1 | Course Title: | DATA SECURITY |
2 | Course Code: | BM6025 |
3 | Type of Course: | Optional |
4 | Level of Course: | Third Cycle |
5 | Year of Study: | 1 |
6 | Semester: | 1 |
7 | ECTS Credits Allocated: | 6 |
8 | Theoretical (hour/week): | 3 |
9 | Practice (hour/week) : | 0 |
10 | Laboratory (hour/week) : | 0 |
11 | Prerequisites: | none |
12 | Recommended optional programme components: | None |
13 | Language: | Turkish |
14 | Mode of Delivery: | Face to face |
15 | Course Coordinator: | Prof. Dr. PINAR KIRCI |
16 | Course Lecturers: | yok |
17 | Contactinformation of the Course Coordinator: |
Bilgisayar müh. bölüm binası 1. kat oda 110 pinarkirci@uludag.edu.tr |
18 | Website: | |
19 | Objective of the Course: | To teach the basic concepts and principles of information security, the security requirements of information systems and methodological design strategies for security. |
20 | Contribution of the Course to Professional Development | At the end of this course the student will Understand the basics of the security services and cryptographic protocols. Learn the necessary skills for a secure system design and knowledge necessary to assess the security of a system. |
21 | Learning Outcomes: |
|
22 | Course Content: |
Week | Theoretical | Practical |
1 | Basic security notions: confidentiality, integrity, availability | |
2 | Security threats, hacking, social engineering, legal and social issues | |
3 | Operational and physical security issues, security policy formation and enforcement | |
4 | Basic concepts of cryptography: encryption, hash functions, public key encryption | |
5 | Authentication models: password-based, token-based, biometrics-based authentications | |
6 | Authorization models: discretionary access control, role based access control, mandatory access control | |
7 | Program security: malwares, basic notions of secure programming | |
8 | Program security: malwares, basic notions of secure programming | |
9 | Operating system security: protection models, security kernels, malware protection | |
10 | Operating system security: protection models, security kernels, malware protection | |
11 | Network security: firewalls, intrusion detection and response systems | |
12 | Network security: firewalls, intrusion detection and response systems | |
13 | Logging for security, auditing, log management in network environments | |
14 | Logging for security, auditing, log management in network environments |
23 | Textbooks, References and/or Other Materials: |
Charles R. Pleeger and Shari Lawrence Pfleeger, Security in Computing, Fourth Edition. Prentice Hall. Matt Bishop, Computer Security: Art and Science, Addison Wesley. Mark Stamp, Information Security: Principles and Practice, 2th Edition, Wiley. |
24 | Assesment |
TERM LEARNING ACTIVITIES | NUMBER | PERCENT |
Midterm Exam | 1 | 40 |
Quiz | 0 | 0 |
Homeworks, Performances | 0 | 0 |
Final Exam | 1 | 60 |
Total | 2 | 100 |
Contribution of Term (Year) Learning Activities to Success Grade | 40 | |
Contribution of Final Exam to Success Grade | 60 | |
Total | 100 | |
Measurement and Evaluation Techniques Used in the Course | written exam | |
Information |
25 | ECTS / WORK LOAD TABLE |
Activites | NUMBER | TIME [Hour] | Total WorkLoad [Hour] |
Theoretical | 14 | 3 | 42 |
Practicals/Labs | 0 | 0 | 0 |
Self Study and Preparation | 0 | 0 | 0 |
Homeworks, Performances | 0 | 0 | 0 |
Projects | 0 | 0 | 0 |
Field Studies | 0 | 0 | 0 |
Midtermexams | 1 | 60 | 60 |
Others | 0 | 0 | 0 |
Final Exams | 1 | 80 | 80 |
Total WorkLoad | 182 | ||
Total workload/ 30 hr | 6,07 | ||
ECTS Credit of the Course | 6 |
26 | CONTRIBUTION OF LEARNING OUTCOMES TO PROGRAMME QUALIFICATIONS | |||||||||||||||||||||
|
LO: Learning Objectives | PQ: Program Qualifications |
Contribution Level: | 1 Very Low | 2 Low | 3 Medium | 4 High | 5 Very High |