>
Course Unit Title Course Unit Code Type of Course Unit Level of Course Unit Year of Study Semester ECTS Credits
Information Security Systems BPP213 Elective Associate degree 2 Fall 4

Name of Lecturer(s)

Lecturer Mustafa OF

Learning Outcomes of the Course Unit

1) Define the Information Technology (IT) security
2) Explain security principles (confidentiality, data integrity, continuity), threats and security vulnerability
3) Define risk management and security policies
4) State security controls and data encryption
5) Explain the concept of digital signatures and PKI
6) Define access control, identification, identity testing and authorization
7) Define IT security standards, methods of identification and authorization
8) Explain how user activities are monitored and explain communication security and security terms

Program Competencies-Learning Outcomes Relation

  Program Competencies
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Learning Outcomes
1 High High High High High High High High High High High High High High High
2 High High High High High High High High High No relation High High Middle No relation High
3 High High High High High High High High High High High High High No relation High
4 High High High High High High High High High High High High High High High
5 High High High High High High High High High High High No relation No relation High High
6 High High High High High High High High High High High No relation High High High
7 High High High High No relation High No relation High High High High High High High High
8 High High High High High High High High High High High High High High High

Mode of Delivery

Face to Face

Prerequisites and Co-Requisites

None

Recommended Optional Programme Components

Operating System

Course Contents

This lecture covers the basic three principles of information technology security (confidentiality, data integrity and continuity).

Weekly Schedule

1) What is information security?
2) Security principles, confidentiality, data integrity, continuity
3) Threats, security vulnerability
4) Information security technologies
5) Risk management and security policies
6) Security controls
7) Cryptography, symmetric algorithms, asymmetric algorithms, abstraction functions
8) Midterm examination/Assessment
9) Access control, identification, identity testing, authorization
10) Information Technology security standards
11) Identification and authorization methods
12) Encryption of data
13) Monitoring of user activity
14) Communication security, security terms
15) Communication security, security terms
16) Final examination

Recommended or Required Reading

Planned Learning Activities and Teaching Methods

1) Lecture
2) Question-Answer
3) Discussion
4) Drill and Practice


Assessment Methods and Criteria

Contribution of Midterm Examination to Course Grade

40%

Contribution of Final Examination to Course Grade

60%

Total

100%

Language of Instruction

Turkish

Work Placement(s)

Not Required