ECTS - Investigation of Computer Crime
Investigation of Computer Crime (ISE414) Course Detail
Course Name | Course Code | Season | Lecture Hours | Application Hours | Lab Hours | Credit | ECTS |
---|---|---|---|---|---|---|---|
Investigation of Computer Crime | ISE414 | Area Elective | 3 | 0 | 0 | 3 | 5 |
Pre-requisite Course(s) |
---|
N/A |
Course Language | English |
---|---|
Course Type | Elective Courses |
Course Level | Natural & Applied Sciences Master's Degree |
Mode of Delivery | Face To Face |
Learning and Teaching Strategies | Lecture. |
Course Lecturer(s) |
|
Course Objectives | The objective of this course is to teach common threats to security by means of viruses, hacking and electronic fraud. It also explains security risk management and existing computer crime laws. |
Course Learning Outcomes |
The students who succeeded in this course;
|
Course Content | Computer crimes, vulnerability, risk assessment, electronic fraud, viruses and worms, computer crime laws. |
Weekly Subjects and Releated Preparation Studies
Week | Subjects | Preparation |
---|---|---|
1 | Course overview | Chapter 1 (main text) |
2 | Understanding computer crime 1 | Chapter 1 |
3 | Understanding computer crime 2 | Chapter 1 |
4 | Protecting the infrastructure | Chapter 2 |
5 | Categories of Cyber Abusers, Attackers and Criminals | Chapter 3 |
6 | Categorizing Cyber abusers, attackers and criminals | Chapter 4 |
7 | The Human and Financial Costs of Cyber Abuse and Cybercrime 1 | Chapter 6 |
8 | The Human and Financial Costs of Cyber Abuse and Cybercrime 2 | Chapter 6 |
9 | How is IT Creating New Opportunities? 1 | Chapter 7 |
10 | How is IT Creating New Opportunities? 2 | Chapter 7 |
11 | Key Federal Cyber Crime Laws and Information Security Regulations | Chapter 8 |
12 | Cyber Crime Laws and Information Security Regulations in Turkey | Chapter 8 |
13 | Computer viruses | Chapter 11 (other sources 2) |
14 | Computer Ethics Education and Intolerance of Cybercrime | Chapter 11 |
15 | Final Examination Period | Review of topics |
16 | Final Examination Period | Review of topics |
Sources
Course Book | 1. Samuel C. McQuade, III. Understanding and Managing Cybercrime. Pearson, 2006. ISBN: 0-205-43973-X |
---|---|
Other Sources | 2. Kevin Mitnick & William L. Simon. The Art of Deception. Wiley Publishing, 2002. ISBN: 0-76454280-X |
3. Simson Garfinkel, Gene Spafford, Practical Unix and Internet Security, 2nd edition (April 1996), O'Reilly & Associates; ISBN: 1565921488 | |
4. Internet Suçları Yasası: http://bt-stk.org.tr/k5651.html | |
5. Eoghan Casey , Digital Evidence and Computer Crime, Second Edition, Academic Press, 2004 | |
6. Fighting Computer Crime: A New Framework for Protecting Information, John-Wiley, 1998 |
Evaluation System
Requirements | Number | Percentage of Grade |
---|---|---|
Attendance/Participation | - | - |
Laboratory | - | - |
Application | - | - |
Field Work | - | - |
Special Course Internship | - | - |
Quizzes/Studio Critics | - | - |
Homework Assignments | - | - |
Presentation | - | - |
Project | 1 | 30 |
Report | - | - |
Seminar | - | - |
Midterms Exams/Midterms Jury | 1 | 30 |
Final Exam/Final Jury | 1 | 40 |
Toplam | 3 | 100 |
Percentage of Semester Work | 60 |
---|---|
Percentage of Final Work | 40 |
Total | 100 |
Course Category
Core Courses | X |
---|---|
Major Area Courses | |
Supportive Courses | |
Media and Managment Skills Courses | |
Transferable Skill Courses |
The Relation Between Course Learning Competencies and Program Qualifications
# | Program Qualifications / Competencies | Level of Contribution | ||||
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
1 | An ability to apply knowledge of mathematics, science, and engineering. | X | ||||
2 | An ability to design and conduct experiments, as well as to analyze and interpret data. | X | ||||
3 | An ability to design a system, component, or process to meet desired needs. | X | ||||
4 | An ability to function on multi-disciplinary domains. | |||||
5 | An ability to identify, formulate, and solve engineering problems. | X | ||||
6 | An understanding of professional and ethical responsibility. | |||||
7 | An ability to communicate effectively. | |||||
8 | Recognition of the need for, and an ability to engage in life-long learning. | |||||
9 | A knowledge of contemporary issues. | X | ||||
10 | An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice. | X | ||||
11 | Skills in project management and recognition of international standards and methodologies | X | ||||
12 | An ability to produce engineering products or prototypes that solve real-life problems. | X | ||||
13 | Skills that contribute to professional knowledge. | |||||
14 | An ability to make methodological scientific research. | |||||
15 | An ability to produce, report and present an original or known scientific body of knowledge. | |||||
16 | An ability to defend an originally produced idea. |
ECTS/Workload Table
Activities | Number | Duration (Hours) | Total Workload |
---|---|---|---|
Course Hours (Including Exam Week: 16 x Total Hours) | |||
Laboratory | |||
Application | |||
Special Course Internship | |||
Field Work | |||
Study Hours Out of Class | 16 | 3 | 48 |
Presentation/Seminar Prepration | |||
Project | 1 | 20 | 20 |
Report | |||
Homework Assignments | |||
Quizzes/Studio Critics | |||
Prepration of Midterm Exams/Midterm Jury | 1 | 15 | 15 |
Prepration of Final Exams/Final Jury | 1 | 20 | 20 |
Total Workload | 103 |