INFORMATION TECHNOLOGIES (TURKISH, THESIS)
Master TR-NQF-HE: Level 7 QF-EHEA: Second Cycle EQF-LLL: Level 7

Course Introduction and Application Information

Course Code Course Name Semester Theoretical Practical Credit ECTS
YZM5604 Information Security Management Fall 3 0 3 8
The course opens with the approval of the Department at the beginning of each semester

Basic information

Language of instruction: Tr
Type of course: Departmental Elective
Course Level:
Mode of Delivery: Face to face
Course Coordinator : Prof. Dr. MEHMET ALPER TUNGA
Course Lecturer(s): Dr. Öğr. Üyesi ORHAN GÖKÇÖL
Dr. Öğr. Üyesi YÜCEL BATU SALMAN
Course Objectives: The aim of this course is to learn how the information has a security in business. In this course, it is searched information security from a management view. Moreover, it is declared the standards and approaches of the information security management. The standard of information security managemet which is ISO27001 is going to express detailed.

Learning Outputs

The students who have succeeded in this course;
1. Describe the characteristic features of Information Security
2. Apply the principles of Information Security Management Business Environments
3. Define the roles and responsibilities related to information security
4. Identify assets and the threats to assets
5. Calculate and manage information security risks
6. Define an Information Security Strategy and Architecture
7. Apply the ISO27001 standards to a real project

Course Content

The content of this course is composed of basics of Information Security (IS), threats, program structure of IS and development cycle of ISM, policies of IS, classification of assets, access control and physical security, IS risk analysis, IS risk management, business continuity management, ISM frame systems and ISO27001, ISO27001, IS infringed events management and IS legal issues.

Weekly Detailed Course Contents

Week Subject Related Preparation
1) Introduction, general concepts
2) Basics of IS, Threats
3) Program structure of IS and development cycle of ISM
4) Policies of IS
5) Classification of assets
6) Access control and physical security
7) IS Rick Analysis/ Final distribution of projects
8) IS Risk Management
9) Business continuity management
10) ISM frame systems and ISO27001
11) ISO27001
12) IS infringed events management
13) IS Legal Issues/Final project intermediate controls
14) Team project presentations

Sources

Course Notes: The standard of ISM systems IS027001 Various online references Online lecture notes
References: Yok - None.

Evaluation System

Semester Requirements Number of Activities Level of Contribution
Attendance % 0
Laboratory % 0
Application % 0
Field Work % 0
Special Course Internship (Work Placement) % 0
Quizzes % 0
Homework Assignments 1 % 5
Presentation % 0
Project 1 % 30
Seminar % 0
Midterms 2 % 25
Preliminary Jury % 0
Final 1 % 40
Paper Submission % 0
Jury % 0
Bütünleme % 0
Total % 100
PERCENTAGE OF SEMESTER WORK % 30
PERCENTAGE OF FINAL WORK % 70
Total % 100

ECTS / Workload Table

Activities Number of Activities Duration (Hours) Workload
Course Hours 14 3 42
Laboratory 0 0 0
Application 14 3 42
Special Course Internship (Work Placement) 0 0 0
Field Work 0 0 0
Study Hours Out of Class 14 5 70
Presentations / Seminar 0 0 0
Project 0 0 0
Homework Assignments 0 0 0
Quizzes 0 0 0
Preliminary Jury 0 0 0
Midterms 2 15 30
Paper Submission 0 0 0
Jury 0 0 0
Final 1 24 24
Total Workload 208

Contribution of Learning Outcomes to Programme Outcomes

No Effect 1 Lowest 2 Low 3 Average 4 High 5 Highest
           
Program Outcomes Level of Contribution
1) Uses basic Software Engineering knowledge and competencies.
2) Applies the software development ability that is necessary for software engineering applications.
3) Uses data structures and applies information about algorithm development.
4) Develops system programs on operating systems.
5) Develops system programs on operating systems.
6) Creates the structure of computer networks and network security.
7) Uses business intelligence, data mining and data analysis tools, applies techniques about them.
8) Develops database applications and WEB based programs.
9) Defines, analyzes, designs and manages information technologies projects.
10) Uses and develops technology-based environments and tools in education.
11) Detects, identifies and solves information technology needs of the business environment.
12) Uses the capabilities of information technologies within the rules of professional responsibility and ethics.