BİLGİSAYAR PROGRAMCILIĞI
Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Ders Genel Tanıtım Bilgileri

Course Code: 2021221008
Ders İsmi: Computer Security
Ders Yarıyılı: Spring
Ders Kredileri:
Theoretical Practical Credit ECTS
3 0 3 5
Language of instruction: TR
Ders Koşulu:
Ders İş Deneyimini Gerektiriyor mu?: No
Type of course: Necessary
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery: Face to face
Course Coordinator : Öğr.Gör. Ayşenur ÖZTÜRK
Course Lecturer(s): Öğr.Gör. Ayşenur ÖZTÜRK
Course Assistants:

Dersin Amaç ve İçeriği

Course Objectives: The aim of this course is to provide students with knowledge about computer security, especially basic operating system security, security provision principles, and tools, platforms and applications used for security.
Course Content: This is a course on computer and operating system security in general. Topics include security concepts and principles, cryptographic building blocks, user authentication, authentication protocols and key generation, operating systems security, software security and trusted systems, malware, public-key certificate management, network security, firewalls, IT security management, bitcoin and blockchain, linux and windows security.

Learning Outcomes

The students who have succeeded in this course;
Learning Outcomes
1 - Knowledge
Theoretical - Conceptual
2 - Skills
Cognitive - Practical
3 - Competences
Communication and Social Competence
Learning Competence
Field Specific Competence
1) Sufficient knowledge of Confidentiality, Integrity and authentication.
2) Adequate knowledge of single and dual key encryption systems and authentication mechanisms.
3) Sufficient knowledge of security platforms, tools and applications such as Kerberos, PGP, IPSEC.
4) Adequate knowledge of network security issues, attacks and solutions.
Competence to Work Independently and Take Responsibility

Ders Akış Planı

Week Subject Related Preparation
1) Concepts and Principles of Computer Security 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
2) Cryptographic Building Blocks 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
3) User Authentication 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
4) Authentication Protocols and Key Generation 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
5) Operating Systems Security and Access Control 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
6) Software Security and Trusted Systems 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
7) Malicious Software 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
8) Midterm
9) Public-Key Certificate Management 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
10) Network Security 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
11) Firewalls 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
12) IT Security Management 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
13) Bitcoin and Blockchain 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
14) Linux and Windows Security 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4. 2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer. 3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
15) Final Exam

Sources

Course Notes / Textbooks: 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.
References: 1) Stallings, W. (2015). Cryptography and Network Security Principles and Practices, 4th edition, ISBN 0-13-187316-4.
2) van Oorschot, P. C. (2021). Computer Security and the internet: Tools and jewels from malware to bitcoin. Cham, Switzerland: Springer.
3) Aumasson, JP. (2018). Serious Cryptography. (First Edition). No Starch Press, ISBN-10: 1-59327-826-8.

Ders - Program Öğrenme Kazanım İlişkisi

Ders Öğrenme Kazanımları

1

2

3

4

Program Outcomes
1) To have the ability to apply knowledge in the fields of mathematics, science and programming to the development of software systems and the solution of problems related to computer programming.
2) To have the ability to analyze and model problems specific to the field of software systems development and computer programming, and to identify and define appropriate software requirements for their solutions.
3) Having the ability to design, develop and evaluate a software system, system part, process or program that will meet specified requirements.
4) Have the ability to develop software systems and use modern technical and programming tools for computer programming applications.
5) To have the discipline of software systems development and computer programming and the ability to demonstrate the necessary business skills to work effectively in interdisciplinary teams or individually.
6) To have the ability to develop software systems and apply approaches in the development of computer programs by applying analysis, design, implementation, verification, validation and maintenance processes.
7) To have awareness and awareness of professional, legal, ethical and social problems in the field of software and computer programming.

Ders - Öğrenme Kazanımı İlişkisi

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) To have the ability to apply knowledge in the fields of mathematics, science and programming to the development of software systems and the solution of problems related to computer programming. 3
2) To have the ability to analyze and model problems specific to the field of software systems development and computer programming, and to identify and define appropriate software requirements for their solutions. 1
3) Having the ability to design, develop and evaluate a software system, system part, process or program that will meet specified requirements. 1
4) Have the ability to develop software systems and use modern technical and programming tools for computer programming applications. 1
5) To have the discipline of software systems development and computer programming and the ability to demonstrate the necessary business skills to work effectively in interdisciplinary teams or individually. 1
6) To have the ability to develop software systems and apply approaches in the development of computer programs by applying analysis, design, implementation, verification, validation and maintenance processes. 3
7) To have awareness and awareness of professional, legal, ethical and social problems in the field of software and computer programming. 2

Öğrenme Etkinliği ve Öğretme Yöntemleri

Alan Çalışması
Akran Değerlendirmesi
Anlatım
Beyin fırtınası /Altı şapka
Bireysel çalışma ve ödevi
Course
Homework
Örnek olay çalışması
Web Tabanlı Öğrenme
Staj/Yerinde Uygulama

Ölçme ve Değerlendirme Yöntemleri ve Kriterleri

Yazılı Sınav (Açık uçlu sorular, çoktan seçmeli, doğru yanlış, eşleştirme, boşluk doldurma, sıralama)
Homework
Bireysel Proje
Bilgisayar Destekli Sunum

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
Midterms 1 % 40
Semester Final Exam 1 % 60
total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
total % 100

İş Yükü ve AKTS Kredisi Hesaplaması

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 4 56
Study Hours Out of Class 14 4 56
Midterms 1 15 15
Final 1 20 20
Total Workload 147