawa (Aiguo HE) , Anh T. Pham , Lei Jing , Cong-Thang Truong , Shigaku Tei |
推奨トラック /Recommended track |
- |
履修規程上の先修条件 /Prerequisites |
- |
更新日/Last updated on | 2016/02/04 |
---|---|
授業の概要 /Course outline |
This is the first course in Communications and Networking engineering. |
授業の目的と到達目標 /Objectives and attainment goals |
The course is about the basic concept, fundamental design and operation of computer networks. Students will be able to understand basic principles of network architectures, protocols and data communication. The largest and most typical computer communication network, the Internet, will be the subject of study. This course is NOT about how to use, construct or implement computer networks. It is NOT about commercial aspects of computer network either. |
授業スケジュール /Class schedule |
- Session 1. Introduction to the comm. and networks - Session 2. Application layer - Session 3. Application layer: Socket programming (1) - Session 4. Application layer: Socket programming (2) - Session 5. Transport Layer: Basic concept and UDP - Lecture 6. Transport Layer: Transmission Control Protocol - Session 7. Internetworking - Session 8. Mid-term Examination - Session 9. Internet and TCP/IP Protocol Suite - Session 10. Internet Protocol and Addressing - Session 11. NAT, ICMP and IPv6 - Session 12. Routing algorithms - Session 13. Routing in the Internet - Session 14. Link Layer: Principles, Error detection and correction, multiple-access protocols - Session 15. Ethernet and Network Devices |
教科書 /Textbook(s) |
Required: Computer Networking: A Top-Down Approach Featuring the Internet, 4/E by Kurose, ISBN 0321513258 (or any edition is also OK if you already have one) Japanese version is also available: 「インターネット技術のすべて」 岡田 晴美 監訳、 ピアソン・エデュケーション。 質問・問題やソケットプログラミングなどの部分に一部教科書と異なる。 Other References : -「ネットワークはなぜつながるのか」 戸根 勤 著/日経ネットワーク監修, 日経BP社 - TCP/IP Tutorial and Technical Overview, IBM Redbooks, by A. Rodriguez, et al, 2001 (free, online book) |
成績評価の方法・基準 /Grading method/criteria |
• Attendance (出席): 10% • Homework (ホームワーク) : 20% • Projects: 20% • Mid-term: 25% • Final (期末試験): 25% |
参考(授業ホームページ、図書など) /Reference (course website, literature, etc.) |
Course website: http://web-int.u-aizu.ac.jp/~pham/cn1/ |