Professional Documents
Culture Documents
Information Assurance and Security 1 - Obe Syllabus
Information Assurance and Security 1 - Obe Syllabus
Vision Statement:
As an institution, Coland Systems Technology Incorporated envisions to:
Inculcate patriotisms, nationalism, love of humanity and environment, respect for human rights, personal discipline and critical thinking.
Constantly strive in making a positive difference in the lives of the graduates and the people in the community.
Mission Statement:
Provide, promote and protect the rights of students to quality education at all levels and shall take appropriate and concrete steps to make education accessible, as well as
affordable to all.
Establish, maintain and support adequate, complete and integrated system of education, catering the relevant needs of Filipino people at present time.
Institute and maintain a system of scholarship grants, loan program and other form of incentives, which shall be available to the marginalized, underprivileged and most
especially to the poorest of the poor, but deserving students.
Encourage non - formal, informal, indigenous learning's, as well as self - learning systems, and out - of - study programs, responsive to the needs of the community.
Provide adult education to the disabled, out - of - school youth with trainings in civics, vocational efficiency and other skills.
Course Plan
Time Frame Topic Learning Outcomes Methodology Resources Assessment
Computer Security At the end of the unit the student must have: Lecture using Textbooks
Confidentiality To recognize the importance of PowerPoint Online quiz using
Integrity computer security presentation Laptop google form
Availability To define and differentiate the term
Why Buy security confidentiality, integrity and Online class discussion Google meet Graded recitation
Elements of Computer Security availability using google meet
Extent of responsibilities Discuss the importance of buying Trusted websites Case study
Threat Categories security Sharing related
Reported Crimes Identify the elements of computer experience about the
Disgruntled employee or security topic
contract employee Recognize the extent of
Organized crime or drug cartel responsibilities of the different
Cyber criminal stakeholders,
Competitors Identify and discuss the different
Hackers threat categories
Government Characterize the different reported
crimes
Implications of Threats to To identify the different implication Lecture using Textbooks
Organizations of threats to organization PowerPoint Online quiz using
Financial losses Categorize the different techniques presentation Laptop google form
Loss of intellectual capital of intruders from simple to
Privacy sophisticated methods Online class discussion Google meet Graded recitation
Image loss Identify the different organizational using google meet
Legal implications shortcomings Trusted websites Case study
Techniques of Intruders Recognize some of the management Sharing related
Simple methods concerns today experience about the
topic
Sophisticated methods
Most common attack methods
Internal
External
Organizational Shortcomings
Management Concerns
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City
Types of Information Security Controls Discuss the types of information Lecture using Textbooks
Audit trails security controls being PowerPoint Online quiz using
Intrusion detection methods implemented today. presentation Laptop google form
Checksums Identify and explain the different
Types of Controls types of controls Online class discussion Google meet Graded recitation
Deterrent controls Identify the different preventive using google meet
Corrective controls administrative controls and Trusted websites Case study
Recovery controls detective administrative controls Sharing related
Physical Control experience about the
topic
Preventive Physical Control
Detective Physical Control
Preventive Administrative Controls
Detective Administrative Controls
Information Security Management Recognize the importance of Lecture using Textbooks
Introduction to the Management information technology and PowerPoint Online quiz using
of Information Security understand who is responsible for presentation Laptop google form
DIKW Hierarchy protecting an organization’s
Three Distinct communities of information assets. Online class discussion Google meet Graded recitation
interests of information Know and understand the definition using google meet
Components of Information and key characteristics of leadership Trusted websites Case study
Security and management. Sharing related
The CIA Triangle + Recognize the characteristics that experience about the
Management Theory differentiate information security topic
Control Process management from general
management.
Planning for Security Recognize the importance of Lecture using Textbooks
Information Security Planning planning and describe the principal PowerPoint Online quiz using
Strategic Planning components of organizational presentation Laptop google form
Mission/Vision/Value planning.
Statement Know and understand the principal Online class discussion Google meet Graded recitation
Tactical Planning components of information security using google meet
Operational Planning system implementation planning as Trusted websites Case study
Systems Development Life it functions within the Sharing related
Cycle (SDLC) organizational planning scheme. experience about the
Create a simple set of contingency topic
Security System Development
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City
Life Cycle (SecsSDLC) plans, using Business Impact
Security Models Analysis
Security Program Management Prepare and execute a test of
Contingency Plan (CP) contingency plans
Components
Contingency Plan Components
Disaster Recovery Plannign
(DRP)
Business Continuity Planning
Business Impact Analysis
(BIA)
Testing Contingency Plan (CP)
Information Security Policy
Policy – Bulls – eye model
layers
Enterprise Information Systems
Policy (EISP)
Issue Specific Security Policy
(ISSP)
Systems – Specific Policies
(SysSPs)
Access Control Lists
Guidelines for Policy
Development
The Information Security
Policy Made Easy Approach
(ISPME)
Screen Processing Recall screen – processing Lecture using Textbooks
The Monitor techniques PowerPoint Online quiz using
Clearing the Screen in Implement these techniques in presentation Laptop google form
Assembly Approach developing assembly language
Setting the cursor position Acknowledge the significance of Online class discussion Google meet Graded recitation
Color Chart interrupt functions in using these using google meet
techniques Trusted websites Case study
Sharing related
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City
experience about the
topic
Keyboarding Processing with Control Enumerate the assembly language Lecture using Textbooks
Flow tools that are used for control and PowerPoint Online quiz using
Character Input logic flow presentation Laptop google form
Character Input without echo Make use of LOOP, CMP, JMP and
The CMP Instruction unconditional jump instructions Online class discussion Google meet Graded recitation
Conditional Jump Instruction Know the usefulness of using google meet
Input String representing the logic of the Trusted websites Case study
program Sharing related
experience about the
topic
Using Procedures Evaluate what a procedure in Lecture using Textbooks
Procedure Assembly language is PowerPoint Online quiz using
Designing Programs using Learn how to set up programs those presentation Laptop google form
procedures call procedures
Calling procedure Acknowledge the task and Online class discussion Google meet Graded recitation
Returning from a procedure responsibility of a procedure in using google meet
program development. Trusted websites Case study
Sharing related
experience about the
topic
Character – Coded Data and I/O Familiarized and apply the ASCII Lecture using Textbooks
Routines character PowerPoint Online quiz using
Control Characters Introduce the DOS int 21h Function presentation Laptop google form
Formal Control Calls
Transmission Control Online class discussion Google meet Graded recitation
Traditional Character Device using google meet
Traditional Character Device Trusted websites Case study
input and output Sharing related
experience about the
topic
Course Requirements Quizzes, Recitation/Class Participation
Final Requirement/Assignments/Researches/Library Work
Reading Whiteman, Michael E., “Principles of Information Security”, Cengage Learning, c2018
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City
And Greer, Melvin B., “Practical Cloud Security: A Cross Industry View”, CRC Press, c2017
References Chapman, Chris, “Network Performance and Security: Testing and Analyzing using Open Source and Low Cost Tools” Elsevier, c2016
Mason, Stephen, “Computing Security and Cryptography.” Lanrye International, c2015
Ciampa, Mark, “Security Awareness: Applying Practical Security in your World” Cengage Learning, c2014
Jacobs, Jay, “Data – Driven Security: Analysis, Visualization, and Dashboards”, John Wiley and Sons, c2014
Shostack, Adam “Threat Modeling: Designing for Security”, John Wiley & Sons, c2014
Fennelley, Lawrence J., “Effective Physical Security 4 th Edition” , Elsevier, c2013
Prepared By: Date Reviewed By: Date