Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

MISAMIS UNIVERSITY Prepared by: Gretel T.

Ricalde Document Code: Page 1 of 13


Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

A. COURSE SYLLABUS DETAILS

COURSE TITLE INFORMATION ASSURANCE AND SECURITY 1


COURSE DESCRIPTION This course covers the different threats, vulnerabilities, countermeasures, attacks, compromises, and remediation throughout the entire system;
the key factors involved in authentication, identity verification and system access grants; and the legal and ethical considerations related to the
handling and management of enterprise information assets.
CONTACT HOURS 2 hours lecture/ 3 hours laboratory
PRE-REQUISITE ITP 7
CO-REQUISITE None
CREDIT UNITS 3.0
Percentage

Periodical Examinations (Prelim, Midterm, Semifinals and Finals) - 40

COURSE EVALUATION Class Standing, Quizzes, Unit Test, Reports, Researches, Involvement/ - 60
Recitation/Oral Exam/Discussion, Application, Performance,
Manipulation of Equipment, Exercises and other forms of
Practical texting peculiar to the course

Total 100
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

REFERENCES
Printed:

R1: Misamis University Student Handbook

R2: Course Syllabus/Instructor Guide

R3: CSCU Downloaded Courseware

Module 1:

 “Computer Data and Information.” www.tutorialspoint.com. Accessed December 23, 2015.


http://www.tutorialspoint.com/computer_fundamntals/computer_data.htm.
 “Data and System Security.” Data and System Security. Accessed December 24, 2015. http://webcache.googleusercontent.com/search?q=cache:K7QLTj6l0LAJ:
www.advanced-ict.info/theory/ICT2/2-8%20Security%20of%20Data.doc.
 “Confidentiality, Integrity & Availability.” Confidentiality, Integrity & Availability. Accessed December 24, 2015.
http://ishandbook.bsewall.com/risk/Methodology/CIA.html.
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

Module 2:

 “Windows 8: Explore New and Improved Security Features.” Windows 8. Accessed December 14, 2015. https://www.microsoft.com/security/pc-
security/windows8.aspx.
 “What You Should Know about Windows 8 Security Features- TechRepublic.” TechRepublic. Accessed December 14, 2015. http://www.techrepublic.com/blog/it-
security/what-you-should-know-about-windows-8-security-features/.
 “How to Secure Windows 10.” ZDNET. Accessed December 14, 2015. http://www.zdnet.com/article/how-to-secure-windows-10-the-paranoids-guide/.
 “Turn User Account Control on or off- Windows Help.” Windows. Microsoft.com. Accessed December 16, 2015. http://windows.microsoft.com/en-
in/windows/turn-user-account-control-on-off#1TC=windows-7.
 “Change or Reset a User Account Password on Your Mac.” Apple. Accessed December 16, 2015. https://support.apple.com/en-us/HT202860.
 “OS X El Capitan: Set up Parental Controls.” OS X El Capitan: Set up Parental Controls. Accessed December 17, 2015. https://support.apple.com/kb/PH21683?
locale=en_US.
 “Apple.” Use File Vault to Encrypt the Startup Disk on Your Mac. Accessed December 17, 2015. https://support.apple.com/en-us/HT204837.

Module 3:

 “Common Malware Types: Cybersecurity 101.” Veracode. 2012. Accessed December 17, 2015. https://www.veracode.com/blog/2012/10/common-malware-
types-cybersecurity-101.
 “10 Warning Signs That Your Computer Is Malware Infected – Heimdal Security Blog.” Heimdal Security Blog. 2014. Accessed December 17, 2015.
https://heimdalsecurity.com/blog/warning-signs-operating-system-infected-malware/.
 “How Antivirus Software Works: Virus Detection Techniques.” SearchSecurity. Accessed December 15, 2015. http://searchsecurity.techtarget.com/tip/How-
antivirus-software-works-Virus-detection-techniques.
 Landesman, Mary. “Clean, Quarantine, or Delete?” About.com Tech. Accessed December 18, 2015. http://antivirus.about.com/b/2007/03/11/clean-quarantine-
or-delete.htm.
 “How to Choose the Right Antivirus Software.” COMBOFIX. Accessed December 18, 2015. http://www.combofix.org/how-to-choose-the-right-anti-virus-
software.php.
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

