Sie sind auf Seite 1von 10

HIGHER EDUCATION DEPARTMENT

COLLEGE OF COMPUTER STUDIES


BSCS/BSIT Programs – OUTCOMES BASED SYLLABUS

Course Code/Name: IT 311 – Information Assurance and Security 1 Term and AY: First Trimester, AY 2020 – 2021
Pre-requisites/
IT 218 & IT 222 Contact Hours: 4 Hrs.
Co-requisites:
Consultation 4:00 PM – 5:00 PM
Course Unit: 3
Hours: Friday

Vision De La Salle John Bosco College, a member of the Lasallian Family in the Philippines envisions itself as the center of academic, research and
technological excellence by providing wider avenue of quality human and Christian education for the Filipino youth.

Mission Greatly inspired by the Lasallian ideals, De La Salle John Bosco College believes in Divine Providence and upholds the values of human dignity,
social justice and responsibility, sense of national identity and culture, integrity of creation and competence.
As an educational institution of empowered individuals, it commits itself to promote the community’s welfare and support the church’s mission
towards total human transformation.

Goals Guided and enlightened by the spirit of God, we affirm our commitment together and by association to the following:

1. We shall raise further the formation of academic, technology and emotional competence of Filipino Christian Lasallian to make it even
more responsive to the needs of the country and to the call for societal transformation.

2. We shall provide the sense of Lasallian identity and belonging by living the values of faith, zeal in service and communion in mission
across all sectors of the Lasallian Family and the community.

BSCS & BSIT Program Outcomes Based Educat


College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 1 of 10
3. We shall get involved in the issues of political change, peace, justice, integrity of creation and the church’s mission towards total human
transformation.

Departmental In keeping with the vision – mission – goals of the institution, the College Department is committed to:
Outcomes
1. Provide a relevant and more responsive academic programs imbued with skills, attitudes and values thereby developing qualified, highly
trained and professionalized Filipino Lasallian graduates dedicated to be of service to others.
2. Appreciate the Lasallian values of self-actualization and continuous quest for fulfillment of students’ dreams or visions.
3. Dedicate the students’ Lasallian education in the transformation of a just and humane environment enabling them to be of service to
their own school and community.

College of Computer The College of Computer Studies is an educational program committed to continually share knowledge and expertise through teaching,
Studies Outcomes engaging computer science and information technology product development, and rendering service to the communities in need. It upholds the
tradition of excellence embodied by the Lasallian education. The Bachelor of Science in Computer Science (BSCS) and Bachelor of Science in
Information Technology (BSIT) programs emphasize actual implementation of theories and project – oriented and real world environment.

General Objectives The College of Computer Studies supports the college mission of providing education towards the development of every student to become
globally competent and capable of addressing the growing needs of the industry in relation to Information and Communication Technology.

Through the years of preparation for professional life, the College of Computer Studies aims to produce graduates who are expected to:

1. Possess both theoretical knowledge and technical expertise to excel in Computer Science and Information Technology.
2. Apply expertise in the development or solutions relevant to local and information technology.
3. Promote honesty, integrity, and diligence in students as they pursue a career in the computer fields.
4. Effectively communicate and collaborate within a team.

Program Intended The Bachelor of Science in Information Technology (BSIT) is the study of utilization of computers and computer software and plan, install,
Learning Outcomes customize operate, manage, administer and maintain information technology infrastructure. The objectives of the program are as follows:
BSCS & BSIT Program Outcomes Based Educat
College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 2 of 10
1. Prepare the students to be IT professionals, be well versed in application installation, operation, development, maintenance,
administration, and be familiar with hardware installation, operation and maintenance.
2. Enable students to obtain comprehensive knowledge, theoretical and practical skills, deep understanding of latest technology in
information and communications and prepares them to be well versed on applications, installations, operation, development,
maintenance and administration.
3. Equip students with the technical knowledge required for an IT professional to handle multi-tasking and multi-programming situations
and to assess and develop computer based solutions.
4. Produce IT graduates who are globally competent computer experts that can evaluate current and emerging technologies, design user-
friendly interfaces, and assess their impacts on individuals, organizations and the environment.

Each of these LOs addresses the Expected Lasallian Graduate Attributes as follows:

EXPECTED LASALLIAN GRADUATE ATTRIBUTE DESIRED GRADUATE OUTCOMES


Apply knowledge of computing, science, and mathematics appropriate to the
KNOWLEDGE FOR SOLVING COMPUTING PROBLEMS discipline
Understand best practices and standards and their applications
Analyze complex problems, and identify and define the computing requirements
PROBLEM ANALYSIS
appropriate to its solution.
MODERN TOOL USAGE Apply knowledge through the use of current techniques, skills, tools, and practices
necessary for the IT profession.
LIFELONG LEARNING Recognize the need for and engage in planning self-learning and improving
performance as a foundation for continuing professional development

Course Description:

BSCS & BSIT Program Outcomes Based Educat


College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 3 of 10
This course is a survey of the fundamental elements of computer security and information assurance. Topics may include confidentiality, integrity, and
availability; security policies; authentication; access control; risk management; threat and vulnerability assessment; common attack/defense methods; ethical issues.
Through weekly lectures and assignments students will gain a high-level understanding of the subject of information assurance.

Course topics include leading practices for information security and assurance governance and risk management; network architecture and design of systems to
maximize assurance; business continuity, disaster recovery planning, resiliency; data privacy risks and laws; understanding legal, investigation, information-security
incident response and management processes; and developing secure application software.

Learning Outcomes:

By the end of the course, student should be able to:

LO1. Develop a fundamental understanding of the information security profession, enterprise physical security, cryptography, application development
security, enterprise incidence response, enterprise business continuity, disaster recovery planning, cyber resiliency, enterprise risk management and
governance.

LO2. Understand new trends that are transforming enterprise information security and assurance related to cloud computing and mobile applications, Bring
Your Own Device (BYOD) strategies, and current, increasingly rigorous security and information assurance compliance requirements.

Course Output:

BSCS & BSIT Program Outcomes Based Educat


College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 4 of 10
As evidence of attaining the above learning outcomes, students are required to do and submit the following during the indicated dates of the term. The rubrics for
these outputs are provided.

LEARNING OUTCOME REQUIRED OUTPUT DUE DATE

LO1/LO2 CASE STUDY EVERY END OF THE WEEK.

Learning Plan:

TEACHING AND
WEEKS HRS LO TOPICS INTENDED LEARNING OUTCOME LEARNING ACTIVITIES ASSESSMENT TASK
(TLA)
Chapter 1
Introduction to Information Security • Define information security
Brainwriting
pp. 1 - 26 • Recount the history of computer
security, and explain how it evolved Set of Activities
Online Interaction
1. History of Information Security into information security
1 4 1 2. What is Security? • Define key terms and critical concepts Case Study
Sketchnoting
3. CNSS Security Model of information security
4. Components of Information System Online/Offline Quiz
Online/Offline Bud
5. Balancing Security and Access
discussion and sharing
6. The System Development Life Cycle

Brainwriting
Set of Activities
Chapter 1 • Enumerate the phases of the security
Introduction to Information Security systems development life cycle Online Interaction
2 4 1 Case Study
• Describe the information security roles
1. The Security System Development Life of professionals within an organization Sketchnoting
Online/Offline Quiz
Cycle
BSCS & BSIT Program Outcomes Based Educat
College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 5 of 10
2. Security Professionals and the Online/Offline Bud
organization discussion and sharing
3. Communities of Interest
4. Information Security: Is it an art or
science?
5. Security as Science
6. Security as Social Science

Brainwriting
• Demonstrate that organizations have a
Chapter 2 Set of Activities
business need for information security Online Interaction
The need for Security
• Explain why a successful information
3 4 1 Case Study
security program is the responsibility Sketchnoting
1. Business Needs First
of both an organization’s general
2. Threats Online/Offline Quiz
management and IT management Online/Offline Bud
discussion and sharing

• Identify the threats posed to


information security and the more
common attacks associated with those
Brainwriting
threats, and differentiate threats to the
Chapter 2 information within systems from Set of Activities
Online Interaction
The need for Security attacks against the information within
4 4 1 systems Case Study
Sketchnoting
1. Attacks • Describe the issues facing software
2. Secure Software Development developers, as well as the most Online/Offline Quiz
Online/Offline Bud
common errors made by developers,
discussion and sharing
and explain how software
development programs can create
software that is more secure and
reliable
BSCS & BSIT Program Outcomes Based Educat
College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 6 of 10
Brainwriting
Chapter 3 • Describe the functions of and
Legal, Ethical, and Professional Issues in relationships among laws, regulations, Set of Activities
Online Interaction
Information Security and professional organizations in
5 4 1 information security Case Study
Sketchnoting
1. Law and Ethics in Information • Differentiate between laws and ethics
Security • Identify major national laws that affect Online/Offline Quiz
Online/Offline Bud
2. Relevant U.S. Laws the practice of information security discussion and sharing

Chapter 3 • Identify major national laws that affect Brainwriting


Legal, Ethical, and Professional Issues in the practice of information security
Set of Activities
Information Security • Explain the role of culture as it applies Online Interaction
6 4 1 to ethics in information security Case Study
1. International Laws and Legal Bodies Sketchnoting
2. Ethics and Information Security
Online/Offline Quiz
3. Code of Ethics and Professional Online/Offline Bud
Organizations discussion and sharing

7 2 1 MIDTERM EXAM Examination

Brainwriting
Chapter 4 • Define risk management, risk
Set of Activities
Risk Management identification, and risk control Online Interaction
8 4 2 • Describe how risk is identified and Case Study
1. Overview of Risk Management assessed Sketchnoting
2. Risk Identification • Assess risk based on probability of Online/Offline Quiz
3. Risk Assessment occurrence and likely impact Online/Offline Bud
4. Risk Control Strategies discussion and sharing
BSCS & BSIT Program Outcomes Based Educat
College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 7 of 10
• Explain the fundamental aspects of
documenting risk via the process of
risk assessment

• Describe the various risk mitigation


strategy options Brainwriting
Chapter 4
• Identify the categories that can be used
Risk Management Set of Activities
to classify controls Online Interaction
• Recognize the existing conceptual
9 4 2 1. Selecting a Risk Control Strategy Case Study
frameworks for evaluating risk Sketchnoting
2. Quantitative vs. Qualitative Risk
controls and formulate a cost benefit
Control Practices Online/Offline Quiz
analysis Online/Offline Bud
3. Risk Management Discussion Points
• Describe how to maintain and discussion and sharing
4. Recommended Risk Control Practices
perpetuate risk controls

• Define management’s role in the


development, maintenance, and
enforcement of information security Brainwriting
policy, standards, practices,
Chapter 5 Set of Activities
procedures, and guidelines Online Interaction
Planning for Security
• Describe what an information security
10 4 2 1. Information Security Planning and Case Study
blueprint is, identify its major Sketchnoting
Governance
components, and explain how it
2. Information Security Policy, Standards Online/Offline Quiz
supports the information security Online/Offline Bud
and Practices
program discussion and sharing
• Discuss how an organization
institutionalizes its policies, standards,
and practices using education, training,

BSCS & BSIT Program Outcomes Based Educat


College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 8 of 10
and awareness programs

• Describe what an information security Brainwriting


blueprint is, identify its major
Chapter 5 Set of Activities
components, and explain how it Online Interaction
Planning for Security
supports the information security
11 4 2 1. Security Education, Training, and Case Study
• Explain what contingency planning is Sketchnoting
Awareness Program
and how it relates to incident response
2. Continuity Strategies Online/Offline Quiz
planning, disaster recovery planning, Online/Offline Bud
and business continuity plans discussion and sharing

• Recognize the important role of access


control in computerized information
Brainwriting
systems, and identify and discuss
widely-used authentication factors Set of Activities
Chapter 6 Online Interaction
• Describe firewall technology and the
Security Technology: Firewalls and VPNs
12 4 2 various approaches to firewall Case Study
1. Access Control Sketchnoting
implementation
2. Firewalls
• Identify the various approaches to Online/Offline Quiz
Online/Offline Bud
control remote and dial-up access by discussion and sharing
means of the authentication and
authorization of users

Brainwriting Set of Activities


Chapter 6 • Discuss content filtering technology
13 4 2 Security Technology: Firewalls and VPNs • Describe the technology that enables Online Interaction Case Study
1. Protecting Remote Connections the use of virtual private networks
Sketchnoting Online/Offline Quiz

BSCS & BSIT Program Outcomes Based Educat


College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 9 of 10
Online/Offline Bud
discussion and sharing
14 2 2 FINAL EXAMINATION Examination

References:
• Michael E. Whitman, Herbert J. Mattord, PRINCIPLES OF INFORMATION SECURITY, 4th Edition 2011

Grading System:
The total points that you accumulate throughout the term on the items below will determine your grade:

CLASS AVERAGE COMPUTATION


Midterm Class Average Final Class Average
Assignments 10% Assignments 10%
Participation 15% Participation 15%
Performance Task 45% Performance Task 25%
Quizzes 30% Quizzes 30%
TOTAL 100% Project 20%
TOTAL 100%

MIDTERM GRADE = 60% Class Average (CA) + 40% Midterm Exam


FINAL GRADE = 1/2 Midterm Grade (MG) + 1/2 Tentative Final Grade (60% CA + 40% Final Exam)

BSCS & BSIT Program Outcomes Based Educat


College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021

Page 10 of 10

Das könnte Ihnen auch gefallen