Lesson plan / INTRODUCTION TO COMPUTER NETWORK SECURITY

Lesson Information

Course Credit 3.0
Course ECTS Credit 5.0
Teaching Language of Instruction Türkçe
Level of Course Bachelor's Degree, TYYÇ: Level 6, EQF-LLL: Level 6, QF-EHEA: First Cycle
Type of Course Faculty Elective
Mode of Delivery Face-to-face
Does the course require compulsory or optional work experience? F
Course Coordinator Prof. Dr. ALİ GÜNEŞ
Instructor (s)
Course Assistant

Purpose and Content

The aim of the course Objectives of the Course Unit The goal of Information Systems Security is to familiarize students with the security issues and technologies involved in modern information systems, including computer systems and networks. Students will gain an understanding of the various ways in which information systems can be attacked and tradeoffs in protecting networks. Students will gain an appreciation of the need to develop an understanding of underlying system applications and potential security issues early in the design process.
Course Content History of network security; Classical information security; Cryptosecurity; Kerberos for IP networks; Private and public keys; Nature of network security; Fundamental framework for network security; Analysis and performance impact of network topology;Vulnerabilities and security attack models in ATM, IP and mobile wireless networks; Security services, policies, and models; Trustworthy systems; Intrusion detection techniques - centralized and distributed; Emulation of attack models and performance assessment through behavior modeling and asynchronous distributed simulation; Principles of secure network design in the future; Projects in network security and student seminar presentations

Weekly Course Subjects

1Introduction
2Cryptography
3Topics in Information Systems Security
4Minimum privilege
5Compartmentalization
6Dual controls
7Security perimeters
8Midterm exam
9Single-points-of-failure
10Security models
11Kerberos Authentication
12Authentication in centralized systems
13Denial of Service attacks
14Security Protocols

Resources

-Bruce Schneier, “Secrets and Lies: Digital Security in a Networked World,” Wiley, ISBN 0-
471-25311-1
---, Applied Cryptography: Protocols, Algorithms, and Source Code in C,Wiley, ISBN 0-471-
11709-9.