AY 2016 Undergraduate School Course Catalog

Computer Fundamentals

2017/01/30

Back
開講学期
/Semester
2016年度/Academic Year  前期 /First Semester
対象学年
/Course for;
1st year
単位数
/Credits
4.0
責任者
/Coordinator
Akira Fujitsu
担当教員名
/Instructor
Takafumi Hayashi , Tongjun Huang , Akira Fujitsu , Hirohide Demura , Yuichi Okuyama , Akihito Nakamura
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/01/20
授業の概要
/Course outline
Using a computer and network have become a standard
component of work within both laboratories and offices.
In this course, students learn the basic skills
of computers, including typing, composing documents, e-mail,
file administration, and other convenient tools.
Students are also exposed to effective ways in which to
use the Internet. University experience is the cornerstone
of preparation for entering into professional communities such as
academic societies and research groups.
Computer literacy provides students with the requisite skills and
etiquette not only for university life, but for their future research
and professional activities.
授業の目的と到達目標
/Objectives and attainment
goals
Upon completion of this course, the student should be able to:
Utilize a computer to effectively function in the university
(LaTeX and File Management etc.);
Know how to use Internet tools such as the web, e-mail, and netnews;
Know proper security, law and Internet etiquette.
授業スケジュール
/Class schedule
Lecture:
1. What is "Computer/Network Literacy" ?, Directory and Access Controle
2. UNIX, Mail and News
3. Network, WiFi
4. Kanji, Character Encode, Regular Expression
5. Files, How to get information (Man, Info, WWW)
6. Network Etiquette and Moral
7. LaTeX(1: Equation,Tabular,Citation,Itemize)
8. LaTeX(2: Figure), Drawing Tools
9. LaTeX(3: Logical Structure), Slide
10. Copyrights and Law
11. Information Management (File Types, Compress, Backup Method, Browser Setting)
12. Shell Environment (.login, .cshrc)
13. Shell Functions (history, alias, quarting, foreach)
14. Shell programming (Script)
15. Summary(3: Final)

Exercise:
1. User account and login, Keyboard, Typing(1: Fundamental)
2. Password, X Window System(1), Emacs, Kanji
3. UNIX(1: Commands), Emacs(2: Point, Mark, Region, Buffer), News
4. UNIX(2: Directory, Filtering, Re-direction), X Window System(2)
5. How to Print, E-mail, Typing(4: LaTeX examples)
6. UNIX(3: Commands, Permissions, File system)
7. Convenient Tools(1: Grep and Sed)
8. Examination(1: UNIX), How to get information (Man, Info, WWW)
9. Network Etiquette and Laws(Case study)
10. Convenient Tools(2: Awk)
11. LaTeX(1: Sample, Preview, Fonts, Size, Equation)
12. LaTeX(2: Fonts, Size, Equation, Citation, Figure)
13. Drawing Tools(tgif)
14. LaTeX(3: Tabular, Macro)
15. LaTeX(4: Slide)
16. Graphs(Xmgrace, Mathematica), Images(ImageMagick), Making Report
17. Copyrights(Case study), Octave
18. Examination(2: Network Etiquette, Copyrights and Laws)
19. File Compress, Web Browser Setting, FP(1)
20. File Convert, Backup Method, R
21. Shell Environment, X Window System Environment, FTP(2)
22. Network Resources, Process Management, Internet
23. Shell Commands, Shell Programming
24. Trouble Shooting, How to Report Troubles, Maxima
25. Shell Programming(2), OpenOffice(1)
26. Make, Spell Check, OpenOffice(2)
27. Security
28. E-mail, Calculator, Convenient Tools
教科書
/Textbook(s)
The textbook will be distributed in class.
It can be read using the computers in the exercise rooms.
成績評価の方法・基準
/Grading method/criteria
Reports and examination.

Late submission of assignments will be subject to deduction of points.
Absence of examinations and less attendance of lectures and exercises
will be reasons for fail.
履修上の留意点
/Note for course registration
None
Formal prerequisites:None
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)

http://web-int.u-aizu.ac.jp/course/lit1/


Back
開講学期
/Semester
2016年度/Academic Year  後期 /Second Semester
対象学年
/Course for;
1st year
単位数
/Credits
3.0
責任者
/Coordinator
Akira Fujitsu
担当教員名
/Instructor
Tongjun Huang , Noriaki Asada , Akira Fujitsu , Yuichi Okuyama , Chikatoshi Honda , Peng Li , Akihito Nakamura
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/09/08
授業の概要
/Course outline
In this course, students learn several kinds of tools and softwares, and they have more experiences with computer usages.
In particular, they learn tools to create, search, administrate informations.
Finally, they will construct
information system with the tools.
授業の目的と到達目標
/Objectives and attainment
goals
Upon completion of this course, the student should:
Be able to use tools to create, search and administrate database;
Be able to create HTML doument;
Be able to do mathematics using tool such as Mathematica;
Be able to know network staus using tools;
Know security in Internet;
Be able to use some popular script languages.
授業スケジュール
/Class schedule
1. HTML
2. Script Languages (perl, java-script)
3. Network
4. Security
5. Database
6. Mathematica
教科書
/Textbook(s)
This will be announced in class.
成績評価の方法・基準
/Grading method/criteria
HTML  Report 2/14, Exam. 0
Network  Report 1/14, Exam. 1/14
Security  Report 1/28, Exam. 1/28
Perl/Java  Script Report 3/14, Exam. 0
Database  Report 3/28, Exam. 3/28
Mathematica  Report 3/14, Exam. 0


