Course Detail
Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|
NEW MEDIA and INFORMATION SECURITY | YMİ4214917 | Spring Semester | 3+0 | 3 | 5 |
Prerequisites Courses | |
Recommended Elective Courses | |
Language of Course | Turkish |
Course Level | First Cycle (Bachelor's Degree) |
Course Type | Elective |
Course Coordinator | Assoc.Prof. Başak GEZMEN |
Name of Lecturer(s) | |
Assistant(s) | |
Aim | The aim of the course is to have information about the data we have, to address the importance of data security in preventing unauthorized use of data and identifying risks related to data. |
Course Content | This course contains; Data security and its importance,Types of data security,Types of data that need to be secured,Threats to data security,Information Security Management,Information Security Management System Steps and Solutions,Advantages of Information Security Software,Protection of Data,Protection of Physical Data,Encryption of Electronic Data,Protection and Destruction of Electronic Data,Authorization and Encryption, Symmetric Encryption systems,Network Usage Policies,Security with Virtual Private Networks. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
Defines network and information security concepts | 16, 6 | A |
Define the security system design process and perform security risk analysis. | 16, 6 | A |
Information security management analyzes the changing risks and threats of organizations | 10, 9 | A |
Teaching Methods: | 10: Discussion Method, 16: Question - Answer Technique, 6: Experiential Learning, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam |
Course Outline
Order | Subjects | Preliminary Work |
---|
1 | Data security and its importance | Reading the topics mentioned from relevant sources |
2 | Types of data security | Reading the topics mentioned from relevant sources |
3 | Types of data that need to be secured | Reading the topics mentioned from relevant sources |
4 | Threats to data security | Reading the topics mentioned from relevant sources |
5 | Information Security Management | Reading the topics mentioned from relevant sources |
6 | Information Security Management System Steps and Solutions | Reading the topics mentioned from relevant sources |
7 | Advantages of Information Security Software | Reading the topics mentioned from relevant sources |
8 | Protection of Data | Reading the topics mentioned from relevant sources |
9 | Protection of Physical Data | Reading the topics mentioned from relevant sources |
10 | Encryption of Electronic Data | Reading the topics mentioned from relevant sources |
11 | Protection and Destruction of Electronic Data | Reading the topics mentioned from relevant sources |
12 | Authorization and Encryption, Symmetric Encryption systems | Reading the topics mentioned from relevant sources |
13 | Network Usage Policies | Reading the topics mentioned from relevant sources |
14 | Security with Virtual Private Networks | Reading the topics mentioned from relevant sources |
Resources |
Kamil Burlu, Bilişimin Karanlık Yüzü , Nirvana yayınları, 3.baskı, 2010.
2.G. Canbek, Ş. Sağıroğlu, Bilgi ve Bilgisayar Güvenliği: Casus Yazılımlar ve Korunma Yöntemleri, Grafiker Ltd. Şti. Aralık 2006.
3.Türkay HENKOĞLU, Adli Bilişim : Dijital Delillerin Elde Edilmesi ve Analizi, Pusula Yayınları, 2011.
