INTERNATIONAL BURCH UNIVERSITY
Graduate Study - Faculty of Engineering and Natural Sciences
PhD Electrical and Electronic Engineering
||Number of ECTS Credits
||Class Hours Per Week
||Total Hours Per Semester
|Zerina Mašetić, Assist. Prof. Dr.
||Assis. Prof. Dr. Jasmin Azemović
||Jasmin Azemović, Assoc. Prof. Dr.
|Information security is dedicated to keeping information safe from harm. This encompasses computer security, but also communications security, operations security, and physical security.
The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on). In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy. The course will be organized around a few broad themes:
• Foundations: security mindset, essential concepts (policy, CIA, etc.)
• Software security: vulnerabilities and protections, malware, program analysis
• Practical cryptography: encryption, authentication, hashing, symmetric and asymmetric crypto
• Networks: wired and wireless networks, protocols, attacks and countermeasures
Applications and special topics: databases, web apps, privacy and anonymity, voting, public policy
|The main goal of this course is to provide you with a background, foundation, and insight into the many dimensions of information security. This knowledge will serve as basis for further deeper study into selected areas of the field, or as an important component in your further studies and involvement in computing as a whole. The primary objectives of the course are to help you:
• Understand information security’s importance in our increasingly computer-driven world.
• Master the key concepts of information security and how they “work.”
• Develop a “security mindset:” learn how to critically analyze situations of computer and network usage from a security perspective, identifying the salient issues, viewpoints, and trade-offs.
As a part of your general education, the course will also help you learn to:
• Clearly and coherently communicate (both verbally and in writing) about complex technical topics.
• Work and interact collaboratively in groups to examine, understand and explain key aspects of information security
- Introduction to Information Security
- Metrics for Information Security
- Networking and Cryptography
- Information Security Planning and Deployment
- Vulnerabilities and Protection
- Identity and Trust Technologies
- Verification and Evaluation
- Incident Response
- Human Factors
- Legal, Ethical, and Social Implications
- Interactive Lectures
- Discussions and group work
- Describe threats to information security
- Identify methods, tools and techniques for combating these threats
- Identify types of attacks and problems that occur when systems are not properly protected
- Explain integral parts of overall good information security practices
- Identify and discuss issues related to access control
- Describe the need for and development of information security policies, and identify guidelines and models for writing policies
- Describe the types of contingency plan and the steps involved in developing each
- Identify security issues related to personnel decisions, and qualifications of security personel
- M. Merkow and J. Breithaupt, Information Security, Pearson,2006.
|ECTS (Allocated based on student) WORKLOAD
|Lecture (14 weeks x Lecture hours per week)||15||3||45|
|Laboratory / Practice (14 weeks x Laboratory/Practice hours per week)|| || ||0|
|Midterm Examination (1 week)|| || ||0|
|Final Examination(1 week)|| || ||0|
|Preparation for Midterm Examination|| || ||0|
|Preparation for Final Examination|| || ||0|
|Assignment / Homework/ Project||1||105||105|
|Seminar / Presentation|| || ||0|