Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

A FEASIBILITY STUDY ON OFFERING

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY


Major in INFORMATION AND NETWORK SECURITY

DANILO C. SABADO, D.T.


Dean

Page 1 of 17
TABLE OF CONTENTS

Cover Page 1

Table of Contents 2

Executive Summary 3

Rationale of the Proposed Program 6

Market Demand 9

Program Sustainability 12

Organization and Staffing 12

Industry Partners 14

Physical Resources 15

Financial Plan 15

References 16

Appendices

CHED CMO

Documents of Institutional Financial Support

MOA

Page 2 of 17
EXECUTIVE SUMMARY

The past decade has shown remarkable increase in the complexity of


computational systems that society has come to rely on. This has arisen to a
number of new and challenging issues brought about by the new technological
innovations. Some of these societal computing issues include electronic market
mechanisms and automated negotiation, dynamic network modelling, platform-
based product ecosystems, data privacy and privacy rights management, and
the application of computational and numerical techniques to solve large and
complex problems.

The current degree programs in traditional disciplines such as computer


science, policy and management fail to provide the kind of multi-disciplinary
curriculum needed to train computer professionals in these emerging areas.
Today’s demand for integrated expertise far exceeds supply; and as it continues
to grow, it becomes increasingly important to offer a program that fills the void.
Offering new programs will take advantage of not only the improvements in
computer hardware, but probably more importantly, the improvements in
computer algorithms and mathematical techniques.

According to the news of Rappler, the Philippines, based on various


cybersecurity reports, may not be as prepared compared to other countries. In
2014, the country ranked 9th among Asia Pacific countries when it comes to
cybersecurity readiness, according to the Global Cybersecurity Index (GCI).

In the 3rd quarter of 2015, meanwhile, Kaspersky Lab reported that the
Philippines took the 33rd spot out of 233 countries prone to cybersecurity
threats – a huge jump from the previous quarter’s 43rd rank. The security firm
warned that the rise indicates that “cyber-attacks against the Philippines are
accelerating at full speed.” It may not show now, but “there is no doubt that
cybercriminals are now noticing the country”, with 17% of Filipino users’
systems infected with malicious programs or malware used by cybercriminals.
Symantec’s latest Internet Security Threat Report (ISTR) said the Philippines
placed 20th globally and 3rd in the Asia Pacific region for social media scams. It
added that in 2015, the country was hit by an average of 17 ransomware
attacks a day – a type of virus that prevents a user from accessing his system.

The shortage of skilled and qualified cybersecurity, information and


network security professionals are the biggest issues facing our Internet-
connected world today. The College of Computer Science is helping to close this
gap as a leader in computing education in this university addresses this needs
and embrace challenges by offering new program- Bachelor of Science in
Information Technology major in Information and Network Security (BSIT-INS).

Information and Network Security professionals are tasked in resolving


information and network security issues when they inevitably arise. This
Page 3 of 17
program prepares students to tackle those challenges by training them in the
latest skills and practices based on the industry needs and standards. BSIT-
ISN program also encourages IT certifications (leading to CISSP, CISM,
Security+, and Cisco Security), so students will earn professional credentials as
well as a degree. Students can also earn technical certifications outside of a
degree program. Doing so can help graduates advance their careers and boost
their earning potential.

Page 4 of 17
RATIONALE FOR THE PROPOSED PROGRAM

The following discussion summarizes the findings of the researcher in


holistic view of offering the BS in Information Technology major in Information
and Network Security Program of the University of Makati based on the
interview, research and documentary analysis:

OBJECTIVES OF THE STUDY


The ultimate goal of this study is not limited to identifying the feasibility of
offering the BS in Information Technology major in Information and Network
Security program. This study can serve as an initial step to further investigate
industry and societal needs for network security engineers.

General Objective
The general objective of the study is focused on gathering and analyzing
data to prepare a feasibility of offering a four-year program in Bachelor of
Science in Information Technology major in Information and Network
Security at the University of Makati, Makati City, Philippines.

Specific Objectives
It specifically aimed to:
 To identify the strengths and weaknesses in terms of external and
internal factors
 To determine whether the proposed curricular program is feasible; and
 To identify the preparedness of the college in housing the BS in
Information Technology major in Information and Network Security in
the areas of infrastructure and equipment.

