This course includes advanced technologies and concepts on computer and network security. In this course, students will learn the similarities and differences between computer security and computer crimes. It will be focused on the important points to provide computer security, advanced technologies will be introduced and theoretical studies related to this area will be emphasized. Due to the increasing computer and cyber crimes and spreading wide network of internet, this course will be useful for students who want to study and work on this area.
Prerequisite(s)
-
Corequisite(s)
none
Special Requisite(s)
-
Instructor(s)
Course Assistant(s)
-
Schedule
The course is not opened for this semester.
Office Hour(s)
The course is not opened for this semester.
Teaching Methods and Techniques
-Visual presentations,in class lectures,discussions, question-answer, project work
Principle Sources
-Lecture notes
-A Guide to Computer Network Security(Joseph Migga Kizza, Springer-Verlag London Limited / ISBN 978-1-84800-916-5 )
Other Sources
--Network Security(Scott C.-H. Huang, David MacCallum, Ding-Zhu Du, Springer New York Dordrecht Heidelberg London / ISBN 978-0-387-73820-8)
Course Schedules
Week
Contents
Learning Methods
1. Week
Information (Computer) Forensics and History
Oral presentation
2. Week
Modern Cryptography and Its Applications
Oral presentation
3. Week
Security Technologies Approaches
Oral presentation
4. Week
Network Security (Network Vulnerability Analysis, Protocol Vulnerability Analysis, Network Applications Vulnerability Analysis, Firewall, Intrusion Detection and Prevention Systems etc.)
Oral presentation
5. Week
Peer to Peer Security
Oral presentation
6. Week
Security in Networking Applications
Oral presentation
7. Week
Security Issues in Private Networks and ISP Networks
Oral presentation, Project
8. Week
Security and Privacy in Multimedia Applications (IPTV, VoIP etc.)
Oral presentation
9. Week
Web Security(Web Applications Vulnerability Analysis, Browser Security, Internet Security)
Oral presentation
10. Week
Security and Privacy in Wireless Networks (Ad Hoc and Sensor Networks Security, WiFi, 3G, 4G, WIMAX etc.)
Oral presentation
11. Week
Security and Privacy in Mobile Networks and Services
Oral presentation
12. Week
Secure Cloud Computing
Oral presentation
13. Week
Security in Smart Technologies (RFID Security, RFID e-Passports Security, Security on Smartcards)
Oral presentation
14. Week
E-Commerce and E-Government Security, Security on Social Engineering Applications
Oral presentation, Project
15. Week
16. Week
17. Week
Assessments
Evaluation tools
Quantity
Weight(%)
Midterm(s)
1
25
Homework / Term Projects / Presentations
1
10
Project(s)
2
15
Final Exam
1
50
Program Outcomes
PO-1
Adequate knowledge in mathematics, science and engineering subjects pertaining to the relevant discipline; ability to use theoretical and applied information in these areas to model and solve engineering problems.
PO-2
Ability to identify, formulate, and solve complex engineering problems; ability to select and apply proper analysis and modelling methods for this purpose.
PO-3
Ability to design a complex system, process, device or product under realistic constraints and conditions, in such a way so as to meet the desired result; ability to apply modern design methods for this purpose. (Realistic constraints and conditions may include factors such as economic and environmental issues, sustainability, manufacturability, ethics, health, safety issues, and social and political issues according to the nature of the design.)
PO-4
Ability to devise, select, and use modern techniques and tools needed for engineering practice; ability to employ information technologies effectively.
PO-5
Ability to design and conduct experiments, gather data, analyse and interpret results for investigating engineering problems.
PO-6
Ability to work efficiently in intra-disciplinary and multi-disciplinary teams; ability to work individually.
PO-7
Ability to communicate effectively, both orally and in writing; knowledge of a minimum of one foreign language.
PO-8
Recognition of the need for lifelong learning; ability to access information, to follow developments in science and technology, and to continue to educate him/herself.
PO-9
Awareness of professional and ethical responsibility.
PO-10
Information about business life practices such as project management, risk management, and change management; awareness of entrepreneurship, innovation, and sustainable development.
PO-11
Knowledge about contemporary issues and the global and societal effects of engineering practices on health, environment, and safety; awareness of the legal consequences of engineering solutions.
Learning Outcomes
LO-1
Understands basic information about computer and network security.
LO-2
Evaluates cryptography algorithms.
LO-3
Makes criticism on encryption mechanisms.
LO-4
Developes new perpective on how to make security process on messages and digital signatures.
LO-5
Makes criticism on communication security.
LO-6
Understands the authentication protocols.
LO-7
Understands the e-mail and Web security.
LO-8
Understands the security issues of wireless networks and optical networks