Beruflich Dokumente
Kultur Dokumente
Course Code/Name: IT 311 – Information Assurance and Security 1 Term and AY: First Trimester, AY 2020 – 2021
Pre-requisites/
IT 218 & IT 222 Contact Hours: 4 Hrs.
Co-requisites:
Consultation 4:00 PM – 5:00 PM
Course Unit: 3
Hours: Friday
Vision De La Salle John Bosco College, a member of the Lasallian Family in the Philippines envisions itself as the center of academic, research and
technological excellence by providing wider avenue of quality human and Christian education for the Filipino youth.
Mission Greatly inspired by the Lasallian ideals, De La Salle John Bosco College believes in Divine Providence and upholds the values of human dignity,
social justice and responsibility, sense of national identity and culture, integrity of creation and competence.
As an educational institution of empowered individuals, it commits itself to promote the community’s welfare and support the church’s mission
towards total human transformation.
Goals Guided and enlightened by the spirit of God, we affirm our commitment together and by association to the following:
1. We shall raise further the formation of academic, technology and emotional competence of Filipino Christian Lasallian to make it even
more responsive to the needs of the country and to the call for societal transformation.
2. We shall provide the sense of Lasallian identity and belonging by living the values of faith, zeal in service and communion in mission
across all sectors of the Lasallian Family and the community.
Page 1 of 10
3. We shall get involved in the issues of political change, peace, justice, integrity of creation and the church’s mission towards total human
transformation.
Departmental In keeping with the vision – mission – goals of the institution, the College Department is committed to:
Outcomes
1. Provide a relevant and more responsive academic programs imbued with skills, attitudes and values thereby developing qualified, highly
trained and professionalized Filipino Lasallian graduates dedicated to be of service to others.
2. Appreciate the Lasallian values of self-actualization and continuous quest for fulfillment of students’ dreams or visions.
3. Dedicate the students’ Lasallian education in the transformation of a just and humane environment enabling them to be of service to
their own school and community.
College of Computer The College of Computer Studies is an educational program committed to continually share knowledge and expertise through teaching,
Studies Outcomes engaging computer science and information technology product development, and rendering service to the communities in need. It upholds the
tradition of excellence embodied by the Lasallian education. The Bachelor of Science in Computer Science (BSCS) and Bachelor of Science in
Information Technology (BSIT) programs emphasize actual implementation of theories and project – oriented and real world environment.
General Objectives The College of Computer Studies supports the college mission of providing education towards the development of every student to become
globally competent and capable of addressing the growing needs of the industry in relation to Information and Communication Technology.
Through the years of preparation for professional life, the College of Computer Studies aims to produce graduates who are expected to:
1. Possess both theoretical knowledge and technical expertise to excel in Computer Science and Information Technology.
2. Apply expertise in the development or solutions relevant to local and information technology.
3. Promote honesty, integrity, and diligence in students as they pursue a career in the computer fields.
4. Effectively communicate and collaborate within a team.
Program Intended The Bachelor of Science in Information Technology (BSIT) is the study of utilization of computers and computer software and plan, install,
Learning Outcomes customize operate, manage, administer and maintain information technology infrastructure. The objectives of the program are as follows:
BSCS & BSIT Program Outcomes Based Educat
College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021
Page 2 of 10
1. Prepare the students to be IT professionals, be well versed in application installation, operation, development, maintenance,
administration, and be familiar with hardware installation, operation and maintenance.
2. Enable students to obtain comprehensive knowledge, theoretical and practical skills, deep understanding of latest technology in
information and communications and prepares them to be well versed on applications, installations, operation, development,
maintenance and administration.
3. Equip students with the technical knowledge required for an IT professional to handle multi-tasking and multi-programming situations
and to assess and develop computer based solutions.
4. Produce IT graduates who are globally competent computer experts that can evaluate current and emerging technologies, design user-
friendly interfaces, and assess their impacts on individuals, organizations and the environment.
Each of these LOs addresses the Expected Lasallian Graduate Attributes as follows:
Course Description:
Page 3 of 10
This course is a survey of the fundamental elements of computer security and information assurance. Topics may include confidentiality, integrity, and
availability; security policies; authentication; access control; risk management; threat and vulnerability assessment; common attack/defense methods; ethical issues.
Through weekly lectures and assignments students will gain a high-level understanding of the subject of information assurance.
Course topics include leading practices for information security and assurance governance and risk management; network architecture and design of systems to
maximize assurance; business continuity, disaster recovery planning, resiliency; data privacy risks and laws; understanding legal, investigation, information-security
incident response and management processes; and developing secure application software.
Learning Outcomes:
LO1. Develop a fundamental understanding of the information security profession, enterprise physical security, cryptography, application development
security, enterprise incidence response, enterprise business continuity, disaster recovery planning, cyber resiliency, enterprise risk management and
governance.
LO2. Understand new trends that are transforming enterprise information security and assurance related to cloud computing and mobile applications, Bring
Your Own Device (BYOD) strategies, and current, increasingly rigorous security and information assurance compliance requirements.
Course Output:
Page 4 of 10
As evidence of attaining the above learning outcomes, students are required to do and submit the following during the indicated dates of the term. The rubrics for
these outputs are provided.
Learning Plan:
TEACHING AND
WEEKS HRS LO TOPICS INTENDED LEARNING OUTCOME LEARNING ACTIVITIES ASSESSMENT TASK
(TLA)
Chapter 1
Introduction to Information Security • Define information security
Brainwriting
pp. 1 - 26 • Recount the history of computer
security, and explain how it evolved Set of Activities
Online Interaction
1. History of Information Security into information security
1 4 1 2. What is Security? • Define key terms and critical concepts Case Study
Sketchnoting
3. CNSS Security Model of information security
4. Components of Information System Online/Offline Quiz
Online/Offline Bud
5. Balancing Security and Access
discussion and sharing
6. The System Development Life Cycle
Brainwriting
Set of Activities
Chapter 1 • Enumerate the phases of the security
Introduction to Information Security systems development life cycle Online Interaction
2 4 1 Case Study
• Describe the information security roles
1. The Security System Development Life of professionals within an organization Sketchnoting
Online/Offline Quiz
Cycle
BSCS & BSIT Program Outcomes Based Educat
College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021
Page 5 of 10
2. Security Professionals and the Online/Offline Bud
organization discussion and sharing
3. Communities of Interest
4. Information Security: Is it an art or
science?
5. Security as Science
6. Security as Social Science
Brainwriting
• Demonstrate that organizations have a
Chapter 2 Set of Activities
business need for information security Online Interaction
The need for Security
• Explain why a successful information
3 4 1 Case Study
security program is the responsibility Sketchnoting
1. Business Needs First
of both an organization’s general
2. Threats Online/Offline Quiz
management and IT management Online/Offline Bud
discussion and sharing
Page 6 of 10
Brainwriting
Chapter 3 • Describe the functions of and
Legal, Ethical, and Professional Issues in relationships among laws, regulations, Set of Activities
Online Interaction
Information Security and professional organizations in
5 4 1 information security Case Study
Sketchnoting
1. Law and Ethics in Information • Differentiate between laws and ethics
Security • Identify major national laws that affect Online/Offline Quiz
Online/Offline Bud
2. Relevant U.S. Laws the practice of information security discussion and sharing
Brainwriting
Chapter 4 • Define risk management, risk
Set of Activities
Risk Management identification, and risk control Online Interaction
8 4 2 • Describe how risk is identified and Case Study
1. Overview of Risk Management assessed Sketchnoting
2. Risk Identification • Assess risk based on probability of Online/Offline Quiz
3. Risk Assessment occurrence and likely impact Online/Offline Bud
4. Risk Control Strategies discussion and sharing
BSCS & BSIT Program Outcomes Based Educat
College of Computer Studies
BSCS & BSIT Program Outcomes Based Education
1st Trimester, SY 2020-2021
Page 7 of 10
• Explain the fundamental aspects of
documenting risk via the process of
risk assessment
Page 8 of 10
and awareness programs
Page 9 of 10
Online/Offline Bud
discussion and sharing
14 2 2 FINAL EXAMINATION Examination
References:
• Michael E. Whitman, Herbert J. Mattord, PRINCIPLES OF INFORMATION SECURITY, 4th Edition 2011
Grading System:
The total points that you accumulate throughout the term on the items below will determine your grade:
Page 10 of 10