You are on page 1of 11

THE EUROPEAN UNIVERSITY OF LEFKE

MIS536 – Information Security


Lecture 1 - Outline Of The Course

Assist. Prof. Dr. Ersin Çağlar


MIS536 – Information Security

Lecture Schedule:
➢ Friday (14:00-17:00 Hrs)

Course Website: Moodle


➢ Lecture materials,
➢ Assignments,
➢ Exams
Who Am I?
Assist. Prof. Dr. Ersin Çağlar

School/Department:
➢ Director of Applied Science
➢ Head of MIS Department

Contact Information
➢ Rauf Raif Denktaş Building, AS No:101
➢ Phone, ext: 6602000
➢ ecaglar@eul.edu.tr

Research
➢ Network, Security, IoT, Cloud, Green Comp.
➢ Teams account: Ersin Çağlar ➢ IT, MIS, Forensic, Cryptocurrency, Simulation

Office Hours: students are free to come.


Course Outline

Objectives
The course provides instruction in security for network hardware, software, and data including using
physical security measures, instituting backup procedures, protecting systems against attacks and
intrusions, and gaining protection from malware. And, the course covers applying these concepts to the
theme of “Protecting Yourself in the Digital Age.”

Indicative Textbooks
➢ Security+ by Emmett Dulaney, Sybex 2009, ISBN: 978-0-470-37297-5.
➢ Computer Forensics by Marie-Helen Maras, Jones & Bartlett 2012, ISBN: 978-1-4496-0072-3
➢ Haqaf, H., & Koyuncu, M. (2018). Understanding key skills for information security managers.
International Journal of Information Management, 43, 165-172.
Course Materials

➢ Lecture Materials
❖ Copies of slides provided weekly on moodle
❖ Strictly follow slides and videos
❖ Attend Lectures
❑ Lectures gives you detailed point-wise meaning
❑ Slides gives you detailed information

➢ Course Format
❑ Lectures
❑ Discussions
Obligations
➢ You are responsible for what goes on in class, including lecture material, handouts, and turning in
assignments. If you are unable to attend class, it is your responsibility to obtain copies of class notes
and any materials distributed in class.

➢ No any exam will not be given early. An exam can be made up only in the case of emergencies such
as severe illness or death in the immediate family. You must contact me 24 hours before the exam in
advance in order to arrange a makeup. In any case, you have only one chance to get make up,
midterm or final. Please take into your account; make up exam will not be same as the midterm or
final.

➢ After the announcement of exam scores, every student has right to complaint his/her score in 10
days. After 10 days, any complaint is not acceptable. Please take into your account, if any mistake on
marking, it will fix immediately. But if no any mistakes, will not be raise.

➢ Assignments and exams must be your own work. In assignments, student may discuss general ideas
with other students, but should not discuss actual solutions with others. In any case, cheating during
the exam will punish with disciplinary committee.
What do I learn in this course?

On successful completion of the course, the student should:

➢ Understand how information security can counteract attempts to attack an individual’s


“infosphere,” the person’s sensitive information.
➢ Understand how people are the weakest components in any security system.
➢ Learn the fundamentals of cryptography and how cryptography serves as the central language of
information security.
➢ Develop and Implement Physical Security
➢ Ensure Infrastructure and Network Security
➢ Understand the Roles of Computer Forensics and the Law in Information Security.
Assessment

➢ 3 Assignments - %5 for each (details will be announced later)

➢ Examination
❑ 1 Midterm - %35

❑ 1 Final - %50
Thou Shall Not Cheat
➢ Do not cheat
➢ I encourage you to discuss your assignments with your friends
❑ Put everything in your own words

➢ But no copying
❑ It is NOT a shame of not knowing how to do

❑ Copying causes damage to your integrity and respect

❑ Copying is stealing intellectual property

❑ Turnitin will catch cheaters

➢ What if you are caught copying?


❑ Both the copier and the originator get 0

❑ 2nd time: Both get 0 and one full downgrade

❑ Caught 3rd time: FAIL


❑ If it is minor or major, an automatic FAIL
Information Security

➢ Why should we learn?

➢ What should we learn?

➢ How should we learn?


Thank You
Any Questions?

You might also like