Late submission of assignments will be subject to deduction of points.
Absence of examinations and less attendance of lectures and exercises
will be reasons for fail.
履修上の留意点
/Note for course registration
None
Formal prerequisites:None
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)

http://web-int.u-aizu.ac.jp/course/lit2/


Back
開講学期
/Semester
2016年度/Academic Year  1学期 /First Quarter
対象学年
/Course for;
1st year
単位数
/Credits
2.0
責任者
/Coordinator
Ryuichi Oka
担当教員名
/Instructor
Ryuichi Oka , Toshiaki Miyazaki
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/01/26
授業の概要
/Course outline
この講義では、主に新入生に対して、コンピュータについて、さまざまな分野の専門家によるさまざまな観点からの話を提供し、コンピュータ理工学の学問分野の内容と、コンピュータ理工学を学ぶ意義を理解し、コンピュータがあまねく社会に使われている時代に、社会がコンピュータに何を期待しているか、コンピュータがもたらす社会へのリスク等、コンピュータ理工学に期待されていることを多方面から学び、今後の進路設計に役立たせる。他の多くの科目と異なり、本講義ではさまざまな分野の専門家に講義をしていただく。具体的には、学長や学部長、各フィールド・トラックの責任教授の他に、外部の専門家の話を伺う機会も設ける。
授業の目的と到達目標
/Objectives and attainment
goals
コンピュータ理工学の多くの分野の専門家の話を聴講することにより,学生自身の進路決定のための指針とする。具体的な進路としては,どの フィールド、トラックを選択するか、研究テーマと所属研究室の決定,卒業研究の方向,進学,就職時の分野決定等の参考となるような内容を提供 する。さらに,学習中あるいは今後学習予定の各授業の位置付けを理解し,学習の目的の把握,学習意欲の向上を図る。
授業スケジュール
/Class schedule
具体的な日程等については、 講義予定者の日程を調整して決まり次第発表する。

1 理工学のすすめ(学長)
  コンピュータ理工学の学問分野の内容と、コンピュータ理工学を学ぶ意義を理解する。
2〜6 学部履修ガイド(学部長、各フィールド、トラックの代表教員)
  履修ガイドの全体概要、ならびに、5フィールド・9トラックの内容を理解する。
7 大学院紹介(専攻長、在学大学院生、大学院卒業生)
  大学院の概要、ならびに、教育プログラムの内容を理解する。
8〜15 産業界の最新状況
  産業界から招いた講師の講演を通して、コンピュータ理工学が社会の中でどう活用されているかの最新状況を学ぶ。
教科書
/Textbook(s)
なし。毎回資料を配布する。
成績評価の方法・基準
/Grading method/criteria
出席点60%、レポート40%
履修上の留意点
/Note for course registration
なし
Formal prerequisites:なし
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
【履修上の留意点】
外部講師を呼ぶ場合が多いので、居眠り、私語等の受講態度については十分注意すること。


Back
開講学期
/Semester
2016年度/Academic Year  3学期 /Third Quarter
対象学年
/Course for;
1st year
単位数
/Credits
2.0
責任者
/Coordinator
Kohei Otsuyama
担当教員名
/Instructor
Kohei Otsuyama , Keitaro Naruse , Shigeru Kanemoto
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/02/02
授業の概要
/Course outline
By the end of the semester, you will be able to obtain
-Basic knowledge of computer basics (expression of numbers, Boolean algebra, logic circuits, etc.), software and hardware.
-Overview of CPU(Central Processing Unit) architecture and its instruction behavior.
授業の目的と到達目標
/Objectives and attainment
goals
By the end of the semester, you will be able to:

Understand the binary notation
- Binary, decimal, and hexadecimal number
expression (integer, floating point) and conversion between each other.
- Arithmetic calculation (addition, subtraction, multiplication)

Understand the logical expression and the formulas
- Formula can be proved by the transformation of logical expressions
and truth table.
- Logic circuits can be created based on logical expressions.

Understand computer instructions and assembly language
- Make a small program by assembly language.

Understand the basic operation of the RISC processor.
- MIPS processor instruction flow can be explained
授業スケジュール
/Class schedule
Week 1: Overview / number (1)
- Computer Systems - Concepts and Configuration
- Brief History of computer
- Number (binary / decimal / hexadecimal) expression
- Radix Conversion

Week 2: The number (2)
- Addition of binary number
- Complement representation of negative numbers
- Binary Subtraction

Week 3: Floating Point
- Binary representation of floating-point number (single, double)
- Floating-point arithmetic calculation

Week 4: Computer Instruction (1)
- Computer's language = instruction
- Instruction format
- Operand (data required by instruction): registers, memory
- Load and store instructions
- Addition and subtraction

Week 5: Computer Instruction (2)
- Addressing Modes
- Branch instructions
- Sample assembly program
- SPIM Simulator Basics

Week 6: Computer Instruction (3) / logic operation
- Saving and restoring register
- Stack
- Assembler
- Sample assembly program
- Logical operation
- Boolean algebra
- Logic Gates
- Synthesizing logic circuits from logical expressions

Week 7: Logical operations
- Logic
- Convert a logical expression from the truth table
- Multiplexer
- Arithmetic and Logical Unit (ALU)
- Adder

Week 8: Multiplier shift
- Arithmetic shift and logical shift
- Multiplier(version1 and 2)

Week 9: The behavior of the processor (1)
- CPU(Central Processing Unit) as a center of the computer system.
- Data path and control path
- PC / register / ALU / Memory
- The flow of instruction execution (ADD / ORI)
- Control signal

Week 10: The behavior of the processor (2)
- The flow of instruction execution (LW / SW / BEQ)

Week11: The behavior of the processor (3)
- Processor - Summary and Review
- Implementation of control signal by logic circuits
- Multiple clock cycles architecture and single clock cycle architecture
- Pipeline architecture

Week12: Performance
- Why do we need performance ?
- Definition of Performance
- Various performance measures (execution time / response time / throughput)
- Clock
- CPI (Clock Per Instruction)
- MIPS(Million Instructions Per Second)

Week13: review/overview


In addition to the above lecture classes, 2 exercise classes below are held.
Exercise 1:
- Create and execute basic assemble programs.
Exercise 2:
- Arithmetic, logical (and shift) Experience.
- Create and execute basic assemble programs.
教科書
/Textbook(s)
- Computer Arcitecture Nakajou,Osima Suuri-kogaku sha ISBN978-4-86481-014-2
- Original handout (sold in the university shop, predetermined price is 1250yen)
成績評価の方法・基準
/Grading method/criteria
Evaluated by the following three items.

- In class quiz 30%
- exercise reports 20%
- Final examination 50%

The quiz also serves as confirmation of attendance.
Student whose attendance rate is under 66% cannot take final examination.







[Registration Considerations]

Students must observe the following things closely.
- You have to attend classes without being late.
- Student whose attendance rate is under 66% cannot take final examination.
- According to school regulations, student who cheat on quizzes, exams and
exercises shall be punished.
履修上の留意点
/Note for course registration
You should have the knowledge of address and pointer of the C programming language.
Formal prerequisites:None
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
- Off Campus URL => http://www.u-aizu.ac.jp/course/csI/
- From the WS inside the university => file:///home/course/csI/public_html/2016/welcome.html


Back
開講学期
/Semester
2016年度/Academic Year  前期 /First Semester
対象学年
/Course for;
2nd year
単位数
/Credits
3.0
責任者
/Coordinator
Hirohide Demura
担当教員名
/Instructor
Hirohide Demura , Tsuneo Tsukahara , Junji Kitamichi , Chikatoshi Honda , Kenta Ofuji , Xin Zhu , Yu Nakajima
推奨トラック
/Recommended track
CF,SD,VD,VH,RC,BM
履修規程上の先修条件
/Prerequisites
NS1 or NS2

更新日/Last updated on 2016/02/01
授業の概要
/Course outline
実際の電気現象に触れる本学で最初の機会であり、学生によってはこれが最後の実験となる。
抵抗計測、ハイパス・ローパスフィルタおよび共振回路を例にとって、電気回路の基礎と計測機器の取扱方法を学ぶ。
最後に、コンピュータ論理演算の基礎となるデジタル信号がアナログ回路からどのように生み出されるかを体験する。
授業の目的と到達目標
/Objectives and attainment
goals
本科目を履修して身に付けることは次の通りである。
(知識)
・次元解析、計測値の統計的取扱、誤差伝搬、グラフの描き方等を学んで、データの定量的評価・解析が行えるようになる。
・受動素子と交流の取扱、回路方程式(オームの法則、キルヒホフの法則、重ねあわせの理)。
・ハイパス・ローパスフィルタ、共振回路を理解し、ラジオなどの仕組みが分かる。
(態度・習慣)
・準備や実験中の作業分担およびレポートの執筆を通じて、段取りの仕方、計画的かつ効率的な行動、きちんとした記録の大切さを学ぶ。
・盲目的な追試ではなく、実験結果を合理的に解釈できるだけの科学的素養と態度を身につける。
(技能)
・実験ノートおよび技術レポートが書けるようになる。
・直流・交流の基礎的な回路方程式が解けるようになる。
・電気回路に関わる基礎的な実験器具・測定器が扱えるようになる。
授業スケジュール
/Class schedule
第1単元 直流回路の座学と実験
 第01週 他科目との関係、成績評価方法、SI単位系、次元解析、誤差伝搬、基本統計量
 第02週 受動回路素子3種の導入、ブレッドボード・テスターの使い方、オームの法則、直並列接続
 第03週 誤差の統計的取扱方法、グラフの描き方、対数グラフの導入、キルヒホッフの法則、重ねあわせの理
 第04週 実験とは何か、実験ノートの書き方、レポートの書き方、抵抗測定の実験
第2単元 交流回路の座学と実験
 第05週 複素数、交流の表現方法、
 第06週 複素インピーダンスの導入、オシロスコープ・ファンクションジェネレータの導入
 第07週 抵抗分圧測定、素子特性の観察と計測
第3単元 RC回路周波数特性測定(フィルタ)
 第08週 RC回路の導入、ハイパス・ローパスフィルタについて、ボード線図、 
 第09週 周波数特性の測定
 第10週 過渡応答特性の測定
第4単元 LCR回路特性測定(共振)
 第11週 LCR回路の導入、直列共振・並列共振について、リアクタンス線図、寄生抵抗
 第12週 直列共振回路の測定
 第13週 並列共振回路の測定
第5単元 総合演習
 第14週 ラジオ(変調と検波の原理、並列共振;同調回路)、
      Inverterを用いたFlipFlop(メモリの原理)とクロック動作(発振回路)の実験
 第15週 総合課題演習
教科書
/Textbook(s)
エッセンシャル電気回路 - 工学のための基礎演習
 森北出版
 ISBN-10: 4627735618
 ISBN-13: 978-4627735613
成績評価の方法・基準
/Grading method/criteria
各単元レポート、クイズ、期末試験それぞれ40%、10%、50%で合算する。

実験は座席指定の2人1組で行い、1人ずつが単元ごとに実験レポートを提出する。オプション実験等でボーナス加算もある。レポートの期限を守れなかったものは減点される。時間外追加実験は、教員の許可のもとで行える。

期末試験欠席、2単元以上のレポート未提出、履修規定にあるの出席数以上に欠けた場合は、単位を与えられない。但し、欠席届が出されたうえで相応の理由と認められた場合は、授業実施時間の分母から該当週数を減じる。すなわち、履修規定で3分の1を超える欠席という規定の分母が15週から該当週だけ差し引かれる。
履修上の留意点
/Note for course registration
先修科目は、NS1力学もしくはNS2電磁気学

関連科目は、NS4半導体デバイス、M7確率統計学、S2電子回路、S3電子回路特論、A5ロボット工学と自動制御、A8ディジタル信号処理論

履修規程上の先修条件:NS1 力学 または NS2 電磁気学
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
教科書正誤表・ハンドアウト等の資料(学内アクセスのみ)
 http://web-int.u-aizu.ac.jp/course/cselab/ 


Back
開講学期
/Semester
2016年度/Academic Year  4学期 /Fourth Quarter
対象学年
/Course for;
2nd year
単位数
/Credits
2.0
責任者
/Coordinator
Akihito Nakamura
担当教員名
/Instructor
Yodai Watanabe , Akihito Nakamura
推奨トラック
/Recommended track
CN,SE
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/02/01
授業の概要
/Course outline
/Course outline Information Security covers wide variety of fields. To study information secruty is to study computer, network, systems, services, and so forth.
This course will provide the basics of information security, various approaches, methods, and theory of information security and information management.
Information security is essential to ensure the availability, integrity, and confidentiality of the computer services, computing systems, and networks.
This course provides the introduction to the information security.

In each lectuire, the followings will be discussed:
・Foundational Concepts in Security
・Human Factors and Security
・Principles of Secure Design and Security Planning
・Threats and Attacks
・Network Security, Web Security, XML Security, and SOA Security
・Security Policy and Governance
・Internet Standadrs
・Security Management
・Enterprise Archiecture and Enterprise Security Plannnig
授業の目的と到達目標
/Objectives and attainment
goals
/Objectives and attainment
goals The objectives of this course is to provide the scheme to research and deveop things related information security. Important  objectives of this course are thinking of the future computer, study of the next generation information infrastructure, new pardigm of infroamtion security.

The followings will be provided in the course:
• tradeoffs of balancing key security properties (Confidentiality, Integrity, Availability).
• concepts of risk, threats, vulnerabilities and attack vectors (including the fact that there is no such thing as perfect security).
• concept of trust and trustworthiness.
• ethical issues to consider in computer security, including ethical issues associated with fixing or not fixing vulnerabilities and disclosing or not disclosing vulnerabilities.
• principle of least privilege and isolation as applied to system design.
• fail-safe and deny-by-default.
• secrecy of design for security and open design
・ end-to-end data security.
• multiple layers of defenses.
• security as a consideration from the point of initial design and throughout the lifecycle of a product.
• costs and tradeoffs related with security
• input validation and data sanitization  in the face of adversarial control of the input channel.
• type-safe language
• common input validation errors, and write correct input validation code.
・ Human Error and System Accsident
• identification and graceful handling of error conditions.
・ concept of mediation and the principle of complete mediation.
• standard components for security operations, instead of re-inventing fundamentals operations.
• concept of trusted computing including trusted computing base and
attack surface and the principle of minimizing trusted computing base.
• Discuss the importance of usability in security mechanism design.
•security issues  at the boundaries between multiple components.
• prevention mechanisms and detection/deterrence mechanisms.
• risks with misusing interfaces with third-party code and correct use third-party code.
• update software to fix security vulnerabilities and the lifecycle management of the fix.
• direct and indirect information flows.
・limitations of malware countermeasures (eg, signature-based
detection, behavioral detection).
• social engineering attacks and Denial of Service attacks.
• Identification and Mitigation of Denial of Service attacks
• Risks to privacy and anonymity in commonly used applications.
• covert channels and other data leakage procedures.
• security properties and limitations of other non-wired networks.
授業スケジュール
/Class schedule
L1 Summary of The Course
-Goal
-Information Security Techniques
-Informatoon Security Management
-Situation at homeland and abroad
-Information Security Relates Social Systems


L2 Fundamental concepts
- Goal of information security
- Risk, threat, vulnerability, and control
- Confidentiality, integrity, availability and related properties
- Attack paradigm and protection paradigm
- Mindsets
- Defense in dept


L3 Cracking
- Trends of cracking
- Malicious codes and attacks
- Controls for cracking

L4. Introduction to Modern Cryptography
a) Elements of cryptography
b) Classical ciphers
c) Demonstration of breaking simple substitution cipher
d) From classical to modern cryptography

L5. Public Key Encryptions
a) Introduction to public key encryptions
b) RSA encryption

L6. Provable Security
a) Information-theoretic security and computational security
b) Security proof for Vernam cipher
c) Security proof for Rabin encryption

L7. Secret sharing schemes
a) Introduction to secret sharing schemes
b) Shamir's construction
c) Visual secret sharing schemes