Module 4:

 “What Is Internet Security? – Definition from Technopedia.” Technopedia.com. Accessed December 03, 2015.
https://www.technopedia.com/definition/23538/internet-security.
 Neagu, Aurelian. “The Ultimate Guide to Secure Your Online Browsing: Chrome, Firefox and Internet Explorer – Heimdal Security Blog.” Heimdal Security Blog,
2014. Accessed December 03, 2015. https://heimdalsecurity.com/blog/ultimate-guide-secure-online-browsing/.
 “Better Web Browsing.” Better Web Browsing. Accessed December 03, 2015. https://help.riseup.net/en/security/network-security/better-web-browsing.
 Saluste, Margus. “Securing Internet Explorer.” Home of Windows. Accessed December 03, 2015. https://www.winhelp.us/securing-internet-explorer.html.
 “Change Edge Browser Settings in Windows 10.” The Windows Club. Accessed December 03, 2015. http://www.thewindowsclub.com/change-edge-browser-
settings-windows-10.
 “What Is the Safest Web Browser? Chrome, Firefox, IE, Opera, and Safari Comparison Chart.” TiptopSecurity. Accessed December 04, 2015.
http://tiptopsecurity.com/safest-web-browser-chrome-firefox-ie-opera-safari-comparison-chart/.
 “Google Chrome: Best Security Tips for Safer Browsing.” PCWorld. Accessed December 04, 2015. http://www.pcworld.com/article/2030873/google-chrome-
best-security-tips-for-safer-browsing.html.
 “Whitepapers.” www.technicalinfo.net. Accessed December 04, 2015. http://www.technicalinfo.net/papers/IMSecurity.html.
 McDowell, Mindi, and Allen Householder. “Keeping Children Safe Online.” US-CERT. Accessed December 04, 2015. https://www.us-cert.gov/ncas/tips/ST05-002.

Module 5
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

 “Social Networking Risks and Challenges.” – Information Security Awareness. Accessed December 07, 2015. http://infosecawareness.in/students/social-
networking-risks-and-challenges.
 “Photo Geotagging- How It Works & How to Disable It.” Yoursphere for Parents. Accessed December 07, 2015. http://internet-
safety.yoursphere.com/2011/03/location-based-services-and-geotagging-how-they-work/.
 “Geotagging Explained.” Geotagging Explained. Accessed December 07, 2015. http://everything.explained.today/Geotagging/.
 Schiffner, Bill. “Could You Fall Victim to Crime Simply by Geotagging Location Info to Your Photos?” Digital Trends. July 22, 2013. Accessed December 07, 2015.
http://www.digitaltrends.com/photography/could-you-fall-victim-to-crime-simply-by-geotagging-location-info-to-your-photos/.
 “Facebook.” Security Tips. Accessed December 07, 2015. https://www.facebook.com/help/379220725465972.
 “How to Control Your Data on Twitter | Me and My Shadow.” | Me and My Shadow. Accessed December 07, 2015. https://myshadow.org/how-to-increase-
your-privacy-on-twitter.

B. COURSE ALIGNMENT MATRIX


MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

Program Outcomes Course Outcomes Learning Outcomes


PO2: Use best practices and standards and  To master information security governance, and related  Understand what is data is and the difference between data and
their applications. legal and regulatory issues information
 To be familiar with how threats to an organization are  Understand how often data is generated
PO8: Function effectively as a member or discovered, analyzed, and dealt with  Understand the importance of personal and organizational data
leader of a development team recognizing the  To be familiar with network security threats and  Understand the different threats to data
different roles within a team to accomplish a countermeasures  Understand what data security is and the risks associated with
common goal.  To be familiar with network security designs using data compromise
available secure solutions  Understand the elements of security
PO9: Assist in the creation of an effective IT  To be familiar with advanced security issues and  Understand the potential losses due to a data breach
project plan. technologies  Understand how to implement data security
 Lock a windows system when not in use
PO12: Integrate professional, ethical, legal,  Create a user account password for a Windows system
security, and social issues and responsibilities in  Change a user account password for a Windows system
the utilization of information technology.  Disable the guest account of a Windows system
 Lock out unwanted guests from a Windows system
PO13: Determine the need for and engage in  Rename the administrator account of a Windows system
planning and self-learning and improving  Disable jump lists of a Windows system
performance as a foundation for continuing
 Enable software updates in a Windows system
professional development.
 Enable the firewall in a Windows system
 Add new apps in the firewall of a Windows system
 Create a new firewall rule in a Windows system

Program Outcomes Course Outcomes Learning Outcomes


MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

 Turn on Windows Defender


 Enable BitLocker in a Windows system
 Understand Windows Encrypting File System
 Decrypt a file using EFS in a Windows system
 Disable unnecessary services in a Windows system
 Kill unwanted processes in a Windows system
 Hide files and folders in a Windows system
 Disable simple file sharing in a Windows system
 Raise the UAC Slide Bar in a Windows system
 Lock a Mac system, when not in use
 Disable automatic login in Mac
 Allow app downloads from the Mac app store
 Enable automatic software updates in Mac
 Disable the guest account in Mac
 Enable FileVault in a Mac
 Enable the firewall in Mac
 Change the user account password s in a Mac
 Enable and set parental controls in a Mac
 Understand what Malware is
 Identify the various types of Malware
 Identify the various symptoms of Malware infection
 Understand what an antivirus is and how it works
 Understand how to choose the right antivirus software for you and
what its limitations are
 Configure and use Kaspersky and Avast antivirus software
 Test if your antivirus is working
Program Outcomes Course Outcomes Learning Outcomes
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

 Understand the basic security measures to implement when online


 Understand the different threats web browsers pose and their
countermeasures
 Configure web browsers in a secure manner
 Identify a secure website
 Understand the different threats posed by instant messaging apps
and their countermeasures
 Understand the different risks children are exposed to when online
 Identify if a child is a victim of online abuse and take corrective
measures if so
 Know about and use children friendly web browsers like KidZui
 Understand the concept of virtual social networking
 Understand what a profile is on social networking site and the
information it contains
 Understand the risks associated with online social networking
 Understand what geotagging is and the risks it poses
 Understand the various risks of online social networking that
minors are exposed to
 Configure the security settings of Facebook
 Configure the security settings of Twitter

(PRELIM: 13.5 Hours)


MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

Teaching Learning Resources/


Learning Objectives Content TA Activities Assessment References
Classroom
 Orientation to the Course, VMO 30 mins Class discussion Recite VMO, Core R1
 Levelling of expectations and discussion of the values, and PLO R2
intended learning outcomes and OBE approach for 30 mins
the course/subject LCD
Projector
Laptop
Class discussions Identify and present
 Understand what is data is and the difference  Data- Digital Building Block 1 Group discussions the meaning of data R3 Module
between data and information and information 1
 Understand how often data is generated  Importance of Data in the Information Age 2 Laboratory work
 Understand the importance of personal and Identify the different
organizational data  Threats to Data 3 type of data threats
 Understand the different threats to data
 Understand what data security is and the  Data Security 2 Discuss the meaning of
risks associated with data compromise data security
 Understand the elements of security  Elements of Security 1
 Understand the potential losses due to a data Identify the elements
breach  Implementing Security 2 of security
 Understand how to implement data security
Present how to
Prelim Assessment/Exam 1 hour and implement security
30 mins
PRELIM EXAMINATION
(MIDTERM: 13.5 Hours)
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

Teaching Learning Resources/


Learning Objectives Content TA Activities Classroom Assessment References
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

