Information
Code | CEN464 |
Name | Cyber Security |
Term | 2023-2024 Academic Year |
Semester | 8. Semester |
Duration (T+A) | 3-0 (T-A) (17 Week) |
ECTS | 6 ECTS |
National Credit | 3 National Credit |
Teaching Language | İngilizce |
Level | Lisans Dersi |
Type | Normal |
Mode of study | Yüz Yüze Öğretim |
Catalog Information Coordinator | Doç. Dr. FATİH ABUT |
Course Instructor |
Doç. Dr. FATİH ABUT
(A Group)
(Ins. in Charge)
|
Course Goal / Objective
This course introduces the fundamental principles of computer, web, and network security by studying attacks on computer systems and network. Students will learn how those attacks work and how to prevent them using a variety of security protocols, tools and architectures.
Course Content
Introduction to cryptography. Classification of threats, attackers and victims. Wireless security: WEP, WPA and WPA-2. Jamming attack detection and mitigation in wireless networks. Virtual private networks and tunneling. IPSec. SSL/TLS. SSH. Chip cards and RFID security. AAA protocols: Kerberos, Radius, TACACS. Secure E-Payment and iKP protocol family. Firewalls and intrusion detection systems. Model checking methods for security protocols.
Course Precondition
There are no prerequisites.
Resources
1. William Stallings , “Network Security Essentials”, 5th Edition, 2014
Notes
2. Kaufman, Perlman, and Speciner, “Network Security: Private Communication in a Public World”, 2nd Edition, 2002 3. Wu and Irwin, “Introduction to Computer Networks and Cybersecurity”, 2013
Course Learning Outcomes
Order | Course Learning Outcomes |
---|---|
LO01 | Ability to define cybersecurity and outline its major components. |
LO02 | Ability to encrypt and decrypt messages using block ciphers, sign and verify messages using well known signature generation and verification algorithms. |
LO03 | Ability to classify network security threats, attackers, and victims. |
LO04 | Ability to explain how various attacks work and how they are prevented. |
LO05 | Knowledge on how security protocols, policies and practices are developed. |
LO06 | Knowledge on the basics of firewalls, packet filtering and intrusion detection systems. |
LO07 | Knowledge on the basics of authentication protocols and processes. |
LO08 | Knowledge on the basics of blockchain protocols and processes. |
Relation with Program Learning Outcome
Order | Type | Program Learning Outcomes | Level |
---|---|---|---|
PLO01 | Bilgi - Kuramsal, Olgusal | Has capability in the fields of mathematics, science and computer that form the foundations of engineering | 3 |
PLO02 | Bilgi - Kuramsal, Olgusal | Identifies, formulates, and solves engineering problems, selects and applies appropriate analytical methods and modeling techniques, | 3 |
PLO03 | Bilgi - Kuramsal, Olgusal | Analyzes a system, its component, or process and designs under realistic constraints to meet the desired requirements,gains the ability to apply the methods of modern design accordingly. | 4 |
PLO04 | Bilgi - Kuramsal, Olgusal | Ability to use modern techniques and tools necessary for engineering practice and information technologies effectively. | 3 |
PLO05 | Bilgi - Kuramsal, Olgusal | Ability to design and to conduct experiments, to collect data, to analyze and to interpret results | 5 |
PLO06 | Bilgi - Kuramsal, Olgusal | Has ability to work effectively as an individual and in multi-disciplinary teams, take sresponsibility and builds self-confidence | 5 |
PLO07 | Beceriler - Bilişsel, Uygulamalı | Can access information,gains the ability to do resource research and uses information resources | 3 |
PLO08 | Beceriler - Bilişsel, Uygulamalı | Awareness of the requirement of lifelong learning, to follow developments in science and technology and continuous self-renewal ability | 2 |
PLO09 | Yetkinlikler - Bağımsız Çalışabilme ve Sorumluluk Alabilme Yetkinliği | Ability to communicate effectively orally and in writing, and to read and understand technical publications in at least one foreign language | 3 |
PLO10 | Yetkinlikler - Öğrenme Yetkinliği | Professional and ethical responsibility, | 3 |
PLO11 | Yetkinlikler - Öğrenme Yetkinliği | Awareness about project management, workplace practices, employee health, environmental and occupational safety, and the legal implications of engineering applications, | 4 |
PLO12 | Yetkinlikler - Öğrenme Yetkinliği | Becomes aware of universal and social effects of engineering solutions and applications, entrepreneurship and innovation, and knowledge of contemporary issues |
Week Plan
Week | Topic | Preparation | Methods |
---|---|---|---|
1 | Introduction to Cryptography | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
2 | Overview of Attacks: Goals and Motives | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
3 | Wireless Security Protocols: WEP, WPA and WPA-2 | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
4 | Detecting and Mitigating Jamming Attacks in Wireless Networks: Link 16 as a Case Study | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
5 | Virtual Private Network (VPN) and Tunneling | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
6 | IPSec: Internet Protocol Security | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
7 | SSL/TLS: Transport Layer Security | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
8 | Mid-Term Exam | Reading the lecture notes | Ölçme Yöntemleri: Yazılı Sınav |
9 | Secure Shell (SSH): Secure Remote Login and File Transfer | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
10 | Public Key Infrastructure (PKI) and Digital Certificates | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
11 | Chip Cards and RFID Security | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
12 | AAA (Authentication, Authorization and Accounting): Kerberos, Radius, TACACS | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
13 | iKP: A Family of Secure Electronic Payment Protocols | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
14 | Firewalls and Intrusion Detection Systems | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
15 | Model Checking Methods for Security Protocols and Blockchain Protocols | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
16 | Term Exams | Reading the lecture notes | Ölçme Yöntemleri: Yazılı Sınav |
17 | Term Exams | Reading the lecture notes | Ölçme Yöntemleri: Yazılı Sınav |
Student Workload - ECTS
Works | Number | Time (Hour) | Workload (Hour) |
---|---|---|---|
Course Related Works | |||
Class Time (Exam weeks are excluded) | 14 | 3 | 42 |
Out of Class Study (Preliminary Work, Practice) | 14 | 5 | 70 |
Assesment Related Works | |||
Homeworks, Projects, Others | 0 | 0 | 0 |
Mid-term Exams (Written, Oral, etc.) | 1 | 15 | 15 |
Final Exam | 1 | 30 | 30 |
Total Workload (Hour) | 157 | ||
Total Workload / 25 (h) | 6,28 | ||
ECTS | 6 ECTS |