L8. Cryptographic Protocols
a) Introduction to cryptographic protocols
b) Constructions and security proofs

L9 Authentication and authorization
- Basic authentication method
- Access control
- Password management and cracking
- New authentication methods
- Authentication and authorization on the Web


L10 Vulnerability management
- Classes of vulnerabilities
- Trends of vulnerability
- Vulnerability management life cycle
- Vulnerability assessment data model
- Open standards for vulnerability management


L11 Risks of Web applications and controls
- Best practices
- Critical web application security risks
- Critical security controls
- Assessment tools


L12 Legal issues
- Information security laws
- Cyber security act
- Criminal law, the civil law


L13 Information Security Management and Enterprise Security
-Information Security Management
-Information Security Planning
-Enterprise Architecture
-Enterprise Security Planning

L14 Cyber Security
-Cyber Attack and Defense
-Evacuation
-Rescue and Recovery

L15 Conclusions

教科書
/Textbook(s)
The textbook to be used in this course will be informed
成績評価の方法・基準
/Grading method/criteria
Homework assignments 35%, and final exam 65%.
履修上の留意点
/Note for course registration
None.
Formal prerequisites:None
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
Lecture slides (cryptography)
http://web-int.u-aizu.ac.jp/~yodai/course/IS/welcome.html


Back
開講学期
/Semester
2016年度/Academic Year  3学期 /Third Quarter
対象学年
/Course for;
1st year
単位数
/Credits
2.0
責任者
/Coordinator
Akihito Nakamura
担当教員名
/Instructor
Yodai Watanabe , Akihito Nakamura
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/02/01
授業の概要
/Course outline
Information Security covers wide variety of fields. To study information secruty is to study computer, network, systems, services, and so forth.
This course will provide the basics of information security, various approaches, methods, and theory of information security and information management.
Information security is essential to ensure the availability, integrity, and confidentiality of the computer services, computing systems, and networks.
This course provides the introduction to the information security.

In each lectuire, the followings will be discussed:
・Foundational Concepts in Security
・Human Factors and Security
・Principles of Secure Design and Security Planning
・Threats and Attacks
・Network Security, Web Security, XML Security, and SOA Security
・Security Policy and Governance
・Internet Standadrs
・Security Management
・Enterprise Archiecture and Enterprise Security Plannnig
授業の目的と到達目標
/Objectives and attainment
goals
/Objectives and attainment
goals The objectives of this course is to provide the scheme to research and deveop things related information security. Important  objectives of this course are thinking of the future computer, study of the next generation information infrastructure, new pardigm of infroamtion security.

The followings will be provided in the course:
• tradeoffs of balancing key security properties (Confidentiality, Integrity, Availability).
• concepts of risk, threats, vulnerabilities and attack vectors (including the fact that there is no such thing as perfect security).
• concept of trust and trustworthiness.
• ethical issues to consider in computer security, including ethical issues associated with fixing or not fixing vulnerabilities and disclosing or not disclosing vulnerabilities.
• principle of least privilege and isolation as applied to system design.
• fail-safe and deny-by-default.
• secrecy of design for security and open design
・ end-to-end data security.
• multiple layers of defenses.
• security as a consideration from the point of initial design and throughout the lifecycle of a product.
• costs and tradeoffs related with security
• input validation and data sanitization  in the face of adversarial control of the input channel.
• type-safe language
• common input validation errors, and write correct input validation code.
・ Human Error and System Accsident
• identification and graceful handling of error conditions.
・ concept of mediation and the principle of complete mediation.
• standard components for security operations, instead of re-inventing fundamentals operations.
• concept of trusted computing including trusted computing base and
attack surface and the principle of minimizing trusted computing base.
• Discuss the importance of usability in security mechanism design.
•security issues  at the boundaries between multiple components.
• prevention mechanisms and detection/deterrence mechanisms.
• risks with misusing interfaces with third-party code and correct use third-party code.
• update software to fix security vulnerabilities and the lifecycle management of the fix.
• direct and indirect information flows.
・limitations of malware countermeasures (eg, signature-based
detection, behavioral detection).
• social engineering attacks and Denial of Service attacks.
• Identification and Mitigation of Denial of Service attacks
• Risks to privacy and anonymity in commonly used applications.
• covert channels and other data leakage procedures.
• security properties and limitations of other non-wired networks.
授業スケジュール
/Class schedule
L1 Summary of The Course
-Goal
-Information Security Techniques
-Informatoon Security Management
-Situation at homeland and abroad
-Information Security Relates Social Systems


L2 Fundamental concepts
- Goal of information security
- Risk, threat, vulnerability, and control
- Confidentiality, integrity, availability and related properties
- Attack paradigm and protection paradigm
- Mindsets
- Defense in dept


L3 Cracking
- Trends of cracking
- Malicious codes and attacks
- Controls for cracking

L4. Introduction to Modern Cryptography
a) Elements of cryptography
b) Classical ciphers
c) Demonstration of breaking simple substitution cipher
d) From classical to modern cryptography

L5. Public Key Encryptions
a) Introduction to public key encryptions
b) RSA encryption

L6. Provable Security
a) Information-theoretic security and computational security
b) Security proof for Vernam cipher
c) Security proof for Rabin encryption

L7. Secret sharing schemes
a) Introduction to secret sharing schemes
b) Shamir's construction
c) Visual secret sharing schemes

L8. Cryptographic Protocols
a) Introduction to cryptographic protocols
b) Constructions and security proofs

