|
BIL4031 | @data security | 3+0+0 | ECTS:4 | Year / Semester | Fall Semester | Level of Course | First Cycle | Status | Elective | Department | DEPARTMENT of COMPUTER ENGINEERING | Prerequisites and co-requisites | None | Mode of Delivery | | Contact Hours | 14 weeks - 3 hours of lectures per week | Lecturer | Prof. Dr. Güzin ULUTAŞ | Co-Lecturer | | Language of instruction | Turkish | Professional practise ( internship ) | None | | The aim of the course: | The aim of the course is for students to learn about data security approaches and to gain the ability to produce solutions to possible security-requiring problems. |
Learning Outcomes | CTPO | TOA | Upon successful completion of the course, the students will be able to : | | | LO - 1 : | | 1,5 | 1,6, | LO - 2 : | | 1 | 1,6, | LO - 3 : | | 3,4 | 1,6, | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome | |
The course content includes traditional encryption methods, mathematical content behind encryption methods, symmetric and asymmetric encryption algorithms, forensic science approaches, steganography and watermarking methods. |
|
Course Syllabus | Week | Subject | Related Notes / Files | Week 1 | Security Goals, Attacks, Services and Mechanisms | | Week 2 | Mathematics of Cryptography I | | Week 3 | Traditional Symmetric Key Ciphers | | Week 4 | Mathematics of Cryptography II | | Week 5 | Modern Symmetric Ciphers | | Week 6 | Data Encryption Standard | | Week 7 | Advanced Encryption Standard | | Week 8 | Various modes for modern symmetric key ciphers | | Week 9 | First MidTerm | | Week 10 | Mathematics of Cryptography III | | Week 11 | Asymmetric key cryptography | | Week 12 | Steganography and Data Hiding Techniques | | Week 13 | Watermarking Methods | | Week 14 | Visual Cryptography and Secret sharing schemes | | Week 15 | Forensic science approaches for data security | | Week 16 | invited speaker from data security subfield | | |
1 | Crpytography and Network Security, Behrouz Forouzan, McGraw Hill | | |
1 | Cryptography and Network Security: Principles and Practice, William Stallings | | |
Method of Assessment | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | Mid-term exam | 9 | | 150 | 25 | Homework/Assignment/Term-paper | 15 | | | 25 | End-of-term exam | 16 | | 150 | 50 | |
Student Work Load and its Distribution | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | Yüz yüze eğitim | 3 | 14 | 42 | Arasınav için hazırlık | 1 | 8 | 8 | Arasınav | 2 | 1 | 2 | Proje | 1 | 14 | 14 | Dönem sonu sınavı için hazırlık | 1 | 15 | 15 | Dönem sonu sınavı | 2 | 1 | 2 | Total work load | | | 83 |
|