COURSE INTRODUCTION AND APPLICATION INFORMATION


Course Name
Information Security
Code
Semester
Theory
(hour/week)
Application/Lab
(hour/week)
Local Credits
ECTS
CE 607
Fall/Spring
3
0
3
7.5
Prerequisites
None
Course Language
English
Course Type
Elective
Course Level
Third Cycle
Mode of Delivery -
Teaching Methods and Techniques of the Course
Course Coordinator -
Course Lecturer(s) -
Assistant(s) -
Course Objectives The aim of the course is to evaluate the current problems and researches about information security. The course also addresses incident response and provides a technical foundation for working with operating system, network and application security, and cryptography. At the end of the course the students should have the ability to do new researches on this area and the student should try to write an article about his/her study topic as term project.
Learning Outcomes The students who succeeded in this course;
  • will be able to develop an approach for staying current with trends and requisite skills in information security.
  • will be able to extend their technical knowledge and skills in the area of information security
  • will be able to develop a basic understanding of cryptography
  • will be able to develop an understanding of security policies
Course Description The objective of this course is to provide the fundamental concepts of information security, its framework and processes, and to provide insight into abstraction, problem solving and systematic view.
Related Sustainable Development Goals

 



Course Category

Core Courses
Major Area Courses
Supportive Courses
Media and Managment Skills Courses
Transferable Skill Courses

 

WEEKLY SUBJECTS AND RELATED PREPARATION STUDIES

Week Subjects Required Materials
1 Introduction
2 Building Secure Organization Computer and Information Security Handbook, Ch.1
3 Introduction to Cryptography Computer and Information Security Handbook, Ch.2
4 Symmetrical and Asymmetrical Cryptosystems
5 Symmetrical and Asymmetrical Cryptosystems
6 Symmetrical and Asymmetrical Cryptosystems
7 Review of the Semester  
8 Review of the Semester  
9 Review of the Semester  
10 Review of the Semester  
11 Review of the Semester  
12 Review of the Semester  
13 Review of the Semester  
14 Course Project completion and presentations. -
15 Course Project completion and presentations. -
16 - -
Course Notes/Textbooks

Principals of Information Security, Whitman and Mattord, 6th Ed., Cengage Learning, 2018.

Suggested Readings/Materials

Computer and Information security Handbook, 3rd Ed., John R. Vacca, Elsevier, 2017
Computer Security: Art and Science, By Matt Bishop, 2002, Addison-Wesley Professional. Security in Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger, 2006, Prentice Hall. The Psychology of Security, By Bruce Schneier, January 18, 2008, http://www.schneier.com/essay-155.html. Information Security: Definations, http://www.hancockonline.net/IS-defs.html Information Security: Standards Organizations, http://www.hancockonline.net/IS-std-o.html IEEE Transaction on Information Forensics and Security, http://www.ieee.org/organizations/society/sp/tifs.htm

 

EVALUATION SYSTEM

Semester Activities Number Weigthing
Participation
Laboratory / Application
Field Work
Quizzes / Studio Critiques
Portfolio
Homework / Assignments
Presentation / Jury
Project
1
30
Seminar / Workshop
1
20
Oral Exam
Midterm
Final Exam
1
50
Total

Weighting of Semester Activities on the Final Grade
50
Weighting of End-of-Semester Activities on the Final Grade
50
Total

ECTS / WORKLOAD TABLE

Semester Activities Number Duration (Hours) Workload
Course Hours
(Including exam week: 16 x total hours)
16
3
48
Laboratory / Application Hours
(Including exam week: 16 x total hours)
16
Study Hours Out of Class
15
4
60
Field Work
Quizzes / Studio Critiques
Portfolio
Homework / Assignments
Presentation / Jury
Project
1
55
Seminar / Workshop
Oral Exam
Midterms
Final Exams
1
62
    Total
225

 

COURSE LEARNING OUTCOMES AND PROGRAM QUALIFICATIONS RELATIONSHIP

#
Program Competencies/Outcomes
* Contribution Level
1
2
3
4
5
1 Accesses information in breadth and depth by conducting scientific research in Electrical and Electronics Engineering; evaluates, interprets and applies information.
2 Is well-informed about contemporary techniques and methods used in Electrical and Electronics Engineering and their limitations.
3 Uses scientific methods to complete and apply information from uncertain, limited or incomplete data; can combine and use information from different disciplines. Knows and applies the research methods in studies of the area with a high level of skill.
4 Is informed about new and upcoming applications in the field and learns them whenever necessary.
5 Defines and formulates problems related to Electrical and Electronics Engineering, develops methods to solve them and uses progressive methods in solutions. Can independently realize novel studies that bring innovation to the field, or methods, or design, or known methods.
6 Develops novel and/or original methods, designs complex systems or processes and develops progressive/alternative solutions in designs.
7 Designs and implements studies based on theory, experiments and modeling; analyses and resolves the complex problems that arise in this process. Performs critical analysis, synthesis and evaluation of new and complex ideas.
8 Can work effectively in interdisciplinary teams as well as teams of the same discipline, can lead such teams and can develop approaches for resolving complex situations; can work independently and takes responsibility.
9 Engages in written and oral communication at least in Level C1 of the European Language Portfolio Global Scale.
10 Communicates the process and the results of his/her studies in national and international venues systematically, clearly and in written or oral form.
11 Evaluates the results of scientific, technological and engineering research and development activities in terms of the social, environmental, health, safety and legal aspects. Examines social relations and norms related to the field, and develops and makes attempts to change them if necessary. Knows their project management and business applications, and is aware of their limitations in Electrical and Electronics Engineering applications. 
12 Highly regards scientific and ethical values in data collection, interpretation, communication and in every professional activity. Adheres to the principles of research and publication ethics.

*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest