INFORMATION TECHNOLOGIES (ENGLISH, NON-THESIS)
Master TR-NQF-HE: Level 7 QF-EHEA: Second Cycle EQF-LLL: Level 7

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
CYS5789 Cyber Security Law Fall
Spring
3 0 3 8
The course opens with the approval of the Department at the beginning of each semester

Basic information

Language of instruction: En
Type of course: Departmental Elective
Course Level:
Mode of Delivery: Face to face
Course Coordinator : Dr. Öğr. Üyesi AHMET NACİ ÜNAL
Course Lecturer(s): Dr. Öğr. Üyesi TAYFUN ACARER
Course Objectives: This course will analyze national and international legal frameworks for malicious and defensive activities in cyber space.

Learning Outputs

The students who have succeeded in this course;
The course will consider legal questions within the context of broader debates about issues such as governance of cyberspace and the Internet, the roles of governmental and non-governmental actors, evolving understandings of privacy, and the role of law in governing a constantly changing domain where many actors operate in secret.

Course Content

Legal and policy challenges stemming from rapidly evolving cybersecurity threats. The situation of victims of Cybercrime. The status of media outlets that have been hacked or brought offline to websites. Intellectual property and cyber space. The national and international legal frameworks. Manage malicious and defensive actions in cyberspace. Discussion and case studies.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) Explanation of the course, its activity and its content. Lecture notes.
2) Legal and policy challenges stemming from rapidly evolving cybersecurity threats. Lecture notes.
3) The situation of victims of cybercrime. Lecture notes.
4) The situation of victims of cybercrime. Lecture notes.
5) The status of media outlets that have been hacked or brought offline to websites. Lecture notes.
6) Intellectual property and cyber space. Lecture notes.
7) Intellectual property and cyber space Lecture notes.
8) Intellectual property and cyber space Lecture notes.
9) The national and international legal frameworks. Lecture notes.
10) The national and international legal frameworks. Lecture notes.
11) Manage malicious and defensive actions in cyberspace. Lecture notes.
12) Manage malicious and defensive actions in cyberspace. Lecture notes.
13) Discussion and case studies. Lecture notes.
14) Discussion and case studies. Lecture notes.

Sources

Course Notes: Lecture notes
References: Case studies.

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance 10 % 0
Laboratory 0 % 0
Application 0 % 0
Field Work 0 % 0
Special Course Internship (Work Placement) 0 % 0
Quizzes 0 % 0
Homework Assignments 4 % 10
Presentation 1 % 10
Project 0 % 0
Seminar 0 % 0
Midterms 1 % 20
Preliminary Jury 0 % 0
Final 1 % 60
Paper Submission 0 % 0
Jury 0 % 0
Bütünleme % 0
Total % 100
PERCENTAGE OF SEMESTER WORK % 40
PERCENTAGE OF FINAL WORK % 60
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Laboratory 0 0 0
Application 0 0 0
Special Course Internship (Work Placement) 0 0 0
Field Work 0 0 0
Study Hours Out of Class 14 5 70
Presentations / Seminar 2 3 6
Project 0 0 0
Homework Assignments 4 8 32
Quizzes 0 0 0
Preliminary Jury 0 0 0
Midterms 1 20 20
Paper Submission 0 0 0
Jury 0 0 0
Final 1 20 20
Total Workload 190

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Uses basic Software Engineering knowledge and competencies.
2) Applies the software development ability that is necessary for software engineering applications.
3) Uses data structures and applies information about algorithm development.
4) Develops system programs on operating systems.
5) Defines computer organization, design and architectures.
6) Creates the structure of computer networks and network security.
7) Uses business intelligence, data mining and data analysis tools, applies techniques about them.
8) Develops database applications and WEB based programs.
9) Defines, analyzes, designs and manages information technologies projects.
10) Uses and develops technology-based environments and tools in education.
11) Detects, identifies and solves information technology needs of the business environment.
12) Uses the capabilities of information technologies within the rules of professional responsibility and ethics.