 Lock a windows system when not in use  Securing Operating Systems 4 Class discussions  Present the guidelines to R3 Module
 Create a user account password for a Group discussions secure Windows 10 and 3
Windows system  Guidelines to Secure Windows 10 4 MAC OS X
 Change a user account password for a Laboratory work  Present the 3 steps to lock a
Windows system  Guidelines for MAC OS X Security 4 personal computer or laptop
 Disable the guest account of a Windows when not in use
system  Present to prevent
 Lock out unwanted guests from a Windows automatic login of the user
system  Present the methods to
 Rename the administrator account of a create password in
Windows system Windows 10
 Disable jump lists of a Windows system  Present the methods to
 Enable software updates in a Windows disable the guest account
system  Present the method to lock
 Enable the firewall in a Windows system out unwanted guest
 Add new apps in the firewall of a Windows  Present the method to
system rename the administrator
 Create a new firewall rule in a Windows account
system  Present the method to
 Turn on Windows Defender disable jump lists
 Enable BitLocker in a Windows system  Present the steps to enable
 Understand Windows Encrypting File System the software and Windows
 Decrypt a file using EFS in a Windows system update
 Disable unnecessary services in a Windows  Present the steps to enable
system windows firewall
 Kill unwanted processes in a Windows system  Present the steps to add
 Hide files and folders in a Windows system new apps in windows
 Disable simple file sharing in a Windows firewall
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

system  Present the steps to turn on


 Raise the UAC Slide Bar in a Windows system windows defender
 Lock a Mac system, when not in use  Present the steps to enable
 Disable automatic login in Mac bitlocker
 Allow app downloads from the Mac app store  Present the steps in
 Enable automatic software updates in Mac windows encrypting file
 Disable the guest account in Mac system
 Enable FileVault in a Mac  Present the steps to decrypt
 Enable the firewall in Mac a file
 Change the user account password s in a Mac  Present the steps to disable
 Enable and set parental controls in a Mac unnecessary services in
windows
1 hour  Discuss and identify the
Midterm Assessment/Exam and 30 security checklist
mins
MIDTERM EXAMINATION

(SEMIFINALS: 13.5 Hours)

Teaching Learning Resources/


MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

Learning Objectives Content TA Activities Assessment References


Classroom
 Understand what Malware is  What is Malware? 2 Class discussion Present the different
 Identify the various types of Malware types of Malware
 Identify the various symptoms of Malware  Antivirus 2
infection Identify the different
 Understand what an antivirus is and how it  Understanding Web Browser Concepts 2 symptoms of malware
works infection
 Understand how to choose the right antivirus  Instant Messaging 3 Class discussions
software for you and what its limitations are Group discussions Present and discuss the
 Configure and use Kaspersky and Avast  Child Online Safety 3 the antivirus duty
antivirus software Laboratory work
 Test if your antivirus is working Present the right way
 Understand the basic security measures to to choose antivirus
implement when online
 Understand the different threats web Discuss the limitations
browsers pose and their countermeasures of antivirus software
 Configure web browsers in a secure manner
 Identify a secure website Present on how to
 Understand the different threats posed by install and activate
instant messaging apps and their Kaspersky and Avast
countermeasures antivirus
 Understand the different risks children are
exposed to when online Present the steps to
configure parental
control in Kaspersky
MISAMIS UNIVERSITY Prepared by: Gretel T. Ricalde Document Code: Page 1 of 13
Oroquieta City Instructor MU-DIT-SYL-IG-ITP9
Office of the Vice President for Academic Affairs Checked by: Markdy Y. Orong Revision Date: Units:
Department Head May 18, 2018 3.0
DEPARTMENT OF INFORMATION TECHNOLOGY
Reviewed by: Rojaida S. Tabanao Revision No.: Subject:
OIC, Curriculum Design & Development 1 ITP 9
SYLLABUS/INSTRUCTOR’S GUIDE
Prerequisite: Co-requisite:
Descriptive Title: Information Assurance and Security 1 ITP 7
MU-ACA-041/18May2018

Teaching Learning Resources/


Learning Objectives Content TA Activities Assessment References
Classroom
 Identify if a child is a victim of online abuse Class discussion Present the steps to R3 Module
and take corrective measures if so check the antivirus is 3 and
 Know about and use children friendly web working properly Module 4
browsers like KidZui
Present the steps to
secure web browsers
Class discussions
Group discussions Present the feature of
instant messaging
Laboratory work
Present the security
issues in instant
messaging

Present and identify


different types of crime
in the internet

1 hour and Present a guidelines for


Semifinal Assessmen/Exam 30 mins child online safety
SEMIFINAL EXAMINATION

You might also like