Information Assurance 1 Obe Syllabus
Information Assurance 1 Obe Syllabus
Sorsogon Campus
PHILOSOPHY
Excellent Education is best attained through QUALITY and AFFORDABILITY.
COURSE SYLLABUS
VISION
In
CCDI envisions of providing a service of leadership through excellent
instructions that will produce empowered and word-class I.T. graduates. INFORMATION ASSURANCE AND SECURITY 1
1stSemester S/Y 2017-2018
MISSION
We empower the lives we touch! COURSE INFORMATION
CORE VALUES
EXCELLENT I. COURSE CODE :
INTEGRITY
II. COURSE TITLE : Information Assurance and Security 1
LEADERSHIP
SERVICE III. DEGREE PROGRAM : Bachelor of Science in Information Technology (BSIT)
IV. DEPARTMENT : Higher Education Department
V. COURSE DESCRIPTION : This course explores the best practices, basic policies and procedures, ethics, and
fundamental legal issues related to information security. Risk Management and Disaster Recovery as applied to
Information Assurance/Security will be investigated. Ethics and vulnerability issues will be also be covered
VI. CREDIT :3 units
VII. HOURS PER WEEK :Three(3) hours Lecture/ week
VIII. PRE-REQUISITE :None
COURSE OBJECTIVES (CO):On the completion of the course, student is expected to be able to do the following:
i. Examine the relationship between threats, vulnerabilities, countermeasures, attacks, compromises, and remediation
throughout the system life cycle.
ii. Explain the factors involved in authentication and how they are used to verify, identify and grant access to the system.
iii. Describe the legal and ethical considerations related to the handling of information and management of enterprise information assets
IX. LEARNING OUTCOMES (LO) :As evidence of attaining the above learning outcomes, the student has to do and submit the following:
This study source was downloaded by 100000789512489 from CourseHero.com on 06-30-2022 00:58:43 GMT -05:00
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Sorsogon Campus
LO2 Group Term Paper A term paper is required. The term paper should be 5 to 7 pages double spaced and should focus on some issue CO1, CO2, CO3
related to computer security and information assurance. The paper should be based on at least three references.
The references should be listed at the end of the paper and those references should be cited appropriately within
the body of the text. An oral report on the topic selected for the term paper will be presented in class
TOTAL 100%
This study source was downloaded by 100000789512489 from CourseHero.com on 06-30-2022 00:58:43 GMT -05:00
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Sorsogon Campus
CO1, CO2 Describe simple steps to take to The Need for Security 4-5 Group Discussion The students will be tasked to
minimize the possibility of an 1. Business Needs First, Case Studies create a multimedia presentation
attack on a system 2. Threats, about the need for security
3. Attacks,
4. Secure Software
Development.
CO2 Understand a successful Legal, Ethical, and Professional 5 Construction of personal Students will complete a quiz.
information security program is the Issues in Information Security: vision/mission
responsibility of an organization’s Mapping
1. Laws and Ethics in
general management and IT
management. Information Security.
2. Relevant Philippine Laws.
This study source was downloaded by 100000789512489 from CourseHero.com on 06-30-2022 00:58:43 GMT -05:00
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Sorsogon Campus
CO2, CO3 Identify the different risks and Risk Management: 6-7 Case Studies Students will present a paper
strategies to mitigate the impact of 1. Overview, Discussion of current events examining the risks in a chosen
these risks. information system, and
2. Risk identification,
recommend possible risk
3. Risk Assessment,
management solutions.
4. Risk Control Strategies,
Quantitative vs. Qualitative
Risk Control Practices.
5. Risk Management.
CO2, CO3 Classify incident response, disaster Planning for Security: 8-9 Lecture, Discussion, Recitation, Students will prepare their own
recovery, and business continuity 1. Information Security Multimedia Presentation security plan.
planning as components of Planning and Governance,
contingency planning 2. Information Security Policy
Standards, and Practices,
3. The Information Security
Blueprint, Security
education, Training, and
Awareness program,
4. Continuity Strategies.
CO1, CO3 Describe firewall technology and Security Technology: 10-11 Lecture, Discussion, Recitation, Students will do a research about
the various approaches to firewall 1. Firewalls and VPNs: Reporting, Multimedia firewalls and VPNs.
This study source was downloaded by 100000789512489 from CourseHero.com on 06-30-2022 00:58:43 GMT -05:00
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Sorsogon Campus
CO2, CO3 Discuss the Threats to information Physical Security: 14-15 Lecture, Discussion, Recitation, Students will create their own
security that are unique to 1. Physical Access Controls, Multimedia Presentation physical security model.
physical security 2. Fire Security and safety,
3. Failure of Supporting
Utilities and Structural
Collapse,
4. Interception of Data, Mobile
and Portable Systems.
CO3 List and recommend security Security and Personnel: 16 Lecture, Discussion, Recitation, Students will formulate their
management models 1. Positioning and Staffing the Multimedia Presentation own policies and practices and
security Function, security considerations on the
2. Credentials of Information use of information technology.
Security Professionals,
This study source was downloaded by 100000789512489 from CourseHero.com on 06-30-2022 00:58:43 GMT -05:00
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Sorsogon Campus
This study source was downloaded by 100000789512489 from CourseHero.com on 06-30-2022 00:58:43 GMT -05:00
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Sorsogon Campus
XIII. REFERENCES:
Books:
1. Michael E. Whitman and Herbert J. Mattord. Principles of Information Security, 5th Edition. Course Technology CENGAGE Learning. ISBN 1-111-13821-4
Other Sources:
i. Information Assurance for the Enterprise, Schou and Shoemaker, McGraw-Hill Irwin, 2012
ii. Australian Cyber Security Survey (2016) https://www.acsc.gov.au/publications/ACSC_Cyber_Security_Survey_2016.pdf
This study source was downloaded by 100000789512489 from CourseHero.com on 06-30-2022 00:58:43 GMT -05:00
Powered by TCPDF (www.tcpdf.org)