Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

COLAND SYSTEMS TECHNOLOGY INCORPORATED

Peñas Building, Sinsuat Avenue


Cotabato City
COLLEGE OF COMPUTER STUDIES

Course Title: Information Assurance and Security


Course Code: IT 223
Credit Units 3 Units
Course Prerequisite: Computer Programming 2
Course Description This course touches on the issues surrounding the private citizens concern for privacy, the government impact on laws and public policy,
the importance of management and administration, and the place information security holds in overall business risk. Technically, the
course examines the general dimension of providing security for information processing systems – secure operating systems and
applications, network security, security protocols, policies, etc.

Vision Statement:
As an institution, Coland Systems Technology Incorporated envisions to:
 Inculcate patriotisms, nationalism, love of humanity and environment, respect for human rights, personal discipline and critical thinking.
 Constantly strive in making a positive difference in the lives of the graduates and the people in the community.

Mission Statement:
 Provide, promote and protect the rights of students to quality education at all levels and shall take appropriate and concrete steps to make education accessible, as well as
affordable to all.
 Establish, maintain and support adequate, complete and integrated system of education, catering the relevant needs of Filipino people at present time.
 Institute and maintain a system of scholarship grants, loan program and other form of incentives, which shall be available to the marginalized, underprivileged and most
especially to the poorest of the poor, but deserving students.
 Encourage non - formal, informal, indigenous learning's, as well as self - learning systems, and out - of - study programs, responsive to the needs of the community.
 Provide adult education to the disabled, out - of - school youth with trainings in civics, vocational efficiency and other skills.

Institutional Learning Outcomes Program Outcomes Course Outcomes


1. Creative and Critical Thinking By the time of graduation, the students of the program shall After completing the course, the student must be
Graduates use their imaginative as well as rational have the ability to: able to:
thinking abilities to life situations in order to push
boundaries, realize possibilities, and deepen their a. Apply knowledge in mathematics and science to solve  Understand the importance of information
interdisciplinary and general understanding of the world. complex engineering problems; security, access control, and how it affects
2. Effective Communication b. Design and conduct experiments, as well as to analyze our changing world.
Graduates are proficient in the four macro skills in and interpret data;  Learn how to critically analyze situations
communication (reading, writing, listening and speaking) c. Design a system, component, or process to meet desired
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City
and are able to use these skills in solving problems. needs within realistic constraints such as economic, of computer use, identifying the issues,
Making decisions and articulating thoughts when engaging environmental, social, political, ethical, health and safety, consequences and viewpoints.
with people in various circumstances. manufacturability and sustainability, in accordance with  Recognize the importance of planning and
3. Strong Service Orientation standards; know the major components of
Graduates exemplify the potentialities of an efficient, well d. Function on multidisciplinary teams; contingency planning.
– rounded and responsible professional deeply committed e. Identify, formulate and solve complex engineering  Develop, implement and maintain various
to service excellence. problems types of information security policies.
4. Community Engagement f. Understanding of professional and ethical responsibility  Recognize and understand the
Graduates take an active role in the promotion and g. Communicate effectively organizational approaches to information
fulfillment of various advocacies (educational, social and h. Broad education necessary to understand the impact of security.
environmental) for the advancement of community engineering solutions in a global, economic,
welfare. environmental, and societal context;
5. Adeptness in the Responsible Use of Technology i. Recognition of the need for, and an ability to engage in
Graduates demonstrate optimized use of digital learning life – long learning;
abilities, including technical and numerical skills. j. Knowledge of contemporary issues;
6. Passion to Lifelong Learning k. Use technique, skills and modern engineering tools
Graduates are enabled to perform and function in the necessary for engineering practice and
society by taking responsibility in their quest to know l. Knowledge and understanding of engineering and
more about the world through lifelong learning. management principles as a member and leader in a team,
7. High Level of Leadership and Organizational Skills to manage projects and in multidisciplinary
Graduates are developed to become the best professionals environments.
in their respective disciplines by manifesting the
appropriate skills and leadership qualities.
8. Sense of Personal and Professional Ethics
Graduates show desirable attitudes and behavior either in
their personal and professional circumstances.
9. Sense of National and Global Responsiveness
Graduates deep sense of national compliments the need to
live in a global village where one’s culture and other
people culture are respected.
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City

Course Plan
Time Frame Topic Learning Outcomes Methodology Resources Assessment
Computer Security At the end of the unit the student must have: Lecture using Textbooks
 Confidentiality  To recognize the importance of PowerPoint Online quiz using
 Integrity computer security presentation Laptop google form
 Availability  To define and differentiate the term
Why Buy security confidentiality, integrity and Online class discussion Google meet Graded recitation
 Elements of Computer Security availability using google meet
 Extent of responsibilities  Discuss the importance of buying Trusted websites Case study
Threat Categories security Sharing related
Reported Crimes  Identify the elements of computer experience about the
 Disgruntled employee or security topic
contract employee  Recognize the extent of
 Organized crime or drug cartel responsibilities of the different
 Cyber criminal stakeholders,
 Competitors  Identify and discuss the different
 Hackers threat categories
 Government  Characterize the different reported
crimes
Implications of Threats to  To identify the different implication Lecture using Textbooks
Organizations of threats to organization PowerPoint Online quiz using
 Financial losses  Categorize the different techniques presentation Laptop google form
 Loss of intellectual capital of intruders from simple to
 Privacy sophisticated methods Online class discussion Google meet Graded recitation
 Image loss  Identify the different organizational using google meet
 Legal implications shortcomings Trusted websites Case study
Techniques of Intruders  Recognize some of the management Sharing related
 Simple methods concerns today experience about the
topic
 Sophisticated methods
Most common attack methods
 Internal
 External
Organizational Shortcomings
Management Concerns
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City
Types of Information Security Controls  Discuss the types of information Lecture using Textbooks
 Audit trails security controls being PowerPoint Online quiz using
 Intrusion detection methods implemented today. presentation Laptop google form
 Checksums  Identify and explain the different
Types of Controls types of controls Online class discussion Google meet Graded recitation
 Deterrent controls  Identify the different preventive using google meet
 Corrective controls administrative controls and Trusted websites Case study
 Recovery controls detective administrative controls Sharing related
Physical Control experience about the
topic
 Preventive Physical Control
 Detective Physical Control
Preventive Administrative Controls
Detective Administrative Controls
Information Security Management  Recognize the importance of Lecture using Textbooks
 Introduction to the Management information technology and PowerPoint Online quiz using
of Information Security understand who is responsible for presentation Laptop google form
 DIKW Hierarchy protecting an organization’s
 Three Distinct communities of information assets. Online class discussion Google meet Graded recitation
interests of information  Know and understand the definition using google meet
 Components of Information and key characteristics of leadership Trusted websites Case study
Security and management. Sharing related
 The CIA Triangle +  Recognize the characteristics that experience about the
 Management Theory differentiate information security topic
 Control Process management from general
management.
Planning for Security  Recognize the importance of Lecture using Textbooks
 Information Security Planning planning and describe the principal PowerPoint Online quiz using
 Strategic Planning components of organizational presentation Laptop google form
 Mission/Vision/Value planning.
Statement  Know and understand the principal Online class discussion Google meet Graded recitation
 Tactical Planning components of information security using google meet
 Operational Planning system implementation planning as Trusted websites Case study
 Systems Development Life it functions within the Sharing related
Cycle (SDLC) organizational planning scheme. experience about the
 Create a simple set of contingency topic
 Security System Development
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City
Life Cycle (SecsSDLC) plans, using Business Impact
 Security Models Analysis
 Security Program Management  Prepare and execute a test of
Contingency Plan (CP) contingency plans
Components
 Contingency Plan Components
 Disaster Recovery Plannign
(DRP)
 Business Continuity Planning
 Business Impact Analysis
(BIA)
 Testing Contingency Plan (CP)
Information Security Policy
 Policy – Bulls – eye model
layers
 Enterprise Information Systems
Policy (EISP)
 Issue Specific Security Policy
(ISSP)
 Systems – Specific Policies
(SysSPs)
 Access Control Lists
 Guidelines for Policy
Development
 The Information Security
Policy Made Easy Approach
(ISPME)
Screen Processing  Recall screen – processing Lecture using Textbooks
 The Monitor techniques PowerPoint Online quiz using
 Clearing the Screen in  Implement these techniques in presentation Laptop google form
Assembly Approach developing assembly language
 Setting the cursor position  Acknowledge the significance of Online class discussion Google meet Graded recitation
 Color Chart interrupt functions in using these using google meet
techniques Trusted websites Case study
Sharing related
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City
experience about the
topic
Keyboarding Processing with Control  Enumerate the assembly language Lecture using Textbooks
Flow tools that are used for control and PowerPoint Online quiz using
 Character Input logic flow presentation Laptop google form
 Character Input without echo  Make use of LOOP, CMP, JMP and
 The CMP Instruction unconditional jump instructions Online class discussion Google meet Graded recitation
 Conditional Jump Instruction  Know the usefulness of using google meet
 Input String representing the logic of the Trusted websites Case study
program Sharing related
experience about the
topic
Using Procedures  Evaluate what a procedure in Lecture using Textbooks
 Procedure Assembly language is PowerPoint Online quiz using
 Designing Programs using  Learn how to set up programs those presentation Laptop google form
procedures call procedures
 Calling procedure  Acknowledge the task and Online class discussion Google meet Graded recitation
 Returning from a procedure responsibility of a procedure in using google meet
program development. Trusted websites Case study
Sharing related
experience about the
topic
Character – Coded Data and I/O  Familiarized and apply the ASCII Lecture using Textbooks
Routines character PowerPoint Online quiz using
 Control Characters  Introduce the DOS int 21h Function presentation Laptop google form
 Formal Control Calls
 Transmission Control Online class discussion Google meet Graded recitation
 Traditional Character Device using google meet
 Traditional Character Device Trusted websites Case study
input and output Sharing related
experience about the
topic
Course Requirements Quizzes, Recitation/Class Participation
Final Requirement/Assignments/Researches/Library Work

Reading  Whiteman, Michael E., “Principles of Information Security”, Cengage Learning, c2018
COLAND SYSTEMS TECHNOLOGY INCORPORATED
Peñas Building, Sinsuat Avenue
Cotabato City
And  Greer, Melvin B., “Practical Cloud Security: A Cross Industry View”, CRC Press, c2017
References  Chapman, Chris, “Network Performance and Security: Testing and Analyzing using Open Source and Low Cost Tools” Elsevier, c2016
 Mason, Stephen, “Computing Security and Cryptography.” Lanrye International, c2015
 Ciampa, Mark, “Security Awareness: Applying Practical Security in your World” Cengage Learning, c2014
 Jacobs, Jay, “Data – Driven Security: Analysis, Visualization, and Dashboards”, John Wiley and Sons, c2014
 Shostack, Adam “Threat Modeling: Designing for Security”, John Wiley & Sons, c2014
 Fennelley, Lawrence J., “Effective Physical Security 4 th Edition” , Elsevier, c2013
Prepared By: Date Reviewed By: Date

JOHARI C. SIBAYAN RYL R. RAMOS, MIM


Faculty Dean, College of Computer Studies

Noted By: Date Date

RYL R. RAMOS, MIM


Dean, College of Computer Studies

Approved By: Date

ENGR. RIGE MAE G. MUESCO, MIM


Academic Program Head

You might also like