Description and Purpose


BSIT-INS is a comprehensive study of the principles and practices of
information technology security including web, network, cybersecurity,
practical cryptography, steganography, digital forensics, wired and wireless
networking, common attacking techniques and the laws governing cyber
operations. Students learn a variety of in- demand skills, including detecting
and preventing network attacks; identifying and preventing vulnerabilities in
software applications; the formalisms of information security such as access of
information flow control; the common security policies and network
reconnaissance, intrusion, and data exfiltration from both a defensive and
offensive standpoint. Student will present an innovative proposal design of
information and network security in their capstone project as an output of the
program. Graduates of this program can accentuate placement in the industry
as IT Security Professional, Security and Malware Engineers, Security and
Forensic Experts, IT Security Analyst, IT Auditor and other careers related to IT
Security.

Page 5 of 17
Strategic Alignment

The College will design its curricular offering by 1) implementing the New
General Education Curriculum (CMO No. 25, s. 2015) which will remove the
redundancy to courses rendered by the Grade 11 and Grade 12 (HSU)
curriculum; 2) realigning professional courses to industry needs and standards
with strong industry partnership and involvement; and 3) harmonizing the
college’s Brand of Graduate Attributes (BGA) to international standards set by
the Seoul Accord, the Information Security Officers Group, Inc. (ISOG) and the
Philippine Computer Society (PCS) following the Outcomes-Based Education
(OBE) framework.

Student Level Educational Objective

Bachelor of Science in Information Technology major in Information and


Network Security (BSIT-ISN) program will perform processes that support the
management and delivery of secured Information, Communication &
Networking services and system through converged technology. Graduates are
expected to perform the following:
 To generate analysis, design, and systems appropriate for the computing
specialization or Information Technology from a well-defined problems
and requirements in the most favorable provisions.
 To demonstrate conformity to high moral rectitude and system of rules.
 To provide and communicate applicable solutions and services that
includes strategic planning, technology evaluation and application, and
complex business information and network security synthesis that
enable the organization to achieve its goals.

THE SWOT ANALYSIS

Strengths
In the recent years, the University of Makati and the College of Computer
Science has overcome several weaknesses during the decade of operation.
Based on the assessments made, the following are strengths: First, the
University itself, with the support from the local government is stable with 46
years of existence and continuously providing quality education to the
studentry. Second, the classrooms are conducive for learning, the Laboratory
Facilities and equipment are state-of the art with latest software and hardware
technology. The University is equipped with internet facilities. Third, the
Faculty members of the College are almost all master’s degree holders and the
administrative personnel are educationally prepared with appropriate
experience. Fourth, transaction in the University is highly systematized with
the aid of various Information Systems. The Bachelor of Science in Information
Technology major in Information and Network Security is in demand in the
nation due to global competitiveness and scarcity of professionals by

Page 6 of 17
educational background. Almost all of the advanced countries in the world are
now particular in keeping their network, infrastructure and all organizational
data and information safe. In Makati City and neighboring cities, there are
numerous giant businesses, companies and organizations that need network
security engineers to address and keep their data and network safe. Lastly, in
the Philippines, from the report from industries, information and network
security is starting to dominate the cyber world.

Weaknesses
By the end of next year, it is predicted that one to two million cyber
security jobs will remain unfilled. About six million cyber security analysts will
be needed, with only between four and five million available to fill the positions.
Cybersecurity is an emerging field. Though businesses and industries are
leveraging on this field of study, the discipline has not yet totally embraced by
educational institutions, thus, Senior High School graduates are unaware of
these programs. Currently, marketing the program is a work in progress for the
university and the College of Computer Science. However, revising the existing
programs and offering this new program will help in introducing this field to
incoming students and prospected enrollees.

Opportunities
The university has established its name for offering ITE courses. The
physical location of the University serves as an opportunity both for prospected
enrollees as well as industry partners. Another opportunity that the students,
faculty and staff of the College of Computer Science availed is exposures to the
latest developments in the field of information and network security.

Threats
Big number of students relies on scholarship given by the local
government and other non-government organizations. The sustainability of
their support may help or may risk deserving students to finish the program.

Page 7 of 17
MARKET DEMAND

Student Demand
With so many jobs available, and the need to fill them so dire, more
colleges are offering degrees in cybersecurity, though it has yet to become a
staple in undergraduate coursework for students majoring in related fields.
For many professionals currently in the cybersecurity field, they learned
the necessary skills through certificate programs and in-the-field training
versus degree programs.

