0% found this document useful (0 votes)
16 views

Silay Loc Assurance2 Week1

Information Assurance
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Silay Loc Assurance2 Week1

Information Assurance
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

TACLOBAN  ORMOC  MANDAUE

LOC 2020- INFORMATION ASSURANCE & SECURITY II


ONLINE CLASS WEEK #1:

ONLINE CLASS RULES


GRADING SYSTEM
Information Assurance and Security 2
Program Description
Internet Cookies
IAS2 Learning Outcome
Activity: what is the essence of
Information assurance 2 process

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
CLASS RULES
Attend Your Online Raise your hand
Class Regularly. for permission to speak
10 hours absences (one student at a time).
Avoid talking while the
Wear school uniform.
someone is reporting
Encourage each other
Pay your tuition before with to participate.
The examination day Observe proper
dress code

NETWORK SECURITY
INFORMATION TECHNOLOGY DEPARTMENT
GRADING SYSTEM
LECTURE :
CS/ATTENDANCE QUIZZES EXAM TOTAL LEC
10% 40% 50% 100%

LABORATORY:
CS/ATTENDANCE QUIZZES EXAM TOTAL LAB
10% 40% 50% 100%

PERIODIC GRADE:
= (TOTAL LEC*60%)+ (TOTAL LAB*40%)
Grade=(Prelim*.2)+(Midterm*.2)+(PreFinal*.2)+(Final*.4)

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
Information Assurance &Security 2
INFORMATION TECHNOLOGY DEPARTMENT
Information is one of the
most significant non-
substantial resources of any
association, and like different
resources, the administration
must ensure it suitably.

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
In 1980 when the
utilization of PCs was
constrained to PC focuses
and the security of the PC
represents the physical
processing foundation.

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
The internet has
developed with the trading of
correspondence from a solid
gathering of confided in
individuals to a great many
oftentimes interfacing
mysterious clients.
Information Assurance &Security 2
INFORMATION TECHNOLOGY DEPARTMENT
Those on the web are not
disturbed by the absence of
data yet are increasingly
stressed over taking care of
the abundance of pointless
data that they run over.

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
Morris Worm was the main
webworm that was created in
1988 and contaminated 10%
of frameworks. Since at that
point, these occurrences have
gotten progressively
unpredictable and costly.
Information Assurance &Security 2
INFORMATION TECHNOLOGY DEPARTMENT
To battle this, mindfulness
on data security has
expanded and numerous
associations have been
endeavors to organize
their information.
Information Assurance &Security 2
INFORMATION TECHNOLOGY DEPARTMENT
To battle this, mindfulness
on data security has
expanded and numerous
associations have been
endeavors to organize
their information.
Information Assurance &Security 2
INFORMATION TECHNOLOGY DEPARTMENT
Information security, otherwise
called INFOSEC, is a procedure
of planning techniques,
instruments, and approaches to
identify, report, avert, and battle
dangers focused on
computerized and non-advanced
data gadgets.

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
Data security indirect setting is
building upwell-characterized
security procedures to ensure
data regardless of its condition
of the essence—travel,
handled, or very still.

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
Learning Outcomes: At the end of
the lesson, you should be able to
• Assess the present security
scene, including the idea of the
danger, the general status of
normal vulnerabilities, and the
imaginable outcomes of security
disappointments;

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
• Study and survey the qualities and
shortcomings of general
cybersecurity models, including the
CIA group of three;
• Evaluate the interrelationships
among components that involve an
advanced security framework,
including equipment, programming,
arrangements, and individuals;

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
•Assess how all spaces of
security interface to
accomplish successful frame
worldwide security at the
undertaking level.

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
The Importance of Information
Security Organizations has
recognized the importance of
having roadblocks to protect private
information from becoming public,
especially when that information is
privileged.

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
The 2017 Cybersecurity Trends
Report provided findings that
express the need for Skilled
information security personnel
based on current cyberattack
predictions and concerns.

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
Information Assurance &Security 2
INFORMATION TECHNOLOGY DEPARTMENT
Cookies and other
site data: Cookies are small text files that
contain login details, user preferences, and
other information. Websites use this data to
customize your browsing experience. In
addition to cookies, this category
encompasses other web storage
components, including an HTML 5-enabled
application cache and locally stored
database data.

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
“QUOTE OF THE DAY!”

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
STUDENT ASSESSMENT:
https://docs.google.com/
forms/d/e/
1FAIpQLScKndENZ4TZDaMT0
15QoXsNi3ayaVdYnxqAtveyj
QFC7Gko5Q/viewform

Information Assurance &Security 2


INFORMATION TECHNOLOGY DEPARTMENT
Activity:

What is the essence of Information


assurance and Security 2
process?
What is the findings of 2017
Cyber security Trends Report?

NETWORK SECURITY
INFORMATION TECHNOLOGY DEPARTMENT
“THANK YOU”

#WELEARNASONE
#ACLCFAMILY
#ACLCIANS
#STAYSAFE

THESIS WRITING A
INFORMATION TECHNOLOGY DEPARTMENT

You might also like