Code |
Name of the Course Unit |
Semester |
In-Class Hours (T+P) |
Credit |
ECTS Credit |
BGT203 |
INFORMATION AND NETWORK SECURITY I |
3 |
4 |
3 |
5 |
GENERAL INFORMATION |
Language of Instruction : |
Turkish |
Level of the Course Unit : |
ASSOCIATE DEGREE, TYY: + 5.Level, EQF-LLL: 5.Level, QF-EHEA: Short Cycle |
Type of the Course : |
Compulsory |
Mode of Delivery of the Course Unit |
- |
Coordinator of the Course Unit |
Lecturer TUĞÇE YÜKSEL |
Instructor(s) of the Course Unit |
Lecturer VOLKAN CANTEMİR |
Course Prerequisite |
No |
OBJECTIVES AND CONTENTS |
Objectives of the Course Unit: |
Raising awareness of the risks in circulation and in the environments where stored data is available, and gaining conceptual competence on methods to eliminate these risks. |
Contents of the Course Unit: |
Basic security concepts, Factors that threaten data security, Encryption methods and techniques, security threatening attacks and protection methods, e-mail security. |
KEY LEARNING OUTCOMES OF THE COURSE UNIT (On successful completion of this course unit, students/learners will or will be able to) |
Gains conceptual awareness about security, risk, digital attack, data and the environments in which it is carried. |
Gains knowledge about the factors that increase and decrease risk in digital environments. |
Learns the basic characteristics of digital attacks. |
Generates emergency scenarios in data security. |
Experiences risk management. |
Recognize data and data transition and storage media properties. |
Learns information security management standards. |
Gains the ability to control data access permissions and classify users |
WEEKLY COURSE CONTENTS AND STUDY MATERIALS FOR PRELIMINARY & FURTHER STUDY |
Week |
Preparatory |
Topics(Subjects) |
Method |
1 |
- |
Concepts related to data and environments, Stages of development of knowledge |
Lecture and practice |
2 |
Research |
Malware (Virus, Worm, Trojan) |
Lecture and practice |
3 |
Research |
Malware (Others) |
Lecture and practice |
4 |
Research |
Current malware |
Lecture and practice |
5 |
Research |
Cyber Security, Cyber Security |
Lecture and practice |
6 |
Research |
Forensic Informatics |
Lecture and practice |
7 |
- |
Types of Forensic Informatics |
Lecture and practice |
8 |
- |
MID-TERM EXAM |
- |
9 |
Research |
Information systems and security, Risk factors |
Lecture and practice |
10 |
Research |
Basic Cryptology, Keyed Encryption |
Lecture and practice |
11 |
Research |
Basic Cryptology, Keyless Encryption |
Lecture and practice |
12 |
Research |
Network Security |
Lecture and practice |
13 |
Research |
Firewall |
Lecture and practice |
14 |
Research |
Firewall |
Lecture and practice |
15 |
Research |
Social engineering |
Lecture and practice |
16 |
- |
FINAL EXAM |
- |
17 |
- |
FINAL EXAM |
- |
SOURCE MATERIALS & RECOMMENDED READING |
COMPUTER SECURITY PRINCIPLES AND PRACTICE, Third Edition, William Stallings, Lawrie Brown, Prentice Hall. |
STAL11b Stallings, W. Cryptography and Network Security: Principles and Practice, Fifth Edition. Upper Saddle River, NJ: Prentice Hall, 2011. |
CYBER SECURITY INSTITUTE https://sge.bilgem.tubitak.gov.tr/ |
ASSESSMENT |
Assessment & Grading of In-Term Activities |
Number of Activities |
Degree of Contribution (%) |
Description |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
CONTRIBUTION OF THE COURSE UNIT TO THE PROGRAMME LEARNING OUTCOMES
KNOWLEDGE |
Theoretical |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Knows the necessary terms and information in the computer field.
|
|
|
|
|
4 |
|
2 |
Gains knowledge of the concept of information security.
|
|
|
|
|
|
5 |
KNOWLEDGE |
Factual |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Gains the ability to learn the necessary concepts in the computer field.
|
|
|
|
|
4 |
|
SKILLS |
Cognitive |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to identify, define, formulate and solve complex Information Security problems; for this purpose, the ability to select and apply appropriate analysis and modeling methods
|
|
|
|
|
4 |
|
SKILLS |
Practical |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to design a complex computer-based system, process, security to meet specific requirements under realistic constraints and conditions; for this purpose, the ability to apply modern design methods.
|
|
|
|
|
4 |
|
OCCUPATIONAL |
Autonomy & Responsibility |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to design, conduct experiments, collect data, analyze and interpret results for examining Information Security problems
|
|
|
|
|
4 |
|
2 |
Ability to work effectively within the discipline of Information Security and in multi-disciplinary teams; individual study skills
|
|
|
|
|
|
5 |
3 |
Professional and ethical responsibility awareness
|
|
|
|
|
|
5 |
4 |
Knowledge of project management and business practices such as risk management and change management; awareness of entrepreneurship, innovation and sustainable development
|
|
|
|
|
|
5 |
OCCUPATIONAL |
Learning to Learn |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to develop, select and use modern techniques and tools required for Information Security applications
|
|
|
|
|
|
5 |
2 |
Awareness of the necessity of lifelong learning; ability to access information, follow developments in science and technology, and constantly renew oneself
|
|
|
|
|
4 |
|
OCCUPATIONAL |
Communication & Social |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Ability to communicate effectively in Turkish orally and in writing, foreign language knowledge
|
|
|
|
|
4 |
|
OCCUPATIONAL |
Occupational and/or Vocational |
|
Programme Learning Outcomes |
Level of Contribution |
0 |
1 |
2 |
3 |
4 |
5 |
1 |
Information about the effects of Information Security practices on health, environment and security in universal and social dimensions and the problems of the age; Awareness of the legal consequences of Information Security solutions
|
|
|
|
|
|
5 |
WORKLOAD & ECTS CREDITS OF THE COURSE UNIT |
Workload for Learning & Teaching Activities |
Type of the Learning Activites |
Learning Activities (# of week) |
Duration (hours, h) |
Workload (h) |
Lecture & In-Class Activities |
14 |
4 |
56 |
Preliminary & Further Study |
12 |
2 |
24 |
Land Surveying |
0 |
0 |
0 |
Group Work |
0 |
0 |
0 |
Laboratory |
0 |
0 |
0 |
Reading |
6 |
3 |
18 |
Assignment (Homework) |
1 |
5 |
5 |
Project Work |
0 |
0 |
0 |
Seminar |
0 |
0 |
0 |
Internship |
0 |
0 |
0 |
Technical Visit |
0 |
0 |
0 |
Web Based Learning |
0 |
0 |
0 |
Implementation/Application/Practice |
6 |
3 |
18 |
Practice at a workplace |
0 |
0 |
0 |
Occupational Activity |
0 |
0 |
0 |
Social Activity |
0 |
0 |
0 |
Thesis Work |
0 |
0 |
0 |
Field Study |
0 |
0 |
0 |
Report Writing |
0 |
0 |
0 |
Final Exam |
1 |
1 |
1 |
Preparation for the Final Exam |
0 |
0 |
0 |
Mid-Term Exam |
0 |
0 |
0 |
Preparation for the Mid-Term Exam |
0 |
0 |
0 |
Short Exam |
0 |
0 |
0 |
Preparation for the Short Exam |
0 |
0 |
0 |
TOTAL |
40 |
0 |
122 |
|
Total Workload of the Course Unit |
122 |
|
|
Workload (h) / 25.5 |
4,8 |
|
|
ECTS Credits allocated for the Course Unit |
5,0 |
|