Career Opportunities
 Chief Information Security Officer
 Data Security Analyst
 Forensic Computer Analyst
 Information Security Analyst
 Penetration Tester
 Security Architect
 IT Security Engineer
 Information System Security Manager
 Security Systems Administrator
 Network Security Administrator
 Network Security Engineer
 IT Security Consultant

Page 8 of 17
Labor market information (projections, job posting analyses, and wages)

Companies are having problems finding the security professionals that


they need, and schools are not graduating enough students with the necessary
talents or experience for entry-level positions in cybersecurity.

Figure 1. Worldwide Demand for Information Security

The demand for skilled cyber security professionals who can handle
advanced network security design and disaster recovery is on the rise, as the
incidents of corporate computer and network breaches increase. Job openings
for network security experts are expected to grow beyond 10 percent through
2020, according to the Bureau of Labor Statistics. The Bachelor of Science in
Information Technology major in Information and Network Security (BSIT-INS)
is an in-depth education program with a broad-based curriculum to place
graduates in successful cyber career positions.

Some of the acquired skills include those associated with network


administration and security, computer networks, data communications,
protecting electronic data through both offensive and defensive tactics,
penetration testing, ethical issues, firewalls, security designs in Linux and
Microsoft platforms, VPN as well as computer forensics. Some of the courses
taken in network security program may qualify for certifications through
professional organizations and vendors like CompTIA that meet industry-
recognized standards. Overall, the degree equips students with advanced skill-
sets to design network security programs for a variety of organizations.

In fact the cyber security engineer skills shortage is already becoming


critical: A recent report by McAfee, Hacking the Skills Shortage, found that
82% of a group of 775 IT and cyber security decision-makers reported that they
had a shortage of cyber security skills within their company.

Page 9 of 17
In addition, the research carried out by Indeed.com in 2017 confirmed
that although organizations are advertising cyber security analyst job postings,
there are simply not enough candidates to fill those posts. In the U.S. there are
only two candidates for every three job vacancies advertised, while in other
parts of the world the situation is even direr. In the UK and Ireland there is
only about one candidate for every three vacancies and the situation is
deteriorating.

More recently, a report called The Life and Times of Cybersecurity


Professionals, by Enterprise Strategy Group (ESG) and the Information
Systems Security Association (ISSA), found that 22% of survey respondents
who had suffered a security incident over the last two years said their cyber
security team was not large enough for the size of their organization, and 18%
said that the existing cybersecurity team could not keep up with the workload.

All in all, it is pretty clear evidence that IT security jobs are going to be in
plentiful supply, and those with the right skills will be able to take their pick.

Page 10 of 17
PROGRAM SUSTAINABILITY

Organization and Staffing

There are strong and qualified thirty one (31) CCS faculty members; fifteen
(15) of whom are full time tenured faculty members and are already graduates
of Master in Information Technology and other IT Allied programs. There are
also twelve (13) full-time casual faculty members and three (3) part-time faculty
members all have IT industry backgrounds. There are also positions which are
vacant for CCS faculty applicants.

Table 1. Profile of College Administrators

DESIGNATION NAME ACAD. HIGHEST PROFESSIO LENGTH OF LENGTH OF


RANK DEGREE NAL TEACHING ADMIN
EARNED AFFILIATIO EXPERIENCE EXPERIENCE
NS OR
FIELD OF
SPECIALIZA
TION
1. Dean DANILO C. SABADO Associate Doctor of PSITE/PCS 14 years 3 yrs.
Professor V Technology IT / CS 6 mos.
2. College JANICE POLA D. Assistant Master of IT / CS 11 years 1 yr.
Secretary CONGZON Professor IV Information 7 mos.
Technology
3. Software ROEL C. TRABALLO Assistant Master of PSITE 23 years 2 yrs.
Department Professor IV Science in IT / CS 1 mo.
Chair Information
Technology
4. Hardware PERCIVAL D. ADAO Instructor I Master of PCS 18 years 2 yrs.
Department Information IT 3 mos.
Chair Technology

Page 11 of 17
Table 2. Faculty Roster for the BS Information Technology Major in
Information and Network Security
Program of the University of Makati
No. NAME ACAD. RANK HIGHEST DEGREE PROFESSIONAL LENGTH OF
EARNED AFFILIATIONS TEACHING
OR FIELD OF EXPERIENCE
SPECIALIZATION
1. FULL-TIME (REGULAR)
1 Asejo, Nelson R. Associate MIT IT/CS 7 years
Professor IV Doctor of
Technology(ac)
2 David, Rowena S. Instructor I BSCS – MIT units IT/CS 14 years

