Course Name |
Information Security
|
Code
|
Semester
|
Theory
(hour/week) |
Application/Lab
(hour/week) |
Local Credits
|
ECTS
|
CE 607
|
Fall/Spring
|
3
|
0
|
3
|
7.5
|
Prerequisites |
None
|
|||||
Course Language |
English
|
|||||
Course Type |
Elective
|
|||||
Course Level |
Third Cycle
|
|||||
Mode of Delivery | - | |||||
Teaching Methods and Techniques of the Course | - | |||||
National Occupation Classification | - | |||||
Course Coordinator | ||||||
Course Lecturer(s) | ||||||
Assistant(s) | - |
Course Objectives | The aim of the course is to evaluate the current problems and researches about information security. The course also addresses incident response and provides a technical foundation for working with operating system, network and application security, and cryptography. At the end of the course the students should have the ability to do new researches on this area and the student should try to write an article about his/her study topic as term project. | |||||||||||||||||||||||||||||||||||||||||||||
Learning Outcomes |
|
|||||||||||||||||||||||||||||||||||||||||||||
Course Description | The objective of this course is to provide the fundamental concepts of information security, its framework and processes, and to provide insight into abstraction, problem solving and systematic view. |
|
Core Courses | |
Major Area Courses |
X
|
|
Supportive Courses | ||
Media and Management Skills Courses | ||
Transferable Skill Courses |
Week | Subjects | Related Preparation | Learning Outcome |
1 | Computer and Network Security Concepts | Course textbook Chapter 1 | |
2 | Introduction to Number Theory | Course textbook Chapter 2 | |
3 | Classical Encryption Techniques | Course textbook Chapter 3 | |
4 | Block Ciphers and DES | Course textbook Chapter 4 | |
5 | Finite Fields | Course textbook Chapter 5 | |
6 | AES | Course textbook Chapter 6 | |
7 | Block Cipher Operation | Course textbook Chapter 7 | |
8 | Random Bit Generation | Course textbook Chapter 8 | |
9 | Midterm Exam | ||
10 | Public Key Cryptography and RSA | Course textbook Chapter 9 | |
11 | Other Public Key Cryptosystems | Course textbook Chapter 10 | |
12 | Cryptographic Hash Functions | Course textbook Chapter 11 | |
13 | MAC | Course textbook Chapter 12 | |
14 | Digital Signatures | Course textbook Chapter 13 | |
15 | Review of the Semester | - | |
16 | Final Exam | - |
Course Notes/Textbooks | Cryptography And Network Security, 7th Edition, 2017. William Stallings | Pearson | ISBN-10: 9789332585225 |
Suggested Readings/Materials | Principals of Information Security, Whitman and Mattord, 6th Ed, Cengage Learning, 2018 Computer and Information Security Handbook, 3rd Ed, John R. Vacca, Elsevier, 2017 Computer Security: Art and Science, By Matt Bishop, 2002, Addison-Wesley Professional. Security in Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger, 2006, Prentice Hall. The Psychology of Security, By Bruce Schneier, January 18, 2008, http://www.schneier.com/essay-155.html. Information Security: Definitions, http://www.hancockonline.net/IS-defs.html Information Security: Standards Organizations, http://www.hancockonline.net/IS-std-o.html IEEE Transaction on Information Forensics and Security, http://www.ieee.org/organizations/society/sp/tifs.htm |
Semester Activities | Number | Weighting | LO 1 | LO 2 | LO 3 | LO 4 |
Participation | ||||||
Laboratory / Application | ||||||
Field Work | ||||||
Quizzes / Studio Critiques | ||||||
Portfolio | ||||||
Homework / Assignments | ||||||
Presentation / Jury | ||||||
Project |
1
|
40
|
||||
Seminar / Workshop | ||||||
Oral Exams | ||||||
Midterm |
1
|
20
|
||||
Final Exam |
1
|
40
|
||||
Total |
Weighting of Semester Activities on the Final Grade |
2
|
60
|
Weighting of End-of-Semester Activities on the Final Grade |
1
|
40
|
Total |
Semester Activities | Number | Duration (Hours) | Workload |
---|---|---|---|
Theoretical Course Hours (Including exam week: 16 x total hours) |
16
|
3
|
48
|
Laboratory / Application Hours (Including exam week: '.16.' x total hours) |
16
|
0
|
|
Study Hours Out of Class |
15
|
2
|
30
|
Field Work |
0
|
||
Quizzes / Studio Critiques |
0
|
||
Portfolio |
0
|
||
Homework / Assignments |
0
|
||
Presentation / Jury |
0
|
||
Project |
1
|
60
|
60
|
Seminar / Workshop |
0
|
||
Oral Exam |
0
|
||
Midterms |
1
|
29
|
29
|
Final Exam |
1
|
58
|
58
|
Total |
225
|
#
|
PC Sub | Program Competencies/Outcomes |
* Contribution Level
|
||||
1
|
2
|
3
|
4
|
5
|
|||
1 | Understands and applies the foundational theories of Computer Engineering in a high level. |
-
|
-
|
-
|
X
|
-
|
|
2 | Possesses a great depth and breadth of knowledge about Computer Engineering including the latest developments. |
-
|
-
|
-
|
-
|
X
|
|
3 | Can reach the latest information in Computer Engineering and possesses a high level of proficiency in the methods and abilities necessary to comprehend it and conduct research with it. |
-
|
-
|
-
|
X
|
-
|
|
4 | Conducts a comprehensive study that introduces innovation to science and technology, develops a new scientific procedure or a technological product/process, or applies a known method in a new field. |
-
|
-
|
-
|
-
|
X
|
|
5 | Independently understands, designs, implements and concludes a unique research process in addition to managing it. |
-
|
-
|
-
|
X
|
-
|
|
6 | Contributes to science and technology literature by publishing the output of his/her academic studies in respectable academic outlets. |
-
|
-
|
-
|
X
|
-
|
|
7 | Interprets scientific, technological, social and cultural developments and relates them to the general public with a commitment to scientific objectivity and ethical responsibility. |
-
|
-
|
-
|
-
|
X
|
|
8 | Performs critical analysis, synthesis and evaluation of ideas and developments in Computer Engineering. |
-
|
-
|
-
|
X
|
-
|
|
9 | Performs verbal and written communications with professionals as well as broader scientific and social communities in Computer Engineering, by using English at least at the European Language Portfolio C1 General level, performs written, oral and visual communications and discussions in a high level. |
-
|
-
|
-
|
-
|
X
|
|
10 | Develops strategies, policies and plans about systems and topics that Computer Engineering uses, and interprets the outcomes. |
-
|
-
|
-
|
-
|
X
|
*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest
As Izmir University of Economics transforms into a world-class university, it also raises successful young people with global competence.
More..Izmir University of Economics produces qualified knowledge and competent technologies.
More..Izmir University of Economics sees producing social benefit as its reason for existence.
More..