Content: |
Introduction, Basic Threats, Vulnerability Analysis, Profile Analysis, Concept of Modus Operandi, Cyber Crime - Cyber Terrorism - Cyber Warfare, Malware and Malware, Virus Scanner Design, and Usage Policies, Network Security, Mobile Security, Social Media and Security, Security concerns, Basic definitions and history of cryptography, Symmetric Cryptosystems, Asymmetric Cryptosystems, Asymmetric Protocols: Electronic and Mobile Signature Systems, Computer Forensics, Principles of Good Security Practices, Turkish Criminal Law: Computer Crimes Section |