FACULTY OF ENGINEERING
Department of Computer Engineering
CE 340 | Course Introduction and Application Information
Course Name |
Cryptography and Network Security
|
Code
|
Semester
|
Theory
(hour/week) |
Application/Lab
(hour/week) |
Local Credits
|
ECTS
|
CE 340
|
Fall/Spring
|
3
|
0
|
3
|
5
|
Prerequisites |
None
|
|||||
Course Language |
English
|
|||||
Course Type |
Elective
|
|||||
Course Level |
First Cycle
|
|||||
Mode of Delivery | - | |||||
Teaching Methods and Techniques of the Course | Group WorkProblem SolvingLecture / Presentation | |||||
Course Coordinator | ||||||
Course Lecturer(s) | ||||||
Assistant(s) | - |
Course Objectives | This course will introduce cryptography theories, algorithms, and systems. It will also consider necessary approaches and techniques to build protection mechanisms in order to secure computer networks |
Learning Outcomes |
The students who succeeded in this course;
|
Course Description | To introduce literature and terminology used for cryptography and network security; to acquaint students with the major cryptography algorithms, systems, functions, and development techniques applied to network security mechanisms. |
|
Core Courses | |
Major Area Courses |
X
|
|
Supportive Courses | ||
Media and Management Skills Courses | ||
Transferable Skill Courses |
WEEKLY SUBJECTS AND RELATED PREPARATION STUDIES
Week | Subjects | Related Preparation |
1 | Fundamental Concepts | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.1 pp. 1-14 |
2 | Cryptographic Concepts | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch1.2 pp. 19-31 |
3 | Symmetric Cryptography | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.1 pp. 53-68 |
4 | Public-Key Cryptography | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.2 pp. 72-81 |
5 | Cryptographic Hash Functions | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.3-Ch2.4 pp. 83-88 |
6 | Digital Signatures | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch2.4-Ch2.5 pp. 89-97 |
7 | Operating Systems Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch3 pp. 111-157 |
8 | Malicious Software | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch4 pp. 167-208 |
9 | Network Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.1-Ch5.2 pp. 215-227 |
10 | Network Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch5.3-Ch5.6 pp. 230-256 |
11 | Network Services & Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch6 pp. 261-310 |
12 | Browser Security | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch7 pp. 319-372 |
13 | Security Models & Practice | Introduction to Computer Security - M. T. Goodrich and R. Tamassia – Ch9 pp. 435-474 |
14 | Project Presentations | - |
15 | Semester Review | |
16 | Final Examination |
Course Notes/Textbooks | Introduction to Computer Security - M. T. Goodrich and R. Tamassia, © 2011 | Pearson Prentice Hall | ISBN-13: 978-0-321-70201-2, ISBN-10: 0-321-70201-8 |
Suggested Readings/Materials |
EVALUATION SYSTEM
Semester Activities | Number | Weigthing |
Participation | ||
Laboratory / Application | ||
Field Work | ||
Quizzes / Studio Critiques |
4
|
10
|
Portfolio | ||
Homework / Assignments | ||
Presentation / Jury | ||
Project |
2
|
30
|
Seminar / Workshop | ||
Oral Exams | ||
Midterm |
1
|
30
|
Final Exam |
1
|
30
|
Total |
Weighting of Semester Activities on the Final Grade |
7
|
70
|
Weighting of End-of-Semester Activities on the Final Grade |
1
|
30
|
Total |
ECTS / WORKLOAD TABLE
Semester Activities | Number | Duration (Hours) | Workload |
---|---|---|---|
Theoretical Course Hours (Including exam week: 16 x total hours) |
16
|
3
|
48
|
Laboratory / Application Hours (Including exam week: '.16.' x total hours) |
16
|
0
|
|
Study Hours Out of Class |
14
|
3
|
42
|
Field Work |
0
|
||
Quizzes / Studio Critiques |
4
|
2
|
8
|
Portfolio |
0
|
||
Homework / Assignments |
0
|
||
Presentation / Jury |
0
|
||
Project |
2
|
10
|
20
|
Seminar / Workshop |
0
|
||
Oral Exam |
0
|
||
Midterms |
1
|
12
|
12
|
Final Exam |
1
|
20
|
20
|
Total |
150
|
COURSE LEARNING OUTCOMES AND PROGRAM QUALIFICATIONS RELATIONSHIP
#
|
Program Competencies/Outcomes |
* Contribution Level
|
||||
1
|
2
|
3
|
4
|
5
|
||
1 | To have adequate knowledge in Mathematics, Science and Computer Engineering; to be able to use theoretical and applied information in these areas on complex engineering problems. |
|||||
2 | To be able to identify, define, formulate, and solve complex Computer Engineering problems; to be able to select and apply proper analysis and modeling methods for this purpose. |
X | ||||
3 | To be able to design a complex system, process, device or product under realistic constraints and conditions, in such a way as to meet the requirements; to be able to apply modern design methods for this purpose. |
X | ||||
4 | To be able to devise, select, and use modern techniques and tools needed for analysis and solution of complex problems in Computer Engineering applications; to be able to use information technologies effectively. |
X | ||||
5 | To be able to design and conduct experiments, gather data, analyze and interpret results for investigating complex engineering problems or Computer Engineering research topics. |
|||||
6 | To be able to work efficiently in Computer Engineering disciplinary and multi-disciplinary teams; to be able to work individually. |
X | ||||
7 | To be able to communicate effectively in Turkish, both orally and in writing; to be able to author and comprehend written reports, to be able to prepare design and implementation reports, to present effectively, to be able to give and receive clear and comprehensible instructions. |
|||||
8 | To have knowledge about global and social impact of Computer Engineering practices on health, environment, and safety; to have knowledge about contemporary issues as they pertain to engineering; to be aware of the legal ramifications of Computer Engineering solutions. |
|||||
9 | To be aware of ethical behavior, professional and ethical responsibility; to have knowledge about standards utilized in engineering applications. |
|||||
10 | To have knowledge about industrial practices such as project management, risk management, and change management; to have awareness of entrepreneurship and innovation; to have knowledge about sustainable development. |
|||||
11 | To be able to collect data in the area of Computer Engineering, and to be able to communicate with colleagues in a foreign language. ("European Language Portfolio Global Scale", Level B1) |
|||||
12 | To be able to speak a second foreign language at a medium level of fluency efficiently. |
|||||
13 | To recognize the need for lifelong learning; to be able to access information, to be able to stay current with developments in science and technology; to be able to relate the knowledge accumulated throughout the human history to Computer Engineering. |
*1 Lowest, 2 Low, 3 Average, 4 High, 5 Highest
NEWS |ALL NEWS
Home kitchens will be like ‘restaurant kitchens’
Esra-Melis Sarıhan sisters, graduates of Izmir University of Economics (IUE), developed an application called ‘Yedir’ that will bring home cooks and food
She became one of the 10 most successful women in the Middle East
Melda Akın, a graduate of Department of Computer Engineering, Izmir University of Economics (IUE), was named one of the 10 most successful
Watch out for pandemic scams
Fake job postings that promise people to work from home have been the latest tactic of scammers, who are looking for ways