|
YZM3031 | Information Security and Cryptology | 2+0+0 | ECTS:4 | Year / Semester | Fall Semester | Level of Course | First Cycle | Status | Elective | Department | DEPARTMENT of SOFTWARE ENGINEERING | Prerequisites and co-requisites | None | Mode of Delivery | Face to face, Group study | Contact Hours | 14 weeks - 2 hours of lectures per week | Lecturer | Dr. Öğr. Üyesi Asuman GÜNAY YILMAZ | Co-Lecturer | | Language of instruction | Turkish | Professional practise ( internship ) | None | | The aim of the course: | The aim of the course is to teach basic knowledge about information security and network security, to provide the basic principles of cryptography and the ability of data encryption. |
Learning Outcomes | CTPO | TOA | Upon successful completion of the course, the students will be able to : | | | LO - 1 : |
Learn the goals, principles, of information security and types of security attacks . | 3,7,8,11 | 1,3, | LO - 2 : | Learn basic security mechanisms and secure network designs. | 3,7,8,11 | 1,3, | LO - 3 : | Learn the basic concepts of cryptography and cryptographic systems. | 3,7,8,11 | 1,3, | LO - 4 : | Know symmetric and asymmetric cryptographic systems, hashing algorithms. | 3,7,8,11 | 1,3, | LO - 5 : | Have information about public key cryptography and digital signatures | 3,7,8,11 | 1,3, | LO - 6 : | Know security certificates and make security related risk analysis. | 3,7,8,11 | 1,3, | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome | |
Information Security / Cyber security related definitions and security attacks,Information security principals and objectives, General definitions of cryptography, Basic security mechanisms and secure network designs, Number theory and modular arithmetic, The history and types of cryptography, Symmetric, asymmetric encryption methods, Hashing algorithms, Public key cryptographic algorithms, RSA, Hand-Gamal Encryption Methods, Elliptic Curve Cryptography, Digital signatures, Security certificates, Security risk analysis and planning |
|
Course Syllabus | Week | Subject | Related Notes / Files | Week 1 | Information Security / Cyber security related definitions and security attacks | | Week 2 | Information Security / Cyber security related definitions and security attacks | | Week 3 | Basic security mechanisms and secure network designs, | | Week 4 | Number theory and modular arithmetic | | Week 5 | The history and types of cryptography, | | Week 6 | Symmetric encryption methods-DES | | Week 7 | AES and block-based encryption methods | | Week 8 | Hashing Algorithms-MD5 | | Week 9 | Midterm exam | | Week 10 | Public key encyrption- RSA | | Week 11 | Public key encyrption- El Gamal | | Week 12 | Elliptic Curve Cryptography | | Week 13 | Digital Signatures | | Week 14 | Security certificates-SSL | | Week 15 | Security risk analysis and planning | | Week 16 | Final exam | | |
1 | Eşref Adalı, Bilgisayar ve Bilgi Güvenliği ve Yönetimi | | |
1 | Forouzan, Behrouz, McGraw Hill, 2009, Cryptography and Network Security | | |
Method of Assessment | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | Mid-term exam | 9 | | 2 | 30 | Project | 12 | | 1 | 20 | End-of-term exam | 16 | | 2 | 50 | |
Student Work Load and its Distribution | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | Yüz yüze eğitim | 2 | 14 | 28 | Sınıf dışı çalışma | 2 | 14 | 28 | Arasınav için hazırlık | 4 | 5 | 20 | Arasınav | 2 | 1 | 2 | Proje | 4 | 5 | 20 | Dönem sonu sınavı için hazırlık | 3 | 5 | 15 | Dönem sonu sınavı | 2 | 1 | 2 | Total work load | | | 115 |
|