At the end of this course, the students; 1) Having knowledge about cryptography; recognize cryptographic and cryptanalytic methods 2) Bringing or decomposing components of security architects, reasoning about the interaction of components 3) Designing and analyzing security protocol 4) Having knowledge about the legal and social issues related to safety
MODE OF DELIVERY
Face to face
PRE-REQUISITES OF THE COURSE
No
RECOMMENDED OPTIONAL PROGRAMME COMPONENT
COURSE DEFINITION
Basic encryption functions, disk review, code analysis tools, many encountered programming errors, web application security, IPSEC / SSL protocols, firewall tuning, network scanning, security issues such as Kerberos, SMIME / PGP will be discussed.
COURSE CONTENTS
WEEK
TOPICS
1st Week
Basic concepts and introduction to cryptography
2nd Week
Encoders based on substitution, encoders based on displacement, single-use switches
Privacy, social effects of privacy and examples from real life, Steganography, legal issues
14th Week
Final Exam
RECOMENDED OR REQUIRED READING
1. Stallings, W. 2011, Cryptography and Network Security, Principles and Practices (Fifth Edition), Prentice Hall, ISBN 0-13-609704-9. 2. Tanenbaum, A. S. 2003, Computer Networks (Fifth ed.), Prentice Hall, ISBN 0- 13-066102-3. 3. Kizza, J. M. 2005, Computer Network Security, Springer, ISBN 0-387-20473- 4. Bishop, M. 2003, Computer Security: Art and Science, Addison-Wesley, ISBN 0-201-44099-7.