Information
Code | CEN464 |
Name | Cyber Security |
Term | 2024-2025 Academic Year |
Semester | 8. Semester |
Duration (T+A) | 3-0 (T-A) (17 Week) |
ECTS | 6 ECTS |
National Credit | 3 National Credit |
Teaching Language | İngilizce |
Level | Lisans Dersi |
Type | Normal |
Mode of study | Yüz Yüze Öğretim |
Catalog Information Coordinator | Doç. Dr. FATİH ABUT |
Course Instructor |
1 2 |
Course Goal / Objective
This course introduces the fundamental principles of computer, web, and network security by studying attacks on computer systems and network. Students will learn how those attacks work and how to prevent them using a variety of security protocols, tools and architectures.
Course Content
Introduction to cryptography. Classification of threats, attackers and victims. Wireless security: WEP, WPA and WPA-2. Jamming attack detection and mitigation in wireless networks. Virtual private networks and tunneling. IPSec. SSL/TLS. SSH. Chip cards and RFID security. AAA protocols: Kerberos, Radius, TACACS. Secure E-Payment and iKP protocol family. Firewalls and intrusion detection systems. Model checking methods for security protocols.
Course Precondition
There are no prerequisites.
Resources
1. William Stallings , “Network Security Essentials”, 5th Edition, 2014
Notes
2. Kaufman, Perlman, and Speciner, “Network Security: Private Communication in a Public World”, 2nd Edition, 2002 3. Wu and Irwin, “Introduction to Computer Networks and Cybersecurity”, 2013
Course Learning Outcomes
Order | Course Learning Outcomes |
---|---|
LO01 | Ability to define cybersecurity and outline its major components. |
LO02 | Ability to encrypt and decrypt messages using block ciphers, sign and verify messages using well known signature generation and verification algorithms. |
LO03 | Ability to classify network security threats, attackers, and victims. |
LO04 | Ability to explain how various attacks work and how they are prevented. |
LO05 | Knowledge on how security protocols, policies and practices are developed. |
LO06 | Knowledge on the basics of firewalls, packet filtering and intrusion detection systems. |
LO07 | Knowledge on the basics of authentication protocols and processes. |
LO08 | Knowledge on the basics of blockchain protocols and processes. |
Relation with Program Learning Outcome
Order | Type | Program Learning Outcomes | Level |
---|---|---|---|
PLO01 | Bilgi - Kuramsal, Olgusal | Adequate knowledge of mathematics, science and related engineering disciplines; ability to use theoretical and applied knowledge in these fields in solving complex engineering problems. | 3 |
PLO02 | Bilgi - Kuramsal, Olgusal | Ability to identify, formulate and solve complex engineering problems; ability to select and apply appropriate analysis and modeling methods for this purpose. | 3 |
PLO03 | Bilgi - Kuramsal, Olgusal | Ability to design a complex system, process, device or product to meet specific requirements under realistic constraints and conditions; ability to apply modern design methods for this purpose. | 4 |
PLO04 | Bilgi - Kuramsal, Olgusal | Ability to select and use modern techniques and tools necessary for the analysis and solution of complex problems encountered in engineering practice; ability to use information technologies effectively. | 3 |
PLO05 | Bilgi - Kuramsal, Olgusal | Ability to design and conduct experiments, collect data, analyze and interpret results to investigate complex engineering problems or discipline-specific research topics. | 5 |
PLO06 | Bilgi - Kuramsal, Olgusal | Ability to work effectively in interdisciplinary and multidisciplinary teams; individual working skills. | 5 |
PLO07 | Bilgi - Kuramsal, Olgusal | Ability to communicate effectively verbally and in writing; knowledge of at least one foreign language; ability to write effective reports and understand written reports, prepare design and production reports, make effective presentations, and give and receive clear and understandable instructions. | 3 |
PLO08 | Bilgi - Kuramsal, Olgusal | Awareness of the necessity of lifelong learning; ability to access information, follow developments in science and technology, and constantly renew oneself. | 2 |
PLO09 | Bilgi - Kuramsal, Olgusal | Knowledge of ethical principles, professional and ethical responsibility, and standards used in engineering practice. | 3 |
PLO10 | Bilgi - Kuramsal, Olgusal | Knowledge of business practices such as project management, risk management and change management; awareness of entrepreneurship and innovation; knowledge of sustainable development. | 3 |
PLO11 | Bilgi - Kuramsal, Olgusal | Knowledge of the effects of engineering practices on health, environment and safety in universal and social dimensions and the problems of the age reflected in the field of engineering; awareness of the legal consequences of engineering solutions. | 4 |
Week Plan
Week | Topic | Preparation | Methods |
---|---|---|---|
1 | Introduction to Cryptography | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
2 | Overview of Attacks: Goals and Motives | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
3 | Wireless Security Protocols: WEP, WPA and WPA-2 | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
4 | Detecting and Mitigating Jamming Attacks in Wireless Networks: Link 16 as a Case Study | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
5 | Virtual Private Network (VPN) and Tunneling | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
6 | IPSec: Internet Protocol Security | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
7 | SSL/TLS: Transport Layer Security | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
8 | Mid-Term Exam | Reading the lecture notes | Ölçme Yöntemleri: Yazılı Sınav |
9 | Secure Shell (SSH): Secure Remote Login and File Transfer | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
10 | Public Key Infrastructure (PKI) and Digital Certificates | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
11 | Chip Cards and RFID Security | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
12 | AAA (Authentication, Authorization and Accounting): Kerberos, Radius, TACACS | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
13 | iKP: A Family of Secure Electronic Payment Protocols | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
14 | Firewalls and Intrusion Detection Systems | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
15 | Model Checking Methods for Security Protocols and Blockchain Protocols | Reading the lecture notes | Öğretim Yöntemleri: Anlatım, Soru-Cevap, Tartışma |
16 | Term Exams | Reading the lecture notes | Ölçme Yöntemleri: Yazılı Sınav |
17 | Term Exams | Reading the lecture notes | Ölçme Yöntemleri: Yazılı Sınav |
Student Workload - ECTS
Works | Number | Time (Hour) | Workload (Hour) |
---|---|---|---|
Course Related Works | |||
Class Time (Exam weeks are excluded) | 14 | 3 | 42 |
Out of Class Study (Preliminary Work, Practice) | 14 | 5 | 70 |
Assesment Related Works | |||
Homeworks, Projects, Others | 0 | 0 | 0 |
Mid-term Exams (Written, Oral, etc.) | 1 | 15 | 15 |
Final Exam | 1 | 30 | 30 |
Total Workload (Hour) | 157 | ||
Total Workload / 25 (h) | 6,28 | ||
ECTS | 6 ECTS |