CS313 Informationn Assurance and Security
CS313 Informationn Assurance and Security
Core Values: Culture-Sensitive; Adherent to Laws; Relevant and Responsive; Efficient and Effective; and Spiritually-oriented (CARES)
Program Educational Objectives. After 3-5 years of completing all the academic requirements, the BSCS graduates could:
1. The BSCS alumni will perform high level of technical expertise in the field of primary and secondary job roles.
2. The BSCS alumni will perform ethical conduct in the practice of computing professionalism.
Design and evaluate solutions for complex computing problems and design and evaluate systems, components, or processes that meet specified needs with appropriate
PO5
considerations for public health and safety, cultural, societal, and environmental consideration
Create, select, adapt and apply appropriate techniques, resources and modern computing tools to complex computing activities, with an understanding of the limitations to
PO6
accomplish a common goal
PO7 Function effectively as an individual and as a member or leader in diverse teams and in multidisciplinary settings
Communicate effectively with the computing community and with society at large about complex computing activities by being able to comprehend and write effective
PO8
reports, design documentation, make effective presentations, and give and understand clear instructions
An ability to recognize the legal, social, ethical and professional issues involved in the utilization of computer technology and be guided by the adoption of appropriate
PO9
professional, ethical and legal practices
PO10 Recognized the need, and have the ability, to engage in independent learning for continual development as a computer professional
Course Outcome
After completion of the course, the students should be able to: PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PO13
Describe the set of controls and processes both technical
and policy intended to protect and defend information and
CO1 P P P P P P
information systems by ensuring the availability, integrity,
authentication, and confidentiality and providing for non-repudiation.
Articulate the strengths and weaknesses associated with different
CO2 approaches to security to the validity of current and past processes P P P P P P
and data.
I – Introduce, P – Practice, D-Demonstrate
COURSE OUTLINE AND TIME FRAME (54 HOURS LECTURE WITH LABORATORY)
Week 1 Course Content/Subject Matter
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph
I. Orientation
a. VGMO
b. Classroom policy
c. Requirement/s of the course
Unit I: Fundamental Aspects
Week 1
History and terminology
Security mindset (reasoned paranoia)
Design principles (defense in depth)
System/security life-cycle
Week 2
Security implementation mechanisms
Gates, guards, guns; cryptography
Information assurance analysis model
MSR model*; threats; vulnerabilities; attacks; countermeasures
Week 3
Disaster recovery (natural and man-made)
Forensics
Unit II: Security Mechanisms (Countermeasures)
Cryptography
Cryptosystems
Week 4
Keys: symmetric & asymmetric
Performance (software/hardware)
Implementation
Authentication
"Who you are, what you have, what you know"
Week 5 Bio-authentication (use of biometrics)
Redundancy
Intrusion detection
Week 6 Unit III: Operational Issues
Trends
Auditing
Cost / benefit analysis
Asset management
Standards
Enforcement
Legal issues
Disaster recovery (natural and man-made)
Creation of policies
Maintenance of policies
Prevention
Week 7
Avoidance
Incident response (forensics)
Domain integration (physical, network, internet, etc.)
Unit V: Attacks
Social engineering
Week 8
Denial of service
Protocol attacks
Active attacks
Passive attacks
Buffer overflow attacks
Week 9
Malware (viruses, Trojan horses, worms)
MIDTERM EXAM
Week 10 Unit VI: Security Domains
Security awareness
Possible Domains:
Human-Computer Interaction
Information Management
Integrative Programming
Networking
Program Fundamentals
Platform Technologies
System Administration
Week 11 System Integration and Architecture
Social and Professional Issues
Web Systems
Physical plant
Unit VII: Forensics
Legal systems
Week 12
Digital forensics and its relationship to other forensic disciplines
Rules of evidence
Search and seizure
Digital evidence
Media analysis
Week 13
Week 14 Transmission
Storage
Processing
Unit IX: Security Services
Availability
Week 15
Integrity
Confidentiality
Authentication (source reliability)
Non-repudiation
Perpetrators
Week 17 Inside attacks
External attacks
Black hat
White hat
Ignorance
Carelessness
Network
Week 18
Hardware (design, implementation, installation, etc.)
Software (design, implementation, installation, etc.)
Physical access
FINAL EXAM
Video
conferencing
software
CO1, CO2 -Authentication Online modality Quiz Intrusion Books / Week 5
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph
a. Explained the process and "Who you are, what you have, using Learning detection hands Ebooks
value of two-factor what you know" management Assignment on activity
authentication. Bio-authentication (use of system Laptop
b. Discussed the significance biometrics)
of authentication to secure -Redundancy Offline pdf LCD
data -Intrusion detection Projector
PowerPoint
c. Apply intrusion detection Presentation Compiled
IM’s
Teacher-Centered
Strategy (Lecture
Video
conferencing
software
CO1, CO2 Unit III: Operational Issues Online modality Quiz Books /
a. Described legal and using Learning Ebooks
ethical considerations related Trends management Assignment
to the handling Auditing system Laptop
Cost / benefit analysis
b. Managed enterprise Asset management Offline pdf LCD
Information assets. Standards Projector
Enforcement PowerPoint
Week 6
c. Apply disaster Legal issues Presentation Compiled
recovery for data Disaster recovery (natural and IM’s
man-made) Teacher-Centered
Strategy (Lecture
Video
conferencing
software
CO1, CO2 Unit IV: Policy Online modality Quiz Books / Week 7
a. Described a situation using Learning Ebooks
in which an incident would Creation of policies management Assignment
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph
Video
conferencing
software
CO1, CO2 Online modality Quiz Network security Books /
a. Explained how a Denial Unit V: Attacks using Learning Hands on Ebooks
of Service attack works management Assignment activity
against an organization’s Social engineering system Laptop
network. Denial of service
b. Discussed the concept of Protocol attacks Offline pdf LCD
social engineering Active attacks Projector
c. Detect active attack PowerPoint
Week 8
Presentation Compiled
IM’s
Teacher-Centered
Strategy (Lecture
Video
conferencing
software
CO2 -Passive attacks Online modality Quiz Network security Books / Week 9
a. Described and explain -Buffer overflow attacks using Learning Hands on Ebooks
how a Buffer Overflow -Malware (viruses, Trojan horses, management Assignment activity
Attack might be used to worms) system Laptop
compromise a system.
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph
Video
conferencing
software
e.g. Multiple e.g. Laboratory/ December 2020 Test paper, 1
Choice Hands-on exam, TOS,
MIDTERM EXAMINATION Questions performance- assessment
(Coverage: Unit I to IX) (TOS must be based exams rubrics or
provided) (rubrics/criteria criteria
must be
provided)
CO2 Unit VI: Security Domains Security Online modality Quiz Network security Books / Week 10
a. Described the aspects of Engineering: using Learning Hands on Ebooks
Human-Computer Security awareness AGuide to management Assignment activity
Interactions which must be Possible Domains: Building system Laptop
considered in designing and Human-Computer Interaction Dependable
implementing secure Information Management Distributed Offline pdf LCD
systems Integrative Programming Systems Projector
Networking By: Ross J. PowerPoint
b. explained computer Anderson Presentation Compiled
security awareness Published by IM’s
c. apply information Wiley (2013) Teacher-Centered
management ISBN;13: Strategy (Lecture
978;0471389224
Video
Information conferencing
Assurance and software
Security
CO1 Introduction to Online modality Quiz Programming
a. Discussed several best Program Fundamentals IA using Learning hands on activity
practices in programming Platform Technologies By: Bill Young management Assignment
that can prevent security System Administration (2015) system Books /
flaws. System Integration and Ebooks
b. Explained the concept of Architecture Understanding Offline pdf
web systems Social and Professional Issues Information Laptop
c. Apply system integration Web Systems Assurance and PowerPoint
Week 11
Physical plant Security Presentation LCD
By: Yulia Projector
Cherdantsevaa, Teacher-Centered
and Jeremy Strategy (Lecture Compiled
Hiltonb (2010) IM’s
https://www.skil Video
lscommons.org/ conferencing
handle/taaccct/2 software
Unit VII: Forensics 915 Online modality Quiz Books / Week 12
CO1, CO2 using Learning Ebooks
a. Explained the concept of Legal systems https://subjectgu management Assignment
“reasonable expectation of Digital forensics and its ides.lib.neu.edu/ system Laptop
privacy”, its relationship relationship to other forensic c.php?