3 Dorin, Rommel L. Instructor III MIT IT/CS 10 years

4 Gannaban, Era Marie Assistant MIT IT/CS 10 years


F. Professor I 2 mos
5 Lobarbio, Genesis Reb Instructor I GC –IMD IT/CS 17 years
S. 3 mos
6 Naim, Ali A. Instructor I MIS-ITEM IT/CS 19 years
3 mos
7 Pahayahay, Alexander Assistant MIT PSITE 10 years
B. Professor II IT/CS
8 Tadeo, Cecilia E. Associate Ph.D. in PSITE 18 years
Professor I Development Board of 3 mos
Administration Professional
Teachers
IT/CS
9 Arcalas, Lilibeth H. Assistant MS Math(c) IT
Professor 1
10 Dechavez, Anna MIT IT
0 Charisma F.
11 Devera, Raul M. MIS-ITEM IT
12 Sicat, Emily F. MAEd. IT
13 Sabado, Danilo C. Associate Doctor of Technology PSITE 14 years
Professor V PCS
IT/CS
14 Adao, Percival D. Instructor I MIT PCS 18 years
IT
15 Congzon, Janice Pola Assistant MIT IT/CS 10 years
0 D. Professor IV
2. FULL-TIME (CASUAL)
1 Bucad, Abelardo T Assistant MIS-ITEM IT/CS 10 years
Professor IV 10 mos
2 Cervantes, Mary Assistant MTE, MIS-ITEM IT/CS 1 year
Ellaine R. Professor III 4 months
3 Diampoc, Lester G. Assistant Master of Science in PSITE 1 year
Professor IV Mathematics IT/CS 2 mos
4 Dasig, Daniel, Jr. Associate BS CoE, MSEng.
Professor III
5 Duran, Elizalde J. Associate MIT, PgD.Th. (ac) IT/CS 9 months
Professor II DT (ac)
6 Mangaba, Joel B. Assistant Doctor of Technology IT/CS 9 mos.
Professor IV
7 Mansueto, Christian Assistant Masters – MIS-ITEM PSITE 2 yrs
Michael M. Professor III IT/CS 3 mos

Page 12 of 17
8 Plan, Jomariss B. Assistant MSIT IT/CS 9 mos.
Professor III
9 Olivo, Michael C. Assistant MIT IT
Professor IV
10 Sabado, Wilber B. Assistant MM IT
Professor II
11 Delpomo, Bhai Assistant MSICT IT
Nhuraisha I. Professor I
12 Cruz, Edgardo T. Assistant MIT IT
Professor IV
13 Gabriel, Jarby DC. Assistant GC – IMD IT
Professor IV
3. PART-TIME
1 Alar, Hernan S. Assistant MIS-ITEM IT/CS 2 years
Professor III
2 Pepito, Corpernicus P. Assistant MSCS, MBA IT/CS 2 years
Professor II
3 Cortez, Rex Jayson T. Assistant MIS-ITEM IT/CS 2 years
Professor III

Industry Partners
Since traditional content area instruction does not necessarily produce
graduates who are well- prepared to become employees, it is vital that, on an
ongoing basis, institutions identify the skills and knowledge that learners need
to acquire. Employers can offer valuable advice on training content. They know
specifically which work readiness and technical skills are required and the
gaps they most often see in new graduates. In order to ensure that the
curriculum addresses industry needs, it is imperative that educational
institutions have an active relationship with potential employers.
The industry partners should also be the source of information on the
relevance of the curriculum. They may be encouraged to share the current
trends and issues in the industry, their required competencies for personnel,
the reality in the workplace, and other noteworthy information that will benefit
the curricular review process.
Currently, the University of Makati, College of Computer Science
considered the following industries in the curriculum development of the
Bachelor of Science in Information Technology major in Information and
Network Security:

