Computer Security(INF471)
Course Code | Course Name | Semester | Theory | Practice | Lab | Credit | ECTS |
---|---|---|---|---|---|---|---|
INF471 | Computer Security | 7 | 2 | 0 | 2 | 3 | 4 |
Prerequisites | INF334 |
Admission Requirements | INF334 |
Language of Instruction | French |
Course Type | Compulsory |
Course Level | Bachelor Degree |
Course Instructor(s) | MURAT AKIN murakin@gsu.edu.tr (Email) |
Assistant | |
Objective | The objective of this course is to convey the students the principles of the information security. The contents of the course includes both the technology of the security utilities and the application methods of the security concept in accordance with the human factor. |
Content |
Week 1. Introduction to the information security: Security principles: confidentiality, data integrity, persistence. Menaces, security holes, risk factors. Week 2. Administrative measures, risk management, security norms. Security policies and procedures. Audit. Week 3. Single key cryptography I: Examination of classical techniques. Week 4. Single key cryptography II: Examination of classical techniques (cont.). Week 5. Single key cryptography III: Examination of modern techniques. Week 6. Asymmetrical cryptography systems I: Design principles, number theory. Week 7. Asymmetrical cryptography systems I: Key management. Week 8. Mid-term exam Week 9. Asymmetrical cryptography systems II: Hash functions, digital signatures. Week 10. Asymmetrical cryptography systems III: Identity tests with digital signatures. Week 11. Network security: E-mail security, firewalls. Week 12. Network security: IP security. Week 13. Security of web applications. Week 14. Security in the systems of cloud computing |
Course Learning Outcomes |
1. Understanding the fundamental principles upon which the information security bases. 2. Understanding the operation principles of the symmetrical cryptography algorithms. 3. Determining the security requirements of a system. 4. Obtaining ability to realize the security mechanisms with the security applications in hand. 5. Understanding the theoretical foundations of the asymmetrical cryptography systems. |
Teaching and Learning Methods | Oral presentation, discussion, Q&A |
References |
- Course notes - William Stallings, Cryptography and Network Security: Principles and Practice, 5/E Prentice Hall |
Theory Topics
Week | Weekly Contents |
---|
Practice Topics
Week | Weekly Contents |
---|
Contribution to Overall Grade
Number | Contribution | |
---|---|---|
Toplam | 0 | 0 |
In-Term Studies
Number | Contribution | |
---|---|---|
Toplam | 0 | 0 |
No | Program Learning Outcomes | Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 |
Activities | Number | Period | Total Workload |
---|---|---|---|
Total Workload | 0 | ||
Total Workload / 25 | 0,00 | ||
Credits ECTS | 0 |