| Ders Adı | Kodu | Yarıyıl | T+U Saat | Kredi | AKTS |
|---|---|---|---|---|---|
| Informatics Security and Ethics | SAU 209 | 0 | 1 + 0 | 2 | 2 |
| Ön Koşul Dersleri | |
| Önerilen Seçmeli Dersler | |
| Dersin Dili | Türkçe |
| Dersin Seviyesi | Lisans |
| Dersin Türü | Seçmeli |
| Dersin Koordinatörü | Prof.Dr. MEHMET BARIŞ HORZUM |
| Dersi Verenler | |
| Dersin Yardımcıları | Öğr. Gör. Aydın KİPER |
| Dersin Kategorisi | Alanına Uygun Öğretim |
| Dersin Amacı | Information security and ethics to gain the necessary knowledge and skills. |
| Dersin İçeriği | In the contents of this lecture; common concepts such as Network, Ethernet, protocols, IP address and methods of coding will be discussed. In addition, subjects such as cyber-attacks and methods of cyber- attacks, virtual securıty, risk management and network securıty will be discussed . |
| Kalkınma Amaçları |
|---|
|
| # | Ders Öğrenme Çıktıları | Öğretim Yöntemleri | Ölçme Yöntemleri |
|---|---|---|---|
| 1 | 1) Describing LAN and Ethernet | Lecture, Question-Answer, Brain Storming, | |
| 2 | 2) Describing Protocol and Port Concepts | Lecture, Question-Answer, Brain Storming, | |
| 3 | 3) Creating Methods of attack and abuse | Lecture, Question-Answer, | |
| 4 | 4) Describing Internet Protocol (IP) | Lecture, Question-Answer, Discussion, | True False Tests, Gap Fill Tests, Short Answer Tests, |
| 5 | 5) Evaluating Corporate Network Security | Lecture, Question-Answer, Observation, | True False Tests, Gap Fill Tests, Short Answer Tests, |
| 6 | 6) Evaluating Cyber Security and Risk Management | Lecture, Question-Answer, Discussion, | True False Tests, Gap Fill Tests, Short Answer Tests, |
| Hafta | Ders Konuları | Ön Hazırlık |
|---|---|---|
| 1 | Data Communications | scan from different sources |
| 2 | LAN and Ethernet | scan from different sources |
| 3 | OSI Reference Model | scan from different sources |
| 4 | Protocol and Port Concepts | scan from different sources |
| 5 | TCP Structure | scan from different sources |
| 6 | Internet Protocol (IP) | scan from different sources |
| 7 | ARP watch | scan from different sources |
| 8 | Coding Techniques | scan from different sources |
| 9 | Key-Based Encryption | scan from different sources |
| 10 | Summary Functions | scan from different sources |
| 11 | Methods of attack and abuse | scan from different sources |
| 12 | Code Virgin Attacks | scan from different sources |
| 13 | Corporate Network Security | scan from different sources |
| 14 | Cyber Security and Risk Management | scan from different sources |
| Kaynaklar | |
|---|---|
| Ders Notu | Lecturer notes |
| Ders Kaynakları | 1)Bilişim Toplumu ve Etik sorunlar. Gözde Dedeoğlu Aktuel Yayınları 2007. 2)Network:Bilgisayar Ağlarının Temelleri (Networking by Example) Barry Press, Marcia Press, Arşiv / Sistem Yayıncılık (2002). |
| Sıra | Program Çıktıları | Katkı Düzeyi | |||||
|---|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | |||
| # | Ders Öğrenme Çıktılarının Program Çıktılarına Katkısı |
|---|---|
| 1 | 1) Describing LAN and Ethernet |
| 2 | 2) Describing Protocol and Port Concepts |
| 3 | 3) Creating Methods of attack and abuse |
| 4 | 4) Describing Internet Protocol (IP) |
| 5 | 5) Evaluating Corporate Network Security |
| 6 | 6) Evaluating Cyber Security and Risk Management |
| Değerlendirme Sistemi | |
|---|---|
| Yarıyıl Çalışmaları | Katkı Oranı |
| 1. Ara Sınav | 40 |
| 1. Kısa Sınav | 10 |
| 1. Ödev | 40 |
| 2. Kısa Sınav | 10 |
| Toplam | 100 |
| 1. Yıl İçinin Başarıya | 50 |
| 1. Final | 50 |
| Toplam | 100 |
| AKTS - İş Yükü Etkinlik | Sayı | Süre (Saat) | Toplam İş Yükü (Saat) |
|---|---|---|---|
| Course Duration (Including the exam week: 16x Total course hours) | 16 | 2 | 32 |
| Hours for off-the-classroom study (Pre-study, practice) | 16 | 1 | 16 |
| Mid-terms | 1 | 4 | 4 |
| Final examination | 1 | 4 | 4 |
| Toplam İş Yükü | 56 | ||
| Toplam İş Yükü / 25 (Saat) | 2,24 | ||
| dersAKTSKredisi | 2 | ||