Professional Documents
Culture Documents
MISSION
“Establish and maintain an academic environment I. Course Code / Title : CS 107 - INFORMATION ASSURANCE AND SECURITY
promoting the pursuit of excellence and the total
development of its students as human beings, with
fear of God and love of country and fellowmen.” II. Course Pre-requisite : NONE
GOALS
1. foster the spiritual, intellectual, social, moral, and
III. Course Credit : 3 units
creative life of its clients via affordable but quality
tertiary education; IV. Course Description
2. provide the clients with rich and substantial, relevant
and wide range of academic disciplines, expose This course provides students with a basic and comprehensive understanding of the problems of information
them to varied curricular and co-curricular
experiences which nurture and enhance their assurance (IA) and possible solutions to these problems, especially the security of information on computers and
personal dedications and commitments to social, networks. This course will focus on the IA technology as well as IA policy, management, legal and ethical issue.
moral, cultural, and economic transformations;
3. work with the government and the community in the Information assurance and security as a domain is the set of controls and processes both technical and policy
pursuit of achieving national and developmental
goals; and intended to protect and defend information and information systems by ensuring their confidentially, integrity, and
availability, and by providing for authentication and non-repudiation. The concept of assurance also carries an attestation
4. develop deserving and qualified clients with different
skills of life existence and prepare them for local that current and past processes and data are valid. Both assurance and security concepts are needed to ensure a
and global competitiveness. complete perspective. Information assurance and security education, then includes all efforts to prepare a workforce with
the needed knowledge, skills, and abilities to protect our information systems and attest to the assurance of the past and
current state of processes and data. The importance of security concepts and topics has emerged as a core requirement
in the Computer Science discipline. much like the importance of performance concepts has been for many years.
PROGRAM OBJECTIVES
V-A. Institutional Program Outcomes
1. Articulate and discuss the latest development in the specific field of practice.
Graduates of BSCS Program must have the ability to:
a. analyze complex problems, and identify and define
2. Effectively communicate orally in writing using both English and Filipino.
the computing requirements needed to design an 3. Work effectively and independently in multi-disciplinary and multi-cultural teams.
appropriate solution; 4. Act in recognition of professional, social and ethical responsibly.
b. apply computing and other knowledge domains to
address real-world problems; 5. Preserve and promote “Filipino historical and cultural heritage”. (based on R.A. 7722)
c. design and develop computing solutions using a
system-level perspective; and
d. utilize modern computing tools.
a. Apply knowledge of computing fundamentals, knowledge of computing specialization, and mathematics, science, and domain knowledge appropriate for the
computing specialization to abstraction and conceptualization of computing models from defined problems and requirements;
b. Identify, analyze, formulate, research literature, and solve complex computing problems and requirements and reaching substantiated conclusions using
fundamental principles of mathematics, computing sciences, and relevant domain principles.
c. Apply mathematical foundations, algorithmic principles and computer science theory in the modeling and design of computer-based systems in a way that
demonstrates comprehension of the tradeoffs involved in design choices;
d. Understand the information security issues in relation to the design, development and use of information systems;
e. Design and evaluate solutions for complex computing problems, and design and evaluate systems, components, or processes that meet specified needs with
appropriate consideration for public health and safety, cultural, societal, and environmental considerations.
f. Create, select, adapt and apply appropriate techniques, resources and modern computing tools to complex computing activities with an understanding of the
limitations to accomplish a common goal.
g. Function effectively as an individual and as a member or leader in diverse teams and in multidisciplinary settings.
h. Communicate effectively with the computing community and with the society at large about complex computing activities by being able to comprehend and write
effective reports, design documentation, make effective presentations, and give and understand clear instructions,
i. An ability to recognize the legal, social, ethical and professional issues involved in the utilization of computer technology and be guided by the adoption of
appropriate professional, ethical and legal practices; and
j. Recognize the need, and have the ability to engage in independent learning for continual development as a computing professional.
1. Achieve in depth 1. Introduction to Information 1. Define with understanding - Individual participation - Score in
understanding of Information Security and Information 8 the general meaning of in class discussion Participation
Security and Information Assurance Information Security and and Quiz
Assurance Information Assurance
2. Explain why a successful 2. The Need for Security 2. Discuss the issues facing - PowerPoint - Lecture
information security program is 4.5 software developers, as presentation Presented
the responsibility of both an well as the most common - Assignment - Grade in
organization’s general errors made by Assignments
management and IT developers, and explain
management how software
development programs
can create software that is
more secure and reliable.
3. Explain the role of culture as it 3. Legal, ethical and Professional 3. Discuss the functions of - Demonstrative and - Rubrics Score
applies to ethics in information Issues in Information Security y and relationships among presentation of output Card
security. 4.5 laws, regulations, and accomplished
professional organizations - Seatwork by instructor
in information security. - Score in Quiz
- Score in
Seatwork
4. Explain the basic insurance 4. Risk Management and Insurance 4. Discuss the types of risk - Individual participation - Score in
concepts of indemnity, 4.1 Types of Risk and the 8.5 and explain the various in class discussion participation
insurability of risk, and affordable Various Techniques techniques used to
coverage. manage risk.
- Score in Quiz
and Recitation
1.
- Score in Quiz
and Recitation
IX. SUGGESTED READINGS : Basic Concept of Information Assurance and Security/ ITdesk.info
Introduction to Information Security
Readings and Cases in the Management of Information Security: Legal and Ethical Issues. 2010. Course Technology.
Prepared by:
Instructor
Reviewed by:
Approved by:
Noted: