Home  »  Institute of Social Sciences »  Master's of Management Information Systems with Thesis

COURSE UNIT TITLECOURSE UNIT CODESEMESTERTHEORY + PRACTICE (Hour)ECTS
INFORMATION SECURITY AND RISK MANAGEMENT YBS522 - 3 + 0 10

TYPE OF COURSE UNITElective Course
LEVEL OF COURSE UNITMaster's Degree With Thesis
YEAR OF STUDY-
SEMESTER-
NUMBER OF ECTS CREDITS ALLOCATED10
NAME OF LECTURER(S)Associate Professor Esma Ergüner Özkoç
LEARNING OUTCOMES OF THE COURSE UNIT At the end of this course, the students;
1) Having knowledge about cryptography; recognize cryptographic and cryptanalytic methods
2) Bringing or decomposing components of security architects, reasoning about the interaction of components
3) Designing and analyzing security protocol
4) Having knowledge about the legal and social issues related to safety
MODE OF DELIVERYFace to face
PRE-REQUISITES OF THE COURSENo
RECOMMENDED OPTIONAL PROGRAMME COMPONENT
COURSE DEFINITIONBasic encryption functions, disk review, code analysis tools, many encountered programming errors, web application security, IPSEC / SSL protocols, firewall tuning, network scanning, security issues such as Kerberos, SMIME / PGP will be discussed.
COURSE CONTENTS
WEEKTOPICS
1st Week Basic concepts and introduction to cryptography
2nd Week Encoders based on substitution, encoders based on displacement, single-use switches
3rd Week Symmetric encryption, DES, 3 DES, AES, encryption modes
4th Week Password analysis, open key algorithms, RSA, ElGamal and ECC
5th Week Digital signature, message essence, MD5, SHA-1, birthday attack
6th Week Public key management, certificate, X509, public key infrastructures, directory structures, cancellation mechanisms
7th Week Communications security, IPsec Firewall, virtual private network, wireless network security, 802.11 security, Bluetooth security
8th Week Midterm
9th Week Suspension protocols, shared secret key-based overlay, Diffie-Hellman key exchange
10th Week Email security, PGP S / MIME, network security, threats, secure naming
11th Week SSL Navigator code threat, virus, worm, Trojan horse, protection SET Protocol e-Commerce security
12th Week e-Government applications and security
13th Week Privacy, social effects of privacy and examples from real life, Steganography, legal issues
14th Week Final Exam
RECOMENDED OR REQUIRED READING1. Stallings, W. 2011, Cryptography and Network Security, Principles and Practices (Fifth Edition), Prentice Hall, ISBN 0-13-609704-9.
2. Tanenbaum, A. S. 2003, Computer Networks (Fifth ed.), Prentice Hall, ISBN 0- 13-066102-3.
3. Kizza, J. M. 2005, Computer Network Security, Springer, ISBN 0-387-20473-
4. Bishop, M. 2003, Computer Security: Art and Science, Addison-Wesley, ISBN 0-201-44099-7.
PLANNED LEARNING ACTIVITIES AND TEACHING METHODSLecture,Discussion,Questions/Answers,Case Study,Project
ASSESSMENT METHODS AND CRITERIA
 QuantityPercentage(%)
Mid-term130
Project120
Total(%)50
Contribution of In-term Studies to Overall Grade(%)50
Contribution of Final Examination to Overall Grade(%)50
Total(%)100
ECTS WORKLOAD
Activities Number Hours Workload
Midterm exam111
Preparation for Quiz
Individual or group work1410140
Preparation for Final exam14342
Course hours13339
Preparation for Midterm exam8324
Laboratory (including preparation)
Final exam111
Homework14040
Total Workload287
Total Workload / 309,56
ECTS Credits of the Course10
LANGUAGE OF INSTRUCTIONTurkish
WORK PLACEMENT(S)No
  

KEY LEARNING OUTCOMES (KLO) / MATRIX OF LEARNING OUTCOMES (LO)
LO1LO2LO3LO4
K1       
K2       
K3  X      
K4      X  
K5    X    
K6        X
K7       
K8       
K9       
K10