Information Security Seminar 2025 for Students
Duration: May 20 to November 30, 2025
All students should read this page to the end and take the "Confirmation Test" at the end of the page.
"Information security” refers to activities to protect information assets held by an organization from cyber attacks, unauthorized access, and natural disasters. While our daily lives and economic activities have become more convenient and sophisticated with the advancement of information technology, information security incidents such as information theft and destruction of computer systems have been occurring frequently.
While it is necessary to prevent incidents and accidents related to information security, it is also important to be equipped with knowledge on a regular basis to minimize damage should they occur.
Shizuoka University has established the “Declaration on Information Security” and widely communicates its efforts to the general public.
Through this web seminar, you will understand the importance of information security and deepen your knowledge.
Declaration on Information Security
Shizuoka University is engaged in education and research based on the following three principles:
1. Cultivate well-educated people who shall bear responsibility for the future of our planet and have both profound global awareness and expertise.
2. Understand the critical situations of modern society and conduct creative academic researches aiming at sciences that support the foundations of global peace and human well-being.
3. March with local communities, sincerely deal with the issues faced by them, and fulfill the role of a cultural and scientific base.
We strictly adhere to the information security to help in the realization of the University’s ideas and to make maximum use of the achievements of our educational and research activities. Thereby, we declare the following four pledges.
As a characteristic of the Internet, it is difficult to completely prevent malpractices, such as wiretapping, elimination, manipulation and destruction of data through the network, because there is no person or rule for controlling the entire system in principle.
Therefore, we need to take self-defense measures.
Basic PC protection measures are listed below:
The following cases require attention.
To protect your personal information and account security, please manage your ID/password strictly. Password compromise can lead to account hijacking, information leakage, and financial loss. It can also lead to loss of credibility.
Examples of bad passwords
Use the keyboard sequence as it is / Simple words and their repetition / Personal information (your name, birthday, phone number, etc.) / Few characters / A history of password leaks (may be on the Internet semi-permanently) / Including some or all of your ID / Identical password for multiple services / Has not been changed in years (may have been leaked in a major information leakage incident at a major website or other major site) / Has been left at default settings / Has been entered many times in public (possible shoulder hacking)
Data is a valuable asset. Back up the data on your computer and other devices you use on a regular basis. This will protect your data in the event of OS reinstallation or disk failure.
Ransomware (ransom virus), which has been raging in recent years, encrypts not only infected terminals but also files on shared servers and external disks. It is effective to obtain regular backups and store them offline. In the event of infection, do not pay the release fee. It may reoccur and encourage malicious activity. Report it to the police or other cybersecurity-related public authorities for guidance.
Care must be taken when disposing of devices that contain data. Not only have there been cases of used computers with data left over from the previous owner, but there are also cases where people intentionally purchase used computers that show signs of having been used by a company, etc., and then search for the data stored on them to obtain confidential information.
Please ensure that data is securely erased before disposing of the equipment by using appropriate methods, such as using dedicated data-erasure software or the services of a professional company. This applies not only to computers and discs, but also to mobile phones, smartphones, CDs and DVDs, USB memory sticks, various memory cards, external discs, etc.
Anti-malware protection is essential for data and system security. (Malware: A generic term for malicious software. There are many different types, including viruses, worms, spyware, ransomware, and Trojan horses.) Malicious software such as viruses and ransomware can cause serious damage, including information leakage, data destruction, and system shutdown. Installing appropriate security software and updating it regularly can minimize these risks.
Anti-malware measures are essential to maintaining the health of the digital environment.
As a basic measure:
A number of attacks through unsolicited e-mails with malware attachments and attacks that deprive an organization of important information by mixing factual characteristics and information about the organization with e-mails (targeted attacks) have been confirmed at the University. Some of them are sophisticated enough to slip through inspections and blocking by the latest security devices.
Please check your email, noting the following:
Not only could this result in the leakage, theft, or destruction of important data, but it could also develop into secondary damage (springboard attacks) both inside and outside the university. Even if the information contained in an email is believed to be relevant to you, please be careful not to open email attachments or enter your email address, password, or other personal information when requested by the email or website.
If you have any suspicions at all, do not proceed any further and contact the sender directly or consult with the Center for Information Infrastructure.
It is prohibited to create or distribute copies of copyrighted material (even a part of it) without the permission of the copyright holder. In addition, stealing ideas or freely altering the material is also not permitted. When using other people's copyrighted material, you must check the license terms and obtain permission from the copyright holder if necessary.
Note that P2P file exchange (sharing) software such as BitTorrent and Winny have the following problems:
· It is easy to share illegal content, so there is a high risk of copyright infringement. There is a possibility of illegal files being downloaded/uploaded without knowing it.
For this reason, the use of P2P file-sharing software on the campus network is prohibited.
Even personal laptops and terminals must not be connected to the campus network with P2P file-sharing software installed.
SNS is an abbreviation for Social Network Service.
LINE, Instagram, X (formerly Twitter), Facebook, and TikTok are typical examples.
There have also been many reports of malicious activities using social media. Please be cautious of any contact or information provided by people you do not recognize.
Public Wi-Fi is available in many places, including train stations, airports, hotels, and stores, allowing you to easily connect to the Internet even outside of school. As a means of communication in the event of a disaster, the "00000JAPAN (Five-Zero Japan)" initiative is also underway.
Although it is easy to use, if you use it without understanding the risks and threats that lurk there, you may be at risk of having your communications intercepted or your ID/password stolen.
The main points you should be careful of are as follows:
· Check the provider of the access point (SSID): Do not connect to an access point whose provider is unknown or suspicious. There are cases where the SSID is a fake one that pretends to be a common SSID.
· Do not enter or send ID/password, card information, bank information, or other personally identifiable information.
· When accessing the web, check the URL carefully.
· Networks with weak security levels (those without encryption or weak methods such as WEP) are particularly at risk of being intercepted, so avoid using them if you are unsure of the security level.
Please click the link and take the confirmation test. You will need to log in with your university's 365 ID.
https://forms.office.com/r/ZB8HGfY4tD