4.Veri ve Ağ Güvenliği Ders Notları, İ.Soğukpınar, G.Y.T.E.Bilg.Müh.Bölümü |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications |
No | Program Qualification | Contribution Level |
1 | 2 | 3 | 4 | 5 |
1 | Knows the basic concepts and theoretical grounds related to the field. | X | | | | |
2 | Determines the facts related to New Media and Communication Systems and analyzes these facts with various dimensions. | | X | | | |
3 | Analyzes the needs of the media organizations and plans and applies strategies accordingly. | | X | | | |
4 | Plans new media projects and implements them. | X | | | | |
5 | Takes responsibility when necessary in the field related projects and proposes solutions to emerging problems. | | X | | | |
6 | Takes place as a member in a project-based teamwork; leads projects and plans events. | | | X | | |
7 | Observes the theoretical and factual problems with scientific methods related to new media and communication systems disciplines and sub-disciplines; analyzes the findings and presents them in scientific publications. | | X | | | |
8 | Has a high awareness towards lifelong learning. Follows the developments, innovations, opinions, methods and techniques regularly and uses them efficiently. | X | | | | |
9 | To be able to communicate orally and in writing in a foreign language at least at the B1 level of the European Language Portfolio. | | X | | | |
10 | Utilizes new communication technologies efficiently in professional and scientific works and follows the developments in new communication technologies regularly. | X | | | | |
11 | Plans social responsibility events and takes a role in implementation process. | | X | | | |
12 | Acts in accordance with ethical codes in professional and scientific works. | | X | | | |
13 | Uses tools related to new media and communications, efficiently. | X | | | | |
14 | Develops and implement new media projects specifically developed for media organizations. | | X | | | |
15 | Sensitive to the environment, the universality of social rights and the protection of cultural values. | | | | | |
16 | Knowledgeable about occupational health and safety and can use this information when necessary. | | | | | |
17 | Uses Turkish language fluently and accurately in scientific and professional works. | | | | | |
Assessment Methods
Contribution Level | Absolute Evaluation |
Rate of Midterm Exam to Success | | 40 |
Rate of Final Exam to Success | | 60 |
Total | | 100 |
ECTS / Workload Table |
Activities | Number of | Duration(Hour) | Total Workload(Hour) |
Course Hours | 14 | 3 | 42 |
Guided Problem Solving | 20 | 1 | 20 |
Resolution of Homework Problems and Submission as a Report | 20 | 1 | 20 |
Term Project | 14 | 2 | 28 |
Presentation of Project / Seminar | 0 | 0 | 0 |
Quiz | 0 | 0 | 0 |
Midterm Exam | 1 | 20 | 20 |
General Exam | 1 | 20 | 20 |
Performance Task, Maintenance Plan | 0 | 0 | 0 |
Total Workload(Hour) | 150 |
Dersin AKTS Kredisi = Toplam İş Yükü (Saat)/30*=(150/30) | 5 |
ECTS of the course: 30 hours of work is counted as 1 ECTS credit. |
Detail Informations of the Course
Course Description
Course | Code | Semester | T+P (Hour) | Credit | ECTS |
---|
NEW MEDIA and INFORMATION SECURITY | YMİ4214917 | Spring Semester | 3+0 | 3 | 5 |
Prerequisites Courses | |
Recommended Elective Courses | |
Language of Course | Turkish |
Course Level | First Cycle (Bachelor's Degree) |
Course Type | Elective |
Course Coordinator | Assoc.Prof. Başak GEZMEN |
Name of Lecturer(s) | |
Assistant(s) | |
Aim | The aim of the course is to have information about the data we have, to address the importance of data security in preventing unauthorized use of data and identifying risks related to data. |
Course Content | This course contains; Data security and its importance,Types of data security,Types of data that need to be secured,Threats to data security,Information Security Management,Information Security Management System Steps and Solutions,Advantages of Information Security Software,Protection of Data,Protection of Physical Data,Encryption of Electronic Data,Protection and Destruction of Electronic Data,Authorization and Encryption, Symmetric Encryption systems,Network Usage Policies,Security with Virtual Private Networks. |
Dersin Öğrenme Kazanımları | Teaching Methods | Assessment Methods |
Defines network and information security concepts | 16, 6 | A |
Define the security system design process and perform security risk analysis. | 16, 6 | A |
Information security management analyzes the changing risks and threats of organizations | 10, 9 | A |
Teaching Methods: | 10: Discussion Method, 16: Question - Answer Technique, 6: Experiential Learning, 9: Lecture Method |
Assessment Methods: | A: Traditional Written Exam |
Course Outline
Order | Subjects | Preliminary Work |
---|
1 | Data security and its importance | Reading the topics mentioned from relevant sources |
2 | Types of data security | Reading the topics mentioned from relevant sources |
3 | Types of data that need to be secured | Reading the topics mentioned from relevant sources |
4 | Threats to data security | Reading the topics mentioned from relevant sources |
5 | Information Security Management | Reading the topics mentioned from relevant sources |
6 | Information Security Management System Steps and Solutions | Reading the topics mentioned from relevant sources |
7 | Advantages of Information Security Software | Reading the topics mentioned from relevant sources |
8 | Protection of Data | Reading the topics mentioned from relevant sources |
9 | Protection of Physical Data | Reading the topics mentioned from relevant sources |
10 | Encryption of Electronic Data | Reading the topics mentioned from relevant sources |
11 | Protection and Destruction of Electronic Data | Reading the topics mentioned from relevant sources |
12 | Authorization and Encryption, Symmetric Encryption systems | Reading the topics mentioned from relevant sources |
13 | Network Usage Policies | Reading the topics mentioned from relevant sources |
14 | Security with Virtual Private Networks | Reading the topics mentioned from relevant sources |
Resources |
Kamil Burlu, Bilişimin Karanlık Yüzü , Nirvana yayınları, 3.baskı, 2010.
