|
YBS3008 | Information Security | 3+0+0 | ECTS:4 | Year / Semester | Spring Semester | Level of Course | First Cycle | Status | Elective | Department | DEPARTMENT of MANAGEMENT INFORMATION SYSTEMS | Prerequisites and co-requisites | None | Mode of Delivery | | Contact Hours | 14 weeks - 3 hours of lectures per week | Lecturer | Dr. Öğr. Üyesi Mustafa Bilgehan İMAMOĞLU | Co-Lecturer | | Language of instruction | Turkish | Professional practise ( internship ) | None | | The aim of the course: | The aim of the course is to provide information about elements of information security, fundamental security concepts, computer and information security systems, social networks, cyber threats, applications, protocols, controls, systems, and policies. The course encompasses topics such as spyware, malware, and types of preventive measures against them, factors threatening data security, encryption methods and techniques, security-threatening attacks, and protection methods. |
Learning Outcomes | CTPO | TOA | Upon successful completion of the course, the students will be able to : | | | LO - 1 : | will be able to acquire knowledge about attacks on information systems and their types. | 1,2 | 1, | LO - 2 : | will be able to acquire knowledge about malicious software and its types. | 1,2 | 1, | LO - 3 : | will be able to take precautions against malicious and spyware. | 1,2 | 1, | LO - 4 : | will be able to implement information security protocols. | 1,2 | 1, | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome | |
The course will focus on the topics, elements, and processes of information and computer security, and it will describe the steps that need to be taken for advanced security. At the end of this process, efforts will be made to provide comprehensive answers to questions such as why it is important to prioritize information and computer security and how information security can be fundamentally established. |
|
Course Syllabus | Week | Subject | Related Notes / Files | Week 1 | Information and Security Concepts | | Week 2 | Fundamental Security Elements | | Week 3 | Computer and Information Security Systems | | Week 4 | Cyber Threats | | Week 5 | Elements Threatening Data Security | | Week 6 | Spyware | | Week 7 | | | Week 8 | Encryption Methods and Techniques | | Week 9 | Midterm exam | | Week 10 | Cyberspace and the Fundamental Characteristics of Cyberspace | | Week 11 | Critical Infrastructure and Systems | | Week 12 | Cyber Attack Sources, Advanced Cyber Attack Monitoring, and Prevention | | Week 13 | Cryptography Applications | | Week 14 | Cyber Espionage and Intelligence Methods | | Week 15 | Information Security and Risk Management | | Week 16 | Final Exam | | |
1 | Bilişim Etiği ve Güvenliği, Nobel Akademik Yayıncılık, 2019 | | |
Method of Assessment | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | Mid-term exam | 9 | 11/2023 | 1 | 50 | End-of-term exam | 16 | 1/2024 | 1 | 50 | |
Student Work Load and its Distribution | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | Yüz yüze eğitim | 3 | 14 | 42 | Sınıf dışı çalışma | 1 | 14 | 14 | Arasınav için hazırlık | 2 | 8 | 16 | Arasınav | 1 | 1 | 1 | Dönem sonu sınavı için hazırlık | 2 | 6 | 12 | Dönem sonu sınavı | 1 | 1 | 1 | Total work load | | | 86 |
|