BBG661 - SYSTEM SECURITY
Course Name | Code | Semester | Theory (hours/week) |
Application (hours/week) |
Credit | ECTS |
---|---|---|---|---|---|---|
SYSTEM SECURITY | BBG661 | Any Semester/Year | 3 | 0 | 3 | 6 |
Prequisites | None | |||||
Course language | Turkish | |||||
Course type | Elective | |||||
Mode of Delivery | Face-to-Face | |||||
Learning and teaching strategies | Lecture Discussion Preparing and/or Presenting Reports Problem Solving Project Design/Management | |||||
Instructor (s) | To be determined by the institute | |||||
Course objective | In this course, system security concepts and methods will be taught to students and system vulnerabilities will be determined, suitable security solution on system level will be developed by students. | |||||
Learning outcomes |
| |||||
Course Content | Introduction to Operating System Security,User management: UNIX/Windows users and groups ,Basic commands for system administration: UNIX, Windows,File system security: UNIX file permission bits, Windows ACL lists, UNIX service security: mail, nfs, nis, http, imap, pop3, rlogin, Windows services security: File sharing services, MS IIS, MS Exchange, Windows specific services, Windows Domain administration, Directory Services: OpenLDAP, Microsoft Active Directory, System log management: UNIX/Windows logs, Windows Registry, Desktop PC management in large networks: antivirus, firewall, nstallation, software updates, Antivirus, Anti-spyware, Anti-malware tools, system integrity checkers: tripwire, Network topology and vulnerability scanning, Basic network security configuration: Hosts, routers, firewalls, IDS/IPSes. | |||||
References | ? Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, UNIX and Linux System Administration Handbook, 4th Edition, ISBN-13: 978-0131480056, Prentice Hall ? Matt Bishop, Computer Security: Art and Science, Addison Wesley. ? Charles R. Pleeger and Shari Lawrence Pfleeger, Security in Computing, Fourth Edition. Prentice Hall. ? Mark E. Russinovich, Aaron Margosis, Windows Sysinternals Administrator's Reference, Microsoft Press |
Course outline weekly
Weeks | Topics |
---|---|
Week 1 | Introduction to Course |
Week 2 | Introduction to Operating System Security, User management: UNIX/Windows users and groups |
Week 3 | Basic commands for system administration: UNIX, Windows, File system security: UNIX file permission bits, Windows ACL lists |
Week 4 | UNIX service security: mail, nfs, nis, http, imap, pop3, rlogin |
Week 5 | Windows services security: File sharing services, MS IIS, MS Exchange, Windows specific services |
Week 6 | Windows Domain administration |
Week 7 | Directory Services: OpenLDAP, Microsoft Active Directory |
Week 8 | Midterm exam |
Week 9 | System log management: UNIX/Windows logs, Windows Registry |
Week 10 | Desktop PC management in large networks: antivirus, firewall installation, software updates |
Week 11 | Antivirus, Anti-spyware, Anti-malware tools, system integrity checkers: tripwire |
Week 12 | Network topology and vulnerability scanning |
Week 13 | Basic network security configuration: Hosts, routers, firewalls, IDS/IPSes |
Week 14 | Project Presentation |
Week 15 | Project Presentation |
Week 16 | Final exam |
Assesment methods
Course activities | Number | Percentage |
---|---|---|
Attendance | 0 | 0 |
Laboratory | 0 | 0 |
Application | 0 | 0 |
Field activities | 0 | 0 |
Specific practical training | 0 | 0 |
Assignments | 5 | 10 |
Presentation | 0 | 0 |
Project | 1 | 20 |
Seminar | 0 | 0 |
Midterms | 1 | 20 |
Final exam | 1 | 50 |
Total | 100 | |
Percentage of semester activities contributing grade succes | 7 | 50 |
Percentage of final exam contributing grade succes | 1 | 50 |
Total | 100 |
WORKLOAD AND ECTS CALCULATION
Activities | Number | Duration (hour) | Total Work Load |
---|---|---|---|
Course Duration (x14) | 14 | 3 | 42 |
Laboratory | 0 | 0 | 0 |
Application | 0 | 0 | 0 |
Specific practical training | 0 | 0 | 0 |
Field activities | 0 | 0 | 0 |
Study Hours Out of Class (Preliminary work, reinforcement, ect) | 10 | 3 | 30 |
Presentation / Seminar Preparation | 0 | 0 | 0 |
Project | 1 | 48 | 48 |
Homework assignment | 5 | 2 | 10 |
Midterms (Study duration) | 1 | 20 | 20 |
Final Exam (Study duration) | 1 | 30 | 30 |
Total Workload | 32 | 106 | 180 |
Matrix Of The Course Learning Outcomes Versus Program Outcomes
D.9. Key Learning Outcomes | Contrubition level* | ||||
---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | |
1. Has detailed knowledge of the basic areas of Information and Cyber Security. | X | ||||
2. Masters common themes and concepts such as encryption, digital signature, and security protocols. | X | ||||
3. Understands the ways in which theory and practice affect each other and the connections between them. | X | ||||
4. Has the ability to think at different levels of abstraction and detail. | X | ||||
5. It solves any technical or scientific information security problem on its own and offers the most appropriate solution possible. | X | ||||
6. Aware that the field of information security and cyber security is developing rapidly and that security algorithms, vulnerabilities and attack types change over time. | X | ||||
8. Is aware of social, legal, ethical and cultural issues regarding information security practices | X | ||||
9. Knows the terminology in the field of cyber security. | X | ||||
10. Can define research problems and conduct research using scientific methods to solve scientific problems. | X |
*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest