You are on page 1of 5

KOLEHIYO NG LUNGSOD NG LIPA

Marawoy, Lipa City


VISION
“A center of human development committed to the
pursuit of wisdom, truth, justice, pride, dignity, and
COLLEGE OF COMPUTER STUDIES
local/global competitiveness via a quality but SECOND Semester| AY 2020 - 2021
affordable education for all qualified clients.”

MISSION
“Establish and maintain an academic environment I. Course Code / Title : CS 107 - INFORMATION ASSURANCE AND SECURITY
promoting the pursuit of excellence and the total
development of its students as human beings, with
fear of God and love of country and fellowmen.” II. Course Pre-requisite : NONE
GOALS
1. foster the spiritual, intellectual, social, moral, and
III. Course Credit : 3 units
creative life of its clients via affordable but quality
tertiary education; IV. Course Description
2. provide the clients with rich and substantial, relevant
and wide range of academic disciplines, expose This course provides students with a basic and comprehensive understanding of the problems of information
them to varied curricular and co-curricular
experiences which nurture and enhance their assurance (IA) and possible solutions to these problems, especially the security of information on computers and
personal dedications and commitments to social, networks. This course will focus on the IA technology as well as IA policy, management, legal and ethical issue.
moral, cultural, and economic transformations;
3. work with the government and the community in the Information assurance and security as a domain is the set of controls and processes both technical and policy
pursuit of achieving national and developmental
goals; and intended to protect and defend information and information systems by ensuring their confidentially, integrity, and
availability, and by providing for authentication and non-repudiation. The concept of assurance also carries an attestation
4. develop deserving and qualified clients with different
skills of life existence and prepare them for local that current and past processes and data are valid. Both assurance and security concepts are needed to ensure a
and global competitiveness. complete perspective. Information assurance and security education, then includes all efforts to prepare a workforce with
the needed knowledge, skills, and abilities to protect our information systems and attest to the assurance of the past and
current state of processes and data. The importance of security concepts and topics has emerged as a core requirement
in the Computer Science discipline. much like the importance of performance concepts has been for many years.

PROGRAM OBJECTIVES
V-A. Institutional Program Outcomes
1. Articulate and discuss the latest development in the specific field of practice.
Graduates of BSCS Program must have the ability to:
a. analyze complex problems, and identify and define
2. Effectively communicate orally in writing using both English and Filipino.
the computing requirements needed to design an 3. Work effectively and independently in multi-disciplinary and multi-cultural teams.
appropriate solution; 4. Act in recognition of professional, social and ethical responsibly.
b. apply computing and other knowledge domains to
address real-world problems; 5. Preserve and promote “Filipino historical and cultural heritage”. (based on R.A. 7722)
c. design and develop computing solutions using a
system-level perspective; and
d. utilize modern computing tools.

Graduates of ACT program were well versed on


computer science software and hardware installation,
operations and maintenance.
V-B. CCS Program Outcomes
The College of Computer Studies is setting high academic standards to become globally competent, innovative, and socially and ethically responsible computing
professionals engaged in the lifelong learning endeavor necessary to stay current with emerging technology trends and techniques in the field. Moreover, the program
aims that the students can:

a. Apply knowledge of computing fundamentals, knowledge of computing specialization, and mathematics, science, and domain knowledge appropriate for the
computing specialization to abstraction and conceptualization of computing models from defined problems and requirements;
b. Identify, analyze, formulate, research literature, and solve complex computing problems and requirements and reaching substantiated conclusions using
fundamental principles of mathematics, computing sciences, and relevant domain principles.
c. Apply mathematical foundations, algorithmic principles and computer science theory in the modeling and design of computer-based systems in a way that
demonstrates comprehension of the tradeoffs involved in design choices;
d. Understand the information security issues in relation to the design, development and use of information systems;
e. Design and evaluate solutions for complex computing problems, and design and evaluate systems, components, or processes that meet specified needs with
appropriate consideration for public health and safety, cultural, societal, and environmental considerations.
f. Create, select, adapt and apply appropriate techniques, resources and modern computing tools to complex computing activities with an understanding of the
limitations to accomplish a common goal.
g. Function effectively as an individual and as a member or leader in diverse teams and in multidisciplinary settings.
h. Communicate effectively with the computing community and with the society at large about complex computing activities by being able to comprehend and write
effective reports, design documentation, make effective presentations, and give and understand clear instructions,
i. An ability to recognize the legal, social, ethical and professional issues involved in the utilization of computer technology and be guided by the adoption of
appropriate professional, ethical and legal practices; and
j. Recognize the need, and have the ability to engage in independent learning for continual development as a computing professional.

V. Course Learning Outcomes

At the end of the course, the students are expected to:

1. determine the factors involved in a computer and network security strategy


2. explain how a computer virus works and what it does.
3. identify the major components used in a distributed denial-of-service (DDOS) attack.
4. know the different types of technology used to secure a network connected through a router.
VI. COURSE CONTENT

No. of Student Learning Outcomes Teaching and Evidence of


Specific Objectives Topics (SLO) Assessment Activities
Hours Outcome
At the end of the topic the student can: (Strategy/Method)

1. Achieve in depth 1. Introduction to Information 1. Define with understanding - Individual participation - Score in
understanding of Information Security and Information 8 the general meaning of in class discussion Participation
Security and Information Assurance Information Security and and Quiz
Assurance Information Assurance

2. Explain why a successful 2. The Need for Security 2. Discuss the issues facing - PowerPoint - Lecture
information security program is 4.5 software developers, as presentation Presented
the responsibility of both an well as the most common - Assignment - Grade in
organization’s general errors made by Assignments
management and IT developers, and explain
management how software
development programs
can create software that is
more secure and reliable.

3. Explain the role of culture as it 3. Legal, ethical and Professional 3. Discuss the functions of - Demonstrative and - Rubrics Score
applies to ethics in information Issues in Information Security y and relationships among presentation of output Card
security. 4.5 laws, regulations, and accomplished
professional organizations - Seatwork by instructor
in information security. - Score in Quiz

- Score in
Seatwork

4. Explain the basic insurance 4. Risk Management and Insurance 4. Discuss the types of risk - Individual participation - Score in
concepts of indemnity, 4.1 Types of Risk and the 8.5 and explain the various in class discussion participation
insurability of risk, and affordable Various Techniques techniques used to
coverage. manage risk.

MIDTERM EXAMINATION 1.5


1. Explain what contingency 1. Planning for Security 1. Discuss how an organization
planning is and how it relates to institutionalizes its policies, - Individual participation - Rubrics Score
incident response planning, 1.1 Information Security Governance standards, and practices using in class discussion Card
disaster recovery planning, and Outcomes 8 education, training, and accomplished
business continuity plans. awareness programs by instructor

- Score in Quiz
and Recitation

2. Cryptography 2. Discuss the nature and - Individual participation - Score in


2. Understand the most 2.1 Principles of cryptography execution of the dominant in class discussion participation
significant events and methods of attack used against
discoveries in the history of 9 cryptosystems.
cryptology
2.1 Explain the basic principles of
cryptography

1.

3. explain the Physical Security 3. Physical Security


and Security Control 3.1 Physical Security Control 8.5 6. Discuss the Physical - Individual participation - Rubrics Score
Security and Physical in class discussion Card
Controls accomplished
by instructor

- Score in Quiz
and Recitation

FINAL EXAMINATION Final Examination 1.5

VII. TOTAL NUMBER OF HOURS : 54 Hours


VIII. SUMMATIVE EVALUATION
Class Standing (Quizzes, Assignment, Project, and Recitation/Demonstration : 40%
Major Examination : 30%
Other Output 30%

IX. SUGGESTED READINGS : Basic Concept of Information Assurance and Security/ ITdesk.info
Introduction to Information Security
Readings and Cases in the Management of Information Security: Legal and Ethical Issues. 2010. Course Technology.

X. REFERENCES : Principles of Information Security; Michael E. Whitman, Herbert J. Mattord.

Prepared by:

Instructor

Reviewed by:

CAMELO A. OBVIAR. MAEd, LPT SYLVIA P. REZARE, MAEd, LPT


Coordinator, ACT Coordinator, BSCS

Approved by:

ROBIN V. FETALVO, Ph.D.


Dean, College of Computer Studies

Noted:

AQUILINO D. ARELLANO, Ed.D.


VP, Academic Affairs and Research

You might also like