COURSE UNIT TITLE

: DATA SECURITY

Description of Individual Course Units

Course Unit Code Course Unit Title Type Of Course D U L ECTS
BIL 4106 DATA SECURITY ELECTIVE 3 0 0 5

Offered By

Computer Science

Level of Course Unit

First Cycle Programmes (Bachelor's Degree)

Course Coordinator

ASSISTANT PROFESSOR ERDEM ALKIM

Offered to

Computer Science

Course Objective

This course will give general information about system and data security and its applications. Included topics are risks and precisions, control and recovery methods, database security, encryption, authentication techniques, security manners based on main system and network, personal and physical security, laws and confidentiality issues, secure network design and implementation, response techniques to security violations, cryptographic mechanisms, security services and management, key management.

Learning Outcomes of the Course Unit

1   Have general information about data and computer security, policies of security, confidentiality, integrity and hybrid policies
2   Be able to implement methods of data encryption and decryption
3   Have information about authentication and representing identity
4   Be able to detect and control risks and gaps in a current system
5   Have information about network, system, user and program security concepts

Mode of Delivery

Face -to- Face

Prerequisites and Co-requisites

None

Recomended Optional Programme Components

None

Course Contents

Week Subject Description
1 Security concepts, introduction
2 Access Control Matrix
3 Security, Confidentiality and Integrity policies
4 Basic Cryptography
5 Public Key Cryptography, RSA
6 Key Management
7 Digital signatures
8 Recap
9 Cipher Techniques
10 Authentication
11 Representing Identity
12 Evaluating systems
13 Malicious Logic
14 Network and system security, User and program security

Recomended or Required Reading

Textbook(s): Stallings, W., Cryptography and Network Security: Principles and Practice, Prentice Hall, 2003.
Supplementary Book(s):
- Bishop, M., Introduction to Computer Security, Addison-Wesley, 2005
- Damgard, I., Lectures on Data Security, Springer , 1999.

Planned Learning Activities and Teaching Methods

The course is taught in a lecture, class presentation and discussion format. Besides the taught lecture, group presentations are to be prepared by the groups assigned and presented in a discussion session. In some weeks of the course, results of the homework given previously are discussed.

Assessment Methods

SORTING NUMBER SHORT CODE LONG CODE FORMULA
1 MTE MIDTERM EXAM
2 ASG ASSIGNMENT
3 FIN FINAL EXAM
4 FCG FINAL COURSE GRADE MTE * 0.30 + ASG * 0.30 + FIN * 0.40
5 RST RESIT
6 FCGR FINAL COURSE GRADE (RESIT) MTE * 0.30 + ASG * 0.30 + RST * 0.40


*** Resit Exam is Not Administered in Institutions Where Resit is not Applicable.

Further Notes About Assessment Methods

None

Assessment Criteria

To be announced.

Language of Instruction

Turkish

Course Policies and Rules

students will come to the class in time. Attending the 70% of the classes are mandotary.

Contact Details for the Lecturer(s)

erdem.alkim@deu.edu.tr

Office Hours

Will be announced.

Work Placement(s)

None

Workload Calculation

Activities Number Time (hours) Total Work Load (hours)
Lectures 13 3 39
Preparation for midterm exam 1 10 10
Preparations before/after weekly lectures 12 2 24
Preparing assignments 1 15 15
Preparation for final exam 1 30 30
Final 1 2 2
Midterm 1 2 2
TOTAL WORKLOAD (hours) 122

Contribution of Learning Outcomes to Programme Outcomes

PO/LOPO.1PO.2PO.3PO.4PO.5PO.6PO.7PO.8PO.9PO.10PO.11PO.12PO.13
LO.1423
LO.222234
LO.322234
LO.422234
LO.5323