>
Course Unit Title | Course Unit Code | Type of Course Unit | Level of Course Unit | Year of Study | Semester | ECTS Credits |
---|---|---|---|---|---|---|
Information Security Systems | BPP213 | Elective | Associate degree | 2 | Fall | 4 |
Lecturer Mustafa OF
1) Define the Information Technology (IT) security
2) Explain security principles (confidentiality, data integrity, continuity), threats and security vulnerability
3) Define risk management and security policies
4) State security controls and data encryption
5) Explain the concept of digital signatures and PKI
6) Define access control, identification, identity testing and authorization
7) Define IT security standards, methods of identification and authorization
8) Explain how user activities are monitored and explain communication security and security terms
Program Competencies | ||||||||||||||||
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | ||
Learning Outcomes | ||||||||||||||||
1 | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | |
2 | High | High | High | High | High | High | High | High | High | No relation | High | High | Middle | No relation | High | |
3 | High | High | High | High | High | High | High | High | High | High | High | High | High | No relation | High | |
4 | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High | |
5 | High | High | High | High | High | High | High | High | High | High | High | No relation | No relation | High | High | |
6 | High | High | High | High | High | High | High | High | High | High | High | No relation | High | High | High | |
7 | High | High | High | High | No relation | High | No relation | High | High | High | High | High | High | High | High | |
8 | High | High | High | High | High | High | High | High | High | High | High | High | High | High | High |
Face to Face
None
Operating System
This lecture covers the basic three principles of information technology security (confidentiality, data integrity and continuity).
1) Lecture
2) Question-Answer
3) Discussion
4) Drill and Practice
Contribution of Midterm Examination to Course Grade |
40% |
---|---|
Contribution of Final Examination to Course Grade |
60% |
Total |
100% |
Turkish
Not Required