 MSI-ECS  DJI DRONEREPAIR.PH


 EXPERTSACADEMY  SENTI
 CLOUDSWYFT  CONVERGE FIBER
 DATAONEASIA (PHILIPPINES)  CERTIFIED DIGITAL
INC MARKETER

 CAUCUS - BUSINESS THINK TANK


 VEEAM

Page 13 of 17
 DELL EMC  SCHNEIDER ELECTRIC
 DATABLINK  ITG VENTURE AHEAD
 BEYONDTRUST  AUGMENTBPOPH
 WESTCON SOLUTION  RED FLAG GROUP
 SECURE METRIC  ACCENTURE
 SOMANSA  NETWORLD CAPITAL
 TREND MICRO VENTURES CORP.
 DIMENSION DATA  P.J. LHUILLIER GROUP OF
 MSI-ECS COMPANIES
 DMAIPH

Page 14 of 17
Physical Resources
There are enough facilities and equipment available in the college. These
facilities and equipment are the existing facilities and equipment used by the
existing programs namely, Information Technology Service Management,
Computer Network Administration and Computer Science. On classroom, the
College of Computer Science is utilizing the Computer Laboratories in
Academic Buildings 2 and 3 together with the Computer Laboratories at the
HPSB. Lecture rooms are also available on the aforementioned infrastructures.
An existing Hardware Laboratory will be converted to a network and security
laboratory as part of the AIP for 2018-2019.

The college has also acquired at least forty (40) Information and Network
Security Books as stated in the AIP for 2018-2019. In addition, IT and
Computing Journals and E-Journal subscriptions will also be acquired, giving
enough references and basis as the program offering progresses.

Financial Feasibility
On Financial Requirements for the Five -year period, based on the conducted
research, the University, supported by the local government of Makati City is
financially stable and can sustain and maintain the operation of this proposed
BS in Information Technology major in Information and Network Security
program.

Page 15 of 17
REFERENCES

Department of Computer Science & Network Engineering, Southern Nazarene


University, USA, http://www.snu.edu/department-of-computerscience-
network-engineering

Department of Computer Information and Network Engineering, Lunghwa


University of Science and Technology, Taiwan,
http://english.moe.gov.tw/sp.asp?xdURL=./school
/school_21_departments_department.asp&SchoolID=1030&SchoolAcademyID=
96&AcademyDepartmentID=78&ct
Node=6571&href_from=&eat_subcategory_str=&mp=103 0

Computer and Network Engineering, Sheffield Hallam University, UK,


http://prospectus.shu.ac.uk/op_pglookup1.cfm?id_nu m=391

Computer & Network Security, Wilmington University., USA,


http://www.wilmu.edu/itac/cns_about.aspx

Network Engineering, FH Kärnten, Austria,


http://www.fhkaernten.at/cms_eng/tel.htm

The Department of Networking, Security, and Systems Administration,


Rochester Institute of Technology, USA, http://www.nssa.rit.edu/?q=node/4

Master in computer Networking, North Carolina State University, USA,


http://networking.ncsu.edu/index.php\ [16] Master of Science in Security
Informatics, The Johns Hopkins University, USA,
http://web.jhu.edu/jhuisi/institute/index.html

Masters in Network Management and Security, Murdoch University, Australia,


http://intsec.murdoch.edu.au/mnms_structure.ht ml

Master of Information Systems Security, Charles Sturt University, Australia,


http://www.csu.edu.au/handbook/handbook05/p g/p5_12.html

Alumni Survey. Jordan University of Science and Technology.


http://www.just.edu.jo/~fhawad/cpefinall1/

Closing The IT Network Skills Gap, How managers can understand and prepare
fornew networking skill requirements. Cambridge : Forrester Research Inc.,
June, 2008.https://learningnetwork.cisco.com/servlet/JiveServlet/
previewBody/2300-102-2-6266/Forrester/- /Cisco/TLP/Fina/0060208.pdf

https://www.computerworld.com/article/2495985/it-careers/demand-for-it-
security-experts-outstrips-supply.html
Page 16 of 17
http://www.philstar.com/banking/2016/04/12/1571843/lack-it-security-
professionals-makes-philippines-prone-cyber-crime

https://www.computerworld.com/article/2495985/it-careers/demand-for-it-
security-experts-outstrips-supply.html

http://www.philstar.com/banking/2016/04/12/1571843/lack-it-security-
professionals-makes-philippines-prone-cyber-crime

Authors:

DANILO C. SABADO, D.T.


HERNAN S. ALAR, MIS
NELSON R. ASEJO, MIT
ERA MARIE F. GANNABAN, MIT
CECILIA E. TADEO, Ph.D.

Page 17 of 17

You might also like