Course Information


Course Information
Course Title Code Semester L+U Hour Credits ECTS
INFORMATION SECURITY AND ENCRYPTION 805101725101 3 + 0 3.0 8.0

Prerequisites None

Language of Instruction Turkish
Course Level Graduate Degree
Course Type Elective
Mode of delivery
Course Coordinator
Instructors Erinç KARATAŞ
Assistants
Goals The main aim of the course is to provide the understanding of information security by using practical and theoretical tools. It is designed to provide students with the basic topics and discussions on information security and the developments in information security technologies.
Course Content Overview of Information Security, Information Security Technical Infrastructure Components; CIA approach; Information Security Threats, Information Security Program Structure, Information Security Policies, Asset Classification and Evaluation, Access Control, Physical Security, ISO27001 Information Security Standard, Information Security Related Legislation , Information Security-Oriented IT Management, Encryption Tools. User Authorization Approval. Access Control. Intrusion Detection. Malware. Service-Blocking Attacks. Firewalls. Secure Transactions. Buffer Overflow. Software Security. Physical Security The Human Factor. Symmetric encryption and message security. Projects.
Learning Outcomes 1) To learn concepts related to information security and its technologies
2) To learn the use and theories of information security models
3) To develop an understanding for Information Security infrastructure technologies and strategies
4) Safety analysis for the given case and learn what measures to take

Weekly Topics (Content)
Week Topics Teaching and Learning Methods and Techniques Study Materials
1. Week Overview of Information Security Concept; Information Security Technical Infrastructure Elements; CIA approach Lecture

Presentation (Including Preparation Time)
2. Week Information Security Threats; Structure of Information Security Program; Information Security Policies; Asset Classification and Evaluation; Lecture; Question Answer; Problem Solving

Presentation (Including Preparation Time)
3. Week Access Control; Physical Security Lecture; Question Answer; Problem Solving

Homework Presentation (Including Preparation Time)
4. Week ISO27001 Information Security Standard Lecture; Question Answer; Problem Solving

Presentation (Including Preparation Time) Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
5. Week Information Security Focused IT Management Lecture; Question Answer; Problem Solving

Presentation (Including Preparation Time)
6. Week Encryption Tools Lecture; Question Answer; Problem Solving

Homework Presentation (Including Preparation Time) Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
7. Week User Authorization Approval. Access Controlled. Intrusion Detection. Malware Software Lecture; Question Answer; Problem Solving

Presentation (Including Preparation Time)
8. Week Denial of Service Attacks Lecture; Question Answer; Problem Solving

Presentation (Including Preparation Time)
9. Week Firewalls. Secure Transaction. Buffer Overflow Errors Lecture; Question Answer; Problem Solving

Homework Presentation (Including Preparation Time) Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
10. Week Software Security. Physical Security and Human Factor Lecture; Question Answer; Problem Solving

Presentation (Including Preparation Time)
11. Week Symmetric encryption and Message Security Lecture; Question Answer; Problem Solving

Presentation (Including Preparation Time)
12. Week Legal Regulations on Information Security Lecture; Question Answer; Problem Solving

Presentation (Including Preparation Time) Activity (Web Search, Library Work, Trip, Observation, Interview etc.)
13. Week Evaluation of Student Projects Question Answer; Discussion

Project Based Learning
Presentation (Including Preparation Time) Project (Including Preparation and presentation Time)
14. Week Evaluation of Student Projects Question Answer; Discussion

Project Based Learning
Presentation (Including Preparation Time) Project (Including Preparation and presentation Time)

Sources Used in This Course
Recommended Sources
Cryptography and Network Security (4th Edition) Principles and Practices, William Stallings
Merkow. ,S. M. (2005). Information security: Principles and Practices (2nd Edition).
Nayak, U. And Rao, U. (2014). The InfoSec Handbook: An Introduction to Information Security.
Raggad, B. G. (2010). Information Security Management: Concepts and Practice.

Relations with Education Attainment Program Course Competencies
Program RequirementsContribution LevelDK1DK2DK3DK4
PY140000
PY1855500
PY2555500
PY3044444

*DK = Course's Contrubution.
0 1 2 3 4 5
Level of contribution None Very Low Low Fair High Very High
.

ECTS credits and course workload
Event Quantity Duration (Hour) Total Workload (Hour)
Course Duration (Total weeks*Hours per week) 14 3
Work Hour outside Classroom (Preparation, strengthening) 14 3
Homework 14 3
Activity (Web Search, Library Work, Trip, Observation, Interview etc.) 14 4
Practice (Teaching Practice, Music/Musical Instrument Practice , Statistics, Laboratory, Field Work, Clinic and Polyclinic Practice) 14 4
Midterm Exam 1 1
Final Exam 1 1
Total Workload
Total Workload / 30 (s)
ECTS Credit of the Course
Quick Access Hızlı Erişim Genişlet
Course Information