BBG646 - CYBERSECURITY: ETHICS, LAWS and HUMAN ASPECT
Course Name | Code | Semester | Theory (hours/week) |
Application (hours/week) |
Credit | ECTS |
---|---|---|---|---|---|---|
CYBERSECURITY: ETHICS, LAWS and HUMAN ASPECT | BBG646 | Any Semester/Year | 3 | 0 | 3 | 6 |
Prequisites | None | |||||
Course language | Turkish | |||||
Course type | Elective | |||||
Mode of Delivery | Face-to-Face | |||||
Learning and teaching strategies | Lecture Discussion Preparing and/or Presenting Reports Problem Solving Project Design/Management | |||||
Instructor (s) | To be determined by the institute | |||||
Course objective | In this course, cyber space, cyber attack types and cyber defense mechanisms and solutions will be taught by considering technical, ethical and legal issues in detail. | |||||
Learning outcomes |
| |||||
Course Content | Security Policies, Risk Analysis, Ethics, Physical Threats, and Controls, Information Technology Security Structures, Computer Programs and Data Security (copyright, patents), Authentication, Secure Design Principles, Related Laws, Practices, Standards, Privacy, Information and Informatics Crimes, Case Studies, Human Aspects. | |||||
References | ? Micheal T. Simpson, Kent Backman, James Corley, Hands-On Ethical Hacking and Network Defense, Cengage Learning, 2010. |
Course outline weekly
Weeks | Topics |
---|---|
Week 1 | Introduction to Cyber World and Cyber Attacks |
Week 2 | Cyber Security Policies, Risk Analysis |
Week 3 | Ethics, Physical Threats, and Controls |
Week 4 | Information Technology Security Structures, Computer Programs and Data Security (copyright, patents), Authentication |
Week 5 | Secure Design Principles |
Week 6 | Related Laws |
Week 7 | Practices |
Week 8 | Midterm exam |
Week 9 | Standards |
Week 10 | Privacy |
Week 11 | Information and Informatics Crimes |
Week 12 | Case Studies |
Week 13 | Human Aspects |
Week 14 | Project Presentation |
Week 15 | Project Presentation |
Week 16 | Final exam |
Assesment methods
Course activities | Number | Percentage |
---|---|---|
Attendance | 0 | 0 |
Laboratory | 0 | 0 |
Application | 0 | 0 |
Field activities | 0 | 0 |
Specific practical training | 0 | 0 |
Assignments | 5 | 10 |
Presentation | 0 | 0 |
Project | 1 | 20 |
Seminar | 0 | 0 |
Midterms | 1 | 20 |
Final exam | 1 | 50 |
Total | 100 | |
Percentage of semester activities contributing grade succes | 7 | 50 |
Percentage of final exam contributing grade succes | 1 | 50 |
Total | 100 |
WORKLOAD AND ECTS CALCULATION
Activities | Number | Duration (hour) | Total Work Load |
---|---|---|---|
Course Duration (x14) | 14 | 3 | 42 |
Laboratory | 0 | 0 | 0 |
Application | 0 | 0 | 0 |
Specific practical training | 0 | 0 | 0 |
Field activities | 0 | 0 | 0 |
Study Hours Out of Class (Preliminary work, reinforcement, ect) | 10 | 3 | 30 |
Presentation / Seminar Preparation | 0 | 0 | 0 |
Project | 1 | 48 | 48 |
Homework assignment | 5 | 2 | 10 |
Midterms (Study duration) | 1 | 20 | 20 |
Final Exam (Study duration) | 1 | 30 | 30 |
Total Workload | 32 | 106 | 180 |
Matrix Of The Course Learning Outcomes Versus Program Outcomes
D.9. Key Learning Outcomes | Contrubition level* | ||||
---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | |
1. Has detailed knowledge of the basic areas of Information and Cyber Security. | X | ||||
2. Masters common themes and concepts such as encryption, digital signature, and security protocols. | X | ||||
3. Understands the ways in which theory and practice affect each other and the connections between them. | X | ||||
4. Has the ability to think at different levels of abstraction and detail. | X | ||||
5. It solves any technical or scientific information security problem on its own and offers the most appropriate solution possible. | X | ||||
6. Aware that the field of information security and cyber security is developing rapidly and that security algorithms, vulnerabilities and attack types change over time. | X | ||||
8. Is aware of social, legal, ethical and cultural issues regarding information security practices | X | ||||
9. Knows the terminology in the field of cyber security. | X | ||||
10. Can define research problems and conduct research using scientific methods to solve scientific problems. | X |
*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest