CYBER SECURITY (ENGLISH, THESIS) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CYS5789 | Cyber Security Law | Spring Fall |
3 | 0 | 3 | 8 |
This catalog is for information purposes. Course status is determined by the relevant department at the beginning of semester. |
Language of instruction: | English |
Type of course: | Departmental Elective |
Course Level: | |
Mode of Delivery: | Face to face |
Course Coordinator : | Assist. Prof. AHMET NACİ ÜNAL |
Course Lecturer(s): |
Assist. Prof. TAYFUN ACARER |
Recommended Optional Program Components: | None |
Course Objectives: | This course will analyze national and international legal frameworks for malicious and defensive activities in cyber space. |
The students who have succeeded in this course; The course will consider legal questions within the context of broader debates about issues such as governance of cyberspace and the Internet, the roles of governmental and non-governmental actors, evolving understandings of privacy, and the role of law in governing a constantly changing domain where many actors operate in secret. |
Legal and policy challenges stemming from rapidly evolving cybersecurity threats. The situation of victims of Cybercrime. The status of media outlets that have been hacked or brought offline to websites. Intellectual property and cyber space. The national and international legal frameworks. Manage malicious and defensive actions in cyberspace. Discussion and case studies. |
Week | Subject | Related Preparation |
1) | Explanation of the course, its activity and its content. | Lecture notes. |
2) | Legal and policy challenges stemming from rapidly evolving cybersecurity threats. | Lecture notes. |
3) | The situation of victims of cybercrime. | Lecture notes. |
4) | The situation of victims of cybercrime. | Lecture notes. |
5) | The status of media outlets that have been hacked or brought offline to websites. | Lecture notes. |
6) | Intellectual property and cyber space. | Lecture notes. |
7) | Intellectual property and cyber space | Lecture notes. |
8) | Intellectual property and cyber space | Lecture notes. |
9) | The national and international legal frameworks. | Lecture notes. |
10) | The national and international legal frameworks. | Lecture notes. |
11) | Manage malicious and defensive actions in cyberspace. | Lecture notes. |
12) | Manage malicious and defensive actions in cyberspace. | Lecture notes. |
13) | Discussion and case studies. | Lecture notes. |
14) | Discussion and case studies. | Lecture notes. |
Course Notes / Textbooks: | Lecture notes |
References: | Case studies. |
Semester Requirements | Number of Activities | Level of Contribution |
Attendance | 10 | % 0 |
Homework Assignments | 4 | % 10 |
Presentation | 1 | % 10 |
Midterms | 1 | % 20 |
Final | 1 | % 60 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 14 | 3 | 42 |
Study Hours Out of Class | 14 | 5 | 70 |
Presentations / Seminar | 2 | 3 | 6 |
Homework Assignments | 4 | 8 | 32 |
Midterms | 1 | 20 | 20 |
Final | 1 | 20 | 20 |
Total Workload | 190 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Understand and implement advanced concepts of Siber Security | |
2) | Use math, science, and modern engineering tools to formulate and solve advenced siber security problems. | |
3) | Review the literature critically pertaining to his/her research projects, and connect the earlier literature to his/her own results | |
4) | Follow, interpret and analyze scientific researches in the field of engineering and use the knowledge in his/her field of study | |
5) | Work effectively in multi-disciplinary research teams | |
6) | Acquire scientific knowledge | |
7) | Find out new methods to improve his/her knowledge. | |
8) | Effectively express his/her research ideas and findings both orally and in writing | |
9) | Defend research outcomes at seminars and conferences. | |
10) | Prepare master thesis and articles about thesis subject clearly on the basis of published documents, thesis, etc. | |
11) | Demonstrate professional and ethical responsibility. |