2.G. Canbek, Ş. Sağıroğlu, Bilgi ve Bilgisayar Güvenliği: Casus Yazılımlar ve Korunma Yöntemleri, Grafiker Ltd. Şti. Aralık 2006.
3.Türkay HENKOĞLU, Adli Bilişim : Dijital Delillerin Elde Edilmesi ve Analizi, Pusula Yayınları, 2011.
4.Veri ve Ağ Güvenliği Ders Notları, İ.Soğukpınar, G.Y.T.E.Bilg.Müh.Bölümü |
Course Contribution to Program Qualifications
Course Contribution to Program Qualifications |
No | Program Qualification | Contribution Level |
1 | 2 | 3 | 4 | 5 |
1 | Knows the basic concepts and theoretical grounds related to the field. | X | | | | |
2 | Determines the facts related to New Media and Communication Systems and analyzes these facts with various dimensions. | | X | | | |
3 | Analyzes the needs of the media organizations and plans and applies strategies accordingly. | | X | | | |
4 | Plans new media projects and implements them. | X | | | | |
5 | Takes responsibility when necessary in the field related projects and proposes solutions to emerging problems. | | X | | | |
6 | Takes place as a member in a project-based teamwork; leads projects and plans events. | | | X | | |
7 | Observes the theoretical and factual problems with scientific methods related to new media and communication systems disciplines and sub-disciplines; analyzes the findings and presents them in scientific publications. | | X | | | |
8 | Has a high awareness towards lifelong learning. Follows the developments, innovations, opinions, methods and techniques regularly and uses them efficiently. | X | | | | |
9 | To be able to communicate orally and in writing in a foreign language at least at the B1 level of the European Language Portfolio. | | X | | | |
10 | Utilizes new communication technologies efficiently in professional and scientific works and follows the developments in new communication technologies regularly. | X | | | | |
11 | Plans social responsibility events and takes a role in implementation process. | | X | | | |
12 | Acts in accordance with ethical codes in professional and scientific works. | | X | | | |
13 | Uses tools related to new media and communications, efficiently. | X | | | | |
14 | Develops and implement new media projects specifically developed for media organizations. | | X | | | |
15 | Sensitive to the environment, the universality of social rights and the protection of cultural values. | | | | | |
16 | Knowledgeable about occupational health and safety and can use this information when necessary. | | | | | |
17 | Uses Turkish language fluently and accurately in scientific and professional works. | | | | | |
Assessment Methods
Contribution Level | Absolute Evaluation |
Rate of Midterm Exam to Success | | 40 |
Rate of Final Exam to Success | | 60 |
Total | | 100 |
Numerical Data
Ekleme Tarihi: 05/10/2023 - 13:59Son Güncelleme Tarihi: 05/10/2023 - 13:59
×- A-Z Programs
- Undergraduate
- Graduate
- Academic Calendar
- Double Major & Minor Programs
- Erasmus
- Prospective Students
- Registration
- Re-Enrolment
- Fees
- Directorate of Registrar’s Office
- FAQ
- Accommodation
- Scholarships
- Lateral and Vertical Transfer
- Summer School
- Preparation
- Transportation