This under-graduate course is about the fundamentals of information security, which is a set of practices intended to keep data secure from unauthorized access or alterations. The course covers some fundemental topics such as crpthography techniques, network security concepts, malware and phishing attacks.
The aim of this course is to demonstrate students variety of different aspects of how to secure data and services against harmful attacks. The students are expected to gain a foundational understanding in information security. The students, moreover, will be expected to gain hand-on experience via four assignments supplied through BBM465 course.
The course is taught by Dr. Ahmet Selman Bozkır. The teaching assistant is Ali Baran Taşdemir.
First Midterm: 21 November 2022 - Monday at 13:00
Second Midterm: 19 December 2022 - Monday at 13:00
Final: 11 January 2023 - Wednesday at 15:00
Lectures: Monday at 13:15-15:50 (Seminar Hall)
Policies: All work on project must be done with pairs unless stated otherwise. You are encouraged to discuss with your classmates about the given project, but these discussions should be carried out in an abstract way. That is, discussions related to a particular solution to a specific problem (either in actual code or in the pseudocode) will not be tolerated.
In short, turning in someone else’s work, in whole or in part, as your own will be considered as a violation of academic integrity. The conducted study must be reported in a suitable format and be sent through email.
The course webpage will be updated regularly throughout the semester with lecture notes, presentations, and important deadlines. For the laboratory class of this course, please register to Piazza BBM465 communication group
Grading for BBM463 will be based on
|Oct 3||Introduction[slides]||Welcome message, CIA triad|
|Oct 10||Basic Ciphers[slides]||Basic Ciphers, Vigenere Cipher, Enigma|
|Oct 17||Block Ciphers, DES, Encryption Modes[slides]||Block Ciphers, DES, Encryption Modes|
|Oct 24||Strength of Ciphers[slides]||Cryptographic Work Factor|
|Oct 31||CRCs, Cryptographic Hash Functions, MACs, HMAC[slides]||CRCs, CHFs, MACs|
|Nov 7||Public Key Cryptography, RSA, Key Exchange[slides]||Public Key Cryptography, RSA, Key Exchange|
|Nov 14||Digital Certificates, X509 Standard[slides]||Digital Certificates, X509 Standard|
|Nov 28||Firewalls, Netfilters[slides]||Firewalls, Netfilters|
|Dec 5||VPN, Security Information and Event Monitoring (SIEM)[slides]||VPN, Security Information and Event Monitoring (SIEM)|
|Dec 12||User Authentication and Authentication Protocols[slides]||User Authentication and Authentication Protocols|
|Dec 26||Anti-Phishing, Methods and Future [slides]||Anti-Phishing, Methods and Future|