L9 Authentication and authorization
- Basic authentication method
- Access control
- Password management and cracking
- New authentication methods
- Authentication and authorization on the Web


L10 Vulnerability management
- Classes of vulnerabilities
- Trends of vulnerability
- Vulnerability management life cycle
- Vulnerability assessment data model
- Open standards for vulnerability management


L11 Risks of Web applications and controls
- Best practices
- Critical web application security risks
- Critical security controls
- Assessment tools


L12 Legal issues
- Information security laws
- Cyber security act
- Criminal law, the civil law


L13 Information Security Management and Enterprise Security
-Information Security Management
-Information Security Planning
-Enterprise Architecture
-Enterprise Security Planning

L14 Cyber Security
-Cyber Attack and Defense
-Evacuation
-Rescue and Recovery

L15 Conclusions

教科書
/Textbook(s)
The textbook to be used in this course will be informed in July.
成績評価の方法・基準
/Grading method/criteria
Homework assignments 35%, and final exam 65%.
履修上の留意点
/Note for course registration
None.
Formal prerequisites:None
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
Lecture slides (cryptography)
http://web-int.u-aizu.ac.jp/~yodai/course/IS/welcome.html


Back
開講学期
/Semester
2016年度/Academic Year  2学期集中 /2ndQuarter Intensive
対象学年
/Course for;
4th year
単位数
/Credits
2.0
責任者
/Coordinator
Hayato Karimazawa
担当教員名
/Instructor
Shiro Ishibashi , Hayato Karimazawa
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/01/28
授業の概要
/Course outline
Goals of this course is to consider,about how to work and how to live,  in the information society.
授業の目的と到達目標
/Objectives and attainment
goals
In the information society, we consider the occupation from a social point and personal point.
授業スケジュール
/Class schedule
Social perspective (1) Involvement of information technology and information systems of society
Social perspective (2) The industrial structure in the information society
Social perspective (3)The business activities in the information society
Social perspective (4) Occupation in the information society
Social perspective (5) Occupation in the information industry
Social perspective (6) Ethics of professionals in the information society
Social perspective (7) Human resource development in the information society
Personal perspective (1) Ways of working in the information society
Personal perspective (2)  The working environment in the information society
Personal perspective (3) And professional life in the information society
Personal perspective (4) Way of professionals in the information society
Personal perspective (5) And career development in the information society
Personal perspective (6) Self-development and the e-Learning in information society
Occupation of the challenges in information society (1) Human Resources Development
Occupation of challenges in the information society (2) connection of schools and society
教科書
/Textbook(s)
It distributed the article
成績評価の方法・基準
/Grading method/criteria
Evaluation by report
履修上の留意点
/Note for course registration
nothing special
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
nothing special


Back
開講学期
/Semester
2016年度/Academic Year  2学期 /Second Quarter
対象学年
/Course for;
1st year
単位数
/Credits
2.0
責任者
/Coordinator
Masaya Seino
担当教員名
/Instructor
Masaya Seino
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/03/16
授業の概要
/Course outline
In this course, lectures and discussions will be conducted through presentation of specific solutions and problem-solving thought processes for problems which have occurred or are expected to occur in the digital network information society from the perspective of computer ethics. In conducting this course, education from a practical perspective and case studies will be emphasized through the introduction of special lectures given by faculty members and professionals who are actually playing active roles in the field of computer ethics. In addition, general knowledge as well as legal knowledge related to information will be incorporated into the course content. Therefore, students of the University of Aizu will be strongly encouraged to take this course as the field of computer ethics is an area indispensable for the information-based society in the future.
授業の目的と到達目標
/Objectives and attainment
goals
Both technology and security depend on humans.
This course is aimed at fostering of students who have a good sense of balance, through education from a practical point of view, including consultations with IT-related companies, engineering companies, security companies, etc.
授業スケジュール
/Class schedule
1. Characteristics and problems of information society
2. Why is computer ethics being addressed now? What is “computer ethics”?
3. Computer ethics and social norms/rules
4. Academic fields and rules related to information
5. Problems and rules regarding digital networks and content (1)
6. Problems and rules regarding digital networks and content (2)
7. Information technology and ethics (1)
8. Information technology and ethics (2)
9. Computer ethics and security (1)
10. Computer ethics and security (2)
11. Case studies (e.g., Problems related to employees’ personal privacy in relation to information management by companies)
12. Case studies (e.g., Problems related to personal information and privacy in relation to business development by security companies)
13. Computer ethics and self-help (1)
14. Computer ethics and self-help (2)
15. Summary
教科書
/Textbook(s)
情報倫理(中央経済社) の改訂版として「情報社会の法・ルールと倫理」(中央経済社)を使用
成績評価の方法・基準
/Grading method/criteria
Student attitudes in class (class attendance, etc.), Final examination
etc.
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
Jurisprudence
Constitution of Japan


Back
開講学期
/Semester
2016年度/Academic Year  1学期 /First Quarter
対象学年
/Course for;
4th year
単位数
/Credits
2.0
責任者
/Coordinator
Jiro Iwase
担当教員名
/Instructor
Jiro Iwase
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites
(L1 or L2) & L4

更新日/Last updated on 2016/01/26
授業の概要
/Course outline
Study software development and project management as the base for IT engineer. IT business and technology trend, skill required for IT engineer and career model are introduced. This course provides the hints and tips to the students who want to join IT vendors and IT related business. The course contents are based on the training program attested at leading IT vendor.
Note) This course is delivered in Japanese
授業の目的と到達目標
/Objectives and attainment
goals
Study software development, project management and IT business trend as the base for IT engineer.
1. Study software development process including requirement analysis, design, programming and test.
2. Study fundamental of project management
3. Study IT business and technology trend, skill required, and career model.
授業スケジュール
/Class schedule
I. IT business today
- IT business and technology trend
- Role of system engineer and project manager
II.System Development Process
- Requirement Analysis, Design, Development, Test
III.Project Management
IV. Career Design

教科書
/Textbook(s)
None. Hands out ( soft copy) will be provided.
成績評価の方法・基準
/Grading method/criteria
Final Examination (50%), Report ( 40%), Attendance ( 10%)
履修上の留意点
/Note for course registration
Programming and software development expertise helps the understanding of this course.

Formal prerequisites:L1 Literacy I or L2 Literacy II
L4 Intro. Computer Systems
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
「ソフトウェアエンジニアリング講座1,2」(岩瀬、内藤他著 日経BP社) 



Back
開講学期
/Semester
2016年度/Academic Year  1学期 /First Quarter
対象学年
/Course for;
3rd year
単位数
/Credits
2.0
責任者
/Coordinator
Noriaki Asada
担当教員名
/Instructor
Noriaki Asada
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites
L1 or L2

更新日/Last updated on 2016/02/02
授業の概要
/Course outline
Recently, we are said to be in the highly-networked information society or in IT revolution society, and "Multimedia" is no more than a popular word. However, multimedia used before is too poor in content, and the true multimedia can become a representative technology of the new age.
The word multimedia is used to be used as a media with only image and sound, while it should be an information transmission form with plural media such as image, sound, smell, taste, feeling and so on. We should consider about the reason of calling “multimedia,” while the function of simultaneous treatment of image and sound has already been achieved with television.
The present computer is exchanging information reciprocally in the environment of the Internet and changing to the central equipment to play a role of actualizing multimedia, while it was a mere computer over ten years ago.
In this class, multimedia is thought as utilization form of a computer, and physical concept, constitution equipment, information communication and peripheral technology, recognition of present condition and prospect of future performance would be considered.
授業の目的と到達目標
/Objectives and attainment
goals
Understanding and being applicable about the equipment and the multimedia, basic technology to actualize the multimedia, meaning of existence of the multimedia in Internet environment, application of multimedia technology, prospect of future performance of the multimedia.
授業スケジュール
/Class schedule
・What is multimedia
・Human perception and multimedia
What is light, Human eyes and cameras, Eyesight
What is sound, Human ears and microphone, Hearing
・Basic technology of multimedia
Sampling theorem and Quantization, Sound, Still image, Moving image,
Information compression technology
・Equipment and multimedia
Display, Memory, Computer technology
・Simulation and visualization
・Communication technology of multimedia
Network, Internet, CATV, Digital TV
・Multimedia system technology
Authoring and contents
・Multimedia service
・Problems and prospect of multimedia
教科書
/Textbook(s)
Not decided yet.
成績評価の方法・基準
/Grading method/criteria
Final exam(50%), exercises and questionnaires in class(50%).
履修上の留意点
/Note for course registration
No prerequisite.
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
URL: http://web-int.u-aizu.ac.jp/~asada/class/MMS.html


Back
開講学期
/Semester
2016年度/Academic Year  2学期 /Second Quarter
対象学年
/Course for;
2nd year
単位数
/Credits
2.0
責任者
/Coordinator
Shigeo Takahashi
担当教員名
/Instructor
Shigeo Takahashi
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites
L1 or L2

更新日/Last updated on 2016/02/02
授業の概要
/Course outline
Recently, we are said to be in the highly-networked information society or in IT revolution society, and "Multimedia" is no more than a popular word. However, multimedia used before is too poor in content, and the true multimedia can become a representative technology of the new age.
The word multimedia is used to be used as a media with only image and sound, while it should be an information transmission form with plural media such as image, sound, smell, taste, feeling and so on. We should consider about the reason of calling “multimedia,” while the function of simultaneous treatment of image and sound has already been achieved with television.
The present computer is exchanging information reciprocally in the environment of the Internet and changing to the central equipment to play a role of actualizing multimedia, while it was a mere computer over ten years ago.
In this class, multimedia is thought as utilization form of a computer, and physical concept, constitution equipment, information communication and peripheral technology, recognition of present condition and prospect of future performance would be considered.
授業の目的と到達目標
/Objectives and attainment
goals
Understanding and being applicable about the equipment and the multimedia, basic technology to actualize the multimedia, meaning of existence of the multimedia in Internet environment, application of multimedia technology, prospect of future performance of the multimedia.
授業スケジュール
/Class schedule
- What is multimedia
- Human perception and multimedia
What is light, Human eyes and cameras, Eyesight
What is sound, Human ears and microphone, Hearing
- Basic technology of multimedia
Sampling theorem and Quantization, Sound, Still image, Moving image,
Information compression technology
- Equipment and multimedia
Display, Memory, Computer technology
- Simulation and visualization
- Communication technology of multimedia
Network, Internet, CATV, Digital TV
- Multimedia system technology
Authoring and contents
- Multimedia service
- Problems and prospect of multimedia
教科書
/Textbook(s)
Not decided yet.
成績評価の方法・基準
/Grading method/criteria
Final exam (50%), exercises and questionnaires in class (50%).
履修上の留意点
/Note for course registration
No prerequisites.
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
http://www.u-aizu.ac.jp/~shigeo/course/mms/
(to be available until the course starts)


