>
Course Unit Title | Course Unit Code | Type of Course Unit | Level of Course Unit | Year of Study | Semester | ECTS Credits |
---|---|---|---|---|---|---|
Data Hiding | YZM434 | Elective | Bachelor's degree | 4 | Spring | 5 |
Associate Prof. Dr. Mehmet Zeki KONYAR
1) Learns the goals, principles and main criteria of information security.
2) Learn and apply the basic concepts of cryptography and encryption systems.
3) Knows the types of cryptanalysis.
4) Knows symmetric, asymmetric encryption systems, hash algorithms.
5) Gains knowledge of public key infrastructure, discrete logarithms, digital signatures.
6) Gains knowledge of access control systems, communication, network and internet security.
7) Learns security management, application development security and business continuity planning.
Program Competencies | |||||||||||||
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | ||
Learning Outcomes | |||||||||||||
1 | High | No relation | Low | Low | No relation | No relation | High | Middle | No relation | No relation | Middle | No relation | |
2 | High | No relation | Low | Low | No relation | No relation | High | Low | No relation | No relation | Low | No relation | |
3 | High | No relation | Low | Low | No relation | No relation | High | Low | No relation | No relation | Low | No relation | |
4 | Middle | No relation | Low | Low | No relation | No relation | High | Low | No relation | No relation | Low | No relation | |
5 | Middle | No relation | Low | Low | No relation | No relation | High | Low | No relation | No relation | Low | No relation | |
6 | Middle | No relation | Low | Low | No relation | No relation | High | Low | No relation | No relation | Low | No relation | |
7 | Middle | Middle | Middle | Middle | No relation | No relation | High | Low | Low | No relation | Middle | No relation |
Face to Face
None
Not Required
Introduction of information, security and computer security issues, Information Security, Information security problems, Security methods, Data hiding methods: Encryption methods, Fundamentals and types of encryption methods, Symmetric and asymmetric encryption methods, Linearity, Identity hooking, e-signature, Public keying infrastructure, Attack methods and countermeasures, Security classifications and standards.
Turkish
Not Required