INTERNATIONAL BURCH UNIVERSITY
Graduate Study - Faculty of Engineering and Natural Sciences
Electrical and Electronic Engineering PhD
2015-2016

SYLLABUS
Code Name Level Year Semester
CEN 622 Information Security Graduate 1 Fall
Status Number of ECTS Credits Class Hours Per Week Total Hours Per Semester Language
Non-area Elective 6 3 150 English

Instructor Assistant Coordinator
Zerina Mašetić, Senior Teaching Assistant Assis. Prof. Dr. Jasmin Azemović Jasmin Azemović, Assoc. Prof. Dr.
[email protected] [email protected] no email

Information security is dedicated to keeping information safe from harm. This encompasses computer security, but also communications security, operations security, and physical security. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on). In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy. The course will be organized around a few broad themes: • Foundations: security mindset, essential concepts (policy, CIA, etc.) • Software security: vulnerabilities and protections, malware, program analysis • Practical cryptography: encryption, authentication, hashing, symmetric and asymmetric crypto • Networks: wired and wireless networks, protocols, attacks and countermeasures Applications and special topics: databases, web apps, privacy and anonymity, voting, public policy

COURSE OBJECTIVE
The main goal of this course is to provide you with a background, foundation, and insight into the many dimensions of information security. This knowledge will serve as basis for further deeper study into selected areas of the field, or as an important component in your further studies and involvement in computing as a whole. The primary objectives of the course are to help you:
• Understand information security’s importance in our increasingly computer-driven world.
• Master the key concepts of information security and how they “work.”
• Develop a “security mindset:” learn how to critically analyze situations of computer and network usage from a security perspective, identifying the salient issues, viewpoints, and trade-offs.
As a part of your general education, the course will also help you learn to:
• Clearly and coherently communicate (both verbally and in writing) about complex technical topics.
• Work and interact collaboratively in groups to examine, understand and explain key aspects of information security

COURSE CONTENT
Week
Topic
  1. Introduction to Information Security
  2. Metrics for Information Security
  3. Networking and Cryptography
  4. Information Security Planning and Deployment
  5. Vulnerabilities and Protection
  6. Identity and Trust Technologies
  7. Verification and Evaluation
  8. Incident Response
  9. Human Factors
  10. Legal, Ethical, and Social Implications

LABORATORY/PRACTICE PLAN
Week
Topic

    TEACHING/ASSESSMENT
    Description
    • Interactive Lectures
    • Discussions and group work
    Description (%)
    Method Quantity Percentage (%)
    +Term Paper1100
    Total: 100
    Learning outcomes
    • Describe threats to information security
    • Identify methods, tools and techniques for combating these threats
    • Identify types of attacks and problems that occur when systems are not properly protected
    • Explain integral parts of overall good information security practices
    • Identify and discuss issues related to access control
    • Describe the need for and development of information security policies, and identify guidelines and models for writing policies
    • Describe the types of contingency plan and the steps involved in developing each
    • Identify security issues related to personnel decisions, and qualifications of security personel
    TEXTBOOK(S)
    • M. Merkow and J. Breithaupt, Information Security, Pearson,2006.

    ECTS (Allocated based on student) WORKLOAD
    Activities Quantity Duration (Hour) Total Work Load
    Lecture (14 weeks x Lecture hours per week)15345
    Laboratory / Practice (14 weeks x Laboratory/Practice hours per week) 0
    Midterm Examination (1 week) 0
    Final Examination(1 week) 0
    Preparation for Midterm Examination 0
    Preparation for Final Examination 0
    Assignment / Homework/ Project1105105
    Seminar / Presentation 0
    Total Workload: 150
    ECTS Credit (Total workload/25): 6