BBG661 - SYSTEM SECURITY

Course Name Code Semester Theory
(hours/week)
Application
(hours/week)
Credit ECTS
SYSTEM SECURITY BBG661 Any Semester/Year 3 0 3 6
PrequisitesNone
Course languageTurkish
Course typeElective 
Mode of DeliveryFace-to-Face 
Learning and teaching strategiesLecture
Discussion
Preparing and/or Presenting Reports
Problem Solving
Project Design/Management
 
Instructor (s)To be determined by the institute 
Course objectiveIn this course, system security concepts and methods will be taught to students and system vulnerabilities will be determined, suitable security solution on system level will be developed by students. 
Learning outcomes
  1. At the end of this course students will,
  2. Learn the fundamentals of system administration in a security perspective.
Course ContentIntroduction to Operating System Security,User management: UNIX/Windows users and groups ,Basic commands for system administration: UNIX, Windows,File system security: UNIX file permission bits, Windows ACL lists, UNIX service security: mail, nfs, nis, http, imap, pop3, rlogin, Windows services security: File sharing services, MS IIS, MS Exchange, Windows specific services, Windows Domain administration, Directory Services: OpenLDAP, Microsoft Active Directory, System log management: UNIX/Windows logs, Windows Registry, Desktop PC management in large networks: antivirus, firewall, nstallation, software updates, Antivirus, Anti-spyware, Anti-malware tools, system integrity checkers: tripwire, Network topology and vulnerability scanning, Basic network security configuration: Hosts, routers, firewalls, IDS/IPSes. 
References? Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, UNIX and Linux System Administration Handbook, 4th Edition, ISBN-13: 978-0131480056, Prentice Hall
? Matt Bishop, Computer Security: Art and Science, Addison Wesley.
? Charles R. Pleeger and Shari Lawrence Pfleeger, Security in Computing, Fourth Edition. Prentice Hall.
? Mark E. Russinovich, Aaron Margosis, Windows Sysinternals Administrator's Reference, Microsoft Press
 

Course outline weekly

WeeksTopics
Week 1Introduction to Course
Week 2Introduction to Operating System Security, User management: UNIX/Windows users and groups
Week 3Basic commands for system administration: UNIX, Windows, File system security: UNIX file permission bits, Windows ACL lists
Week 4UNIX service security: mail, nfs, nis, http, imap, pop3, rlogin
Week 5Windows services security: File sharing services, MS IIS, MS Exchange, Windows specific services
Week 6Windows Domain administration
Week 7Directory Services: OpenLDAP, Microsoft Active Directory
Week 8Midterm exam
Week 9System log management: UNIX/Windows logs, Windows Registry
Week 10Desktop PC management in large networks: antivirus, firewall installation, software updates
Week 11Antivirus, Anti-spyware, Anti-malware tools, system integrity checkers: tripwire
Week 12Network topology and vulnerability scanning
Week 13Basic network security configuration: Hosts, routers, firewalls, IDS/IPSes
Week 14Project Presentation
Week 15Project Presentation
Week 16Final exam

Assesment methods

Course activitiesNumberPercentage
Attendance00
Laboratory00
Application00
Field activities00
Specific practical training00
Assignments510
Presentation00
Project120
Seminar00
Midterms120
Final exam150
Total100
Percentage of semester activities contributing grade succes750
Percentage of final exam contributing grade succes150
Total100

WORKLOAD AND ECTS CALCULATION

Activities Number Duration (hour) Total Work Load
Course Duration (x14) 14 3 42
Laboratory 0 0 0
Application000
Specific practical training000
Field activities000
Study Hours Out of Class (Preliminary work, reinforcement, ect)10330
Presentation / Seminar Preparation000
Project14848
Homework assignment5210
Midterms (Study duration)12020
Final Exam (Study duration) 13030
Total Workload32106180

Matrix Of The Course Learning Outcomes Versus Program Outcomes

D.9. Key Learning OutcomesContrubition level*
12345
1. Has detailed knowledge of the basic areas of Information and Cyber Security.    X
2. Masters common themes and concepts such as encryption, digital signature, and security protocols.    X
3. Understands the ways in which theory and practice affect each other and the connections between them.  X  
4. Has the ability to think at different levels of abstraction and detail.    X
5. It solves any technical or scientific information security problem on its own and offers the most appropriate solution possible.    X
6. Aware that the field of information security and cyber security is developing rapidly and that security algorithms, vulnerabilities and attack types change over time.   X 
8. Is aware of social, legal, ethical and cultural issues regarding information security practices  X  
9. Knows the terminology in the field of cyber security.   X 
10. Can define research problems and conduct research using scientific methods to solve scientific problems.   X 

*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest