|
|
| BIL3023 | Information security | 3+0+0 | ECTS:4 | | Year / Semester | Fall Semester | | Level of Course | First Cycle | | Status | Compulsory | | Department | DEPARTMENT of COMPUTER ENGINEERING | | Prerequisites and co-requisites | None | | Mode of Delivery | | | Contact Hours | 14 weeks - 3 hours of lectures per week | | Lecturer | Prof. Dr. Güzin ULUTAŞ | | Co-Lecturer | | | Language of instruction | Turkish | | Professional practise ( internship ) | None | | | | The aim of the course: | | The aim of the course is for students to learn about data security approaches and to gain the ability to produce solutions to possible security-requiring problems. |
| Learning Outcomes | CTPO | TOA | | Upon successful completion of the course, the students will be able to : | | | | LO - 1 : | | 1.1 - 2.2 | 1,6, | | LO - 2 : | | 1.1 | 1,6, | | LO - 3 : | | 1.3 - 2.1 | 1,6, | | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), LO : Learning Outcome | | |
| The course content includes traditional encryption methods, mathematical content behind encryption methods, symmetric and asymmetric encryption algorithms, forensic science approaches, steganography and watermarking methods. |
| |
| Course Syllabus | | Week | Subject | Related Notes / Files | | Week 1 | Security Goals, Attacks, Services and Mechanisms | | | Week 2 | Mathematics of Cryptography I | | | Week 3 | Traditional Symmetric Key Ciphers | | | Week 4 | Mathematics of Cryptography II | | | Week 5 | Modern Symmetric Ciphers | | | Week 6 | Data Encryption Standard | | | Week 7 | Advanced Encryption Standard | | | Week 8 | Various modes for modern symmetric key ciphers | | | Week 9 | First MidTerm | | | Week 10 | Mathematics of Cryptography III | | | Week 11 | Asymmetric key cryptography | | | Week 12 | Steganography and Data Hiding Techniques | | | Week 13 | Watermarking Methods | | | Week 14 | Visual Cryptography and Secret sharing schemes | | | Week 15 | Forensic science approaches for data security | | | Week 16 | invited speaker from data security subfield | | | |
| 1 | Crpytography and Network Security, Behrouz Forouzan, McGraw Hill | | | |
| 1 | Cryptography and Network Security: Principles and Practice, William Stallings | | | |
| Method of Assessment | | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | | Mid-term exam | 9 | | 150 | 25 | | Homework/Assignment/Term-paper | 15 | | | 25 | | End-of-term exam | 16 | | 150 | 50 | | |
| Student Work Load and its Distribution | | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | | Yüz yüze eğitim | 3 | 14 | 42 | | Arasınav için hazırlık | 1 | 8 | 8 | | Arasınav | 2 | 1 | 2 | | Proje | 1 | 14 | 14 | | Dönem sonu sınavı için hazırlık | 1 | 15 | 15 | | Dönem sonu sınavı | 2 | 1 | 2 | | Total work load | | | 83 |
|