TYPE OF COURSE UNIT | Elective Course |
LEVEL OF COURSE UNIT | Master's Degree Without Thesis |
YEAR OF STUDY | - |
SEMESTER | - |
NUMBER OF ECTS CREDITS ALLOCATED | 10 |
NAME OF LECTURER(S) | Professor Nizami Gasilov Assistant Professor Mehmet Dikmen Instructor Oğul Göçmen
|
LEARNING OUTCOMES OF THE COURSE UNIT |
At the end of this course, the students; 1) Learn the fundamental concepts of information security. 2) Define the design process of a security system and analyze the security risk. 3) Learn the fundamental concepts of cryptography and cryptosystems.
|
MODE OF DELIVERY | E-Learning |
PRE-REQUISITES OF THE COURSE | No |
RECOMMENDED OPTIONAL PROGRAMME COMPONENT | None |
COURSE DEFINITION | Introduction to Cryptography; Classical Cryptography; Symmetric and Asymmetric Encryption; DES; AES; RSA Problem; Diffie Hellman Key Exchange; Rabin; ElGamal; Pseudo-Random Bits; Cryptographic Hash Functions; Message Authentication Codes; Digital Signature; Principles of Authentication Protocols; Authentication in Real Worlds. |
COURSE CONTENTS | WEEK | TOPICS |
---|
1st Week | Information security targets, principles, main measures. | 2nd Week | Information security management components and standards | 3rd Week | Classification of the data and authority for security reasons | 4th Week | Basic concepts of cryptography and cryptosystems with their applications | 5th Week | Symmetric and asymmetric ciphering systems | 6th Week | Public Key Cryptosystems and Digital Signatures | 7th Week | Communication of Network Systems and Topology security | 8th Week | Access control systems and methodology, Telecommunications, network and internet security | 9th Week | Firewalls | 10th Week | Network usage policies | 11th Week | Information security management strategies and policies | 12th Week | Risk Analysis Methods | 13th Week | Information Security Management System design, implementation steps | 14th Week | Final Exam |
|
RECOMENDED OR REQUIRED READING | 1. Security in Computing, Charles Pfleeger, Fourth Edition, 2007 2. Stallings, W., Cryptography and Network Security: Principles and Practice, 5/E, ISBN-10: 0136097049, Prentice Hall, 2011 3. Salomon, D., Data Privacy and Security: Encryption and Information Hiding, ISBN: 0387003118, Springer-Verlag New York, Inc., 2003 |
PLANNED LEARNING ACTIVITIES AND TEACHING METHODS | Lecture |
ASSESSMENT METHODS AND CRITERIA | | Quantity | Percentage(%) |
---|
Assignment | 1 | 20 | Total(%) | | 20 | Contribution of In-term Studies to Overall Grade(%) | | 20 | Contribution of Final Examination to Overall Grade(%) | | 80 | Total(%) | | 100 |
|
ECTS WORKLOAD |
Activities |
Number |
Hours |
Workload |
Midterm exam | | | | Preparation for Quiz | | | | Individual or group work | 14 | 3 | 42 | Preparation for Final exam | 1 | 40 | 40 | Course hours | 14 | 3 | 42 | Preparation for Midterm exam | | | | Laboratory (including preparation) | | | | Final exam | 1 | 2 | 2 | Homework | | | | Presentation (including preperation) | 1 | 80 | 80 | Project | 1 | 80 | 80 | Total Workload | | | 286 |
---|
Total Workload / 30 | | | 9,53 |
---|
ECTS Credits of the Course | | | 10 |
|
LANGUAGE OF INSTRUCTION | Turkish |
WORK PLACEMENT(S) | No |
| |