Back
開講学期
/Semester
2016年度/Academic Year  3学期 /Third Quarter
対象学年
/Course for;
2nd year
単位数
/Credits
2.0
責任者
/Coordinator
Hirokuni Kurokawa (Aiguo HE)
担当教員名
/Instructor
Hirokuni Kurokawa (Aiguo HE) , Anh T. Pham , Lei Jing , Cong-Thang Truong , Shigaku Tei
推奨トラック
/Recommended track
SD,VD,CN,BM,RC,VH
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/02/04
授業の概要
/Course outline
This is the first course on computer networking.
授業の目的と到達目標
/Objectives and attainment
goals
The course is about the basic concept, fundamental design and operation of computer networks. Students will be able to understand basic principles of network architectures, protocols and data communication. The largest and most typical computer communication network, the Internet, will be the subject of study. This course is NOT about how to use, construct or implement computer networks. It is NOT about commercial aspects of computer network either.
授業スケジュール
/Class schedule
- Session 1. Introduction to the comm. and networks
- Session 2. Application layer
- Session 3. Application layer: Socket programming (1)
- Session 4. Application layer: Socket programming (2)
- Session 5. Transport Layer: Basic concept and UDP
- Lecture 6. Transport Layer: Transmission Control Protocol
- Session 7. Internetworking
- Session 8. Mid-term Examination
- Session 9. Internet and TCP/IP Protocol Suite
- Session 10. Internet Protocol and Addressing
- Session 11. NAT, ICMP and IPv6
- Session 12. Routing algorithms
- Session 13. Routing in the Internet
- Session 14. Link Layer: Principles, Error detection and correction, multiple-access protocols
- Session 15. Ethernet and Network Devices
教科書
/Textbook(s)
Required: Computer Networking: A Top-Down Approach Featuring the Internet, 4/E by Kurose, ISBN 0321513258 (or any edition is also OK if you already have one)
Other References:
-「ネットワークはなぜつながるのか」 戸根 勤 著/日経ネットワーク監修, 日経BP
- TCP/IP Tutorial and Technical Overview, IBM Redbooks, by A. Rodriguez, et al, 2001 (free, online book).
成績評価の方法・基準
/Grading method/criteria
• Attendance (出席): 10%
• Homework (ホームワーク) : 20%
• Projects: 20%, in which
• Mid-term: 25%
• Final (期末試験): 25%
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
course website: http://web-int.u-aizu.ac.jp/~pham/cn1/


Back
開講学期
/Semester
2016年度/Academic Year  4学期 /Fourth Quarter
対象学年
/Course for;
1st year
単位数
/Credits
2.0
責任者
/Coordinator
Hirokuni Kurokawa (Aiguo HE)
担当教員名
/Instructor
Hirokuni Kurokawa (Aiguo HE) , Anh T. Pham , Lei Jing , Cong-Thang Truong , Shigaku Tei
推奨トラック
/Recommended track
履修規程上の先修条件
/Prerequisites

更新日/Last updated on 2016/02/04
授業の概要
/Course outline
This is the first course in Communications and Networking engineering.
授業の目的と到達目標
/Objectives and attainment
goals
The course is about the basic concept, fundamental design and operation of computer networks. Students will be able to understand basic principles of network architectures, protocols and data communication. The largest and most typical computer communication network, the Internet, will be the subject of study. This course is NOT about how to use, construct or implement computer networks. It is NOT about commercial aspects of computer network either.
授業スケジュール
/Class schedule
- Session 1. Introduction to the comm. and networks
- Session 2. Application layer
- Session 3. Application layer: Socket programming (1)
- Session 4. Application layer: Socket programming (2)
- Session 5. Transport Layer: Basic concept and UDP
- Lecture 6. Transport Layer: Transmission Control Protocol
- Session 7. Internetworking
- Session 8. Mid-term Examination
- Session 9. Internet and TCP/IP Protocol Suite
- Session 10. Internet Protocol and Addressing
- Session 11. NAT, ICMP and IPv6
- Session 12. Routing algorithms
- Session 13. Routing in the Internet
- Session 14. Link Layer: Principles, Error detection and correction, multiple-access protocols
- Session 15. Ethernet and Network Devices
教科書
/Textbook(s)
Required: Computer Networking: A Top-Down Approach Featuring the Internet, 4/E by Kurose, ISBN 0321513258 (or any edition is also OK if you already have one)
Japanese version is also available: 「インターネット技術のすべて」 岡田 晴美 監訳、 ピアソン・エデュケーション。 質問・問題やソケットプログラミングなどの部分に一部教科書と異なる。
Other References :
-「ネットワークはなぜつながるのか」 戸根 勤 著/日経ネットワーク監修, 日経BP社
- TCP/IP Tutorial and Technical Overview, IBM Redbooks, by A. Rodriguez, et al, 2001 (free, online book)
成績評価の方法・基準
/Grading method/criteria
• Attendance (出席): 10%
• Homework (ホームワーク) : 20%
• Projects: 20%
• Mid-term: 25%
• Final (期末試験): 25%
参考(授業ホームページ、図書など)
/Reference (course
website, literature, etc.)
Course website: http://web-int.u-aizu.ac.jp/~pham/cn1/


Responsibility for the wording of this article lies with Student Affairs Division (Academic Affairs Section).

E-mail Address: sad-aas@u-aizu.ac.jp