to corporate policy disciplines g=336025&p=2 Offline pdf LCD
banners displayed on Rules of evidence 263046 Projector
workstations. Search and seizure PowerPoint
https://courses.e Presentation Compiled
b. discussed the use of email ngr.illinois.edu/c IM’s
as evidence in the s461/fa2010/lect Teacher-Centered
prosecution of an ures.html Strategy (Lecture
employee by the
corporation. https://web2.utc. Video
edu/~djy471/CP conferencing
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph
SC3600/index.ht software
m
Video
conferencing
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph
software
CO2 Unit IX: Security Services Online modality Quiz Web security
a. Described the possible using Learning hands on
availability levels for a web Availability management Assignment
service Integrity system
Books /
b. Discussed security in web Confidentiality
Ebooks
services Authentication (source reliability) Offline pdf
c. Apply web service security Non-repudiation
Laptop
PowerPoint
Presentation Week 15
LCD
Projector
Teacher-Centered
Strategy (Lecture
Compiled
IM’s
Video
conferencing
software
Application
CO2 Unit X: Threat Analysis Model Online modality Quiz Conduct
a. Perform a comprehensive using Learning company risk
risk assessment for a Risk assessment management Assignment assessment
specified organization Cost benefit system Books /
b. Explained the benefits of Ebooks
risk assessment Offline pdf
c. Discussed threat analysis Laptop
model PowerPoint
Week 16
Presentation LCD
Projector
Teacher-Centered
Strategy (Lecture Compiled
IM’s
Video
conferencing
software
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph
https://www.skillscommons.org/handle/taaccct/2915
https://subjectguides.lib.neu.edu/c.php?g=336025&p=2263046
https://courses.engr.illinois.edu/cs461/fa2010/lectures.html
https://web2.utc.edu/~djy471/CPSC3600/index.htm
Course Requirements 1. Topic Reporting utilizing traditional and recent educational technologies
2. Research work and assignment
3. On-Time submission of written works / exercises / reports.
4. CHEATING during examination; COPYING & PLAGIARISM of submitted materials are never allowed.
5. The instructor reserves the right to either accept or deny outputs that are submitted later than the due date.
Grading System Following the Quality Policy Manual of the College of ICT, the grading system below shall be used:
LECTURE
Class Recitation/Participation/Attendance - 10%
Assignment - 20%
Quizzes - 30%
Mid-Term/Final Term Exam - 40%
Total = 100%
Final Rating = (Final Term Grade x 2) plus Mid-Term Grade divided by 3 or FR = FT (2) + MT
3
Classroom Policies Online class using learning management system platforms:
1. Assignments must be submitted on or before the assigned deadline, late submission will have a corresponding deduction on the graded
assignment
2. Quizzes and exam will be taken only once by the individual student, it will automatically lock when the specified date and time limit is reach.
The student may take special quizzes and exam provided that the student has justifiable and valid reason.
3. The online class in open for student’s individual class discussion/ consultation and clarification during week days, Monday to Friday 8:00am to
5:00pm.
Offline class using Exe LMS platform, e-copies:
1. Modules will be given to individual students through the use of USB drive provided by the individual student. A URL link will be provided by
the instructor for the student to access and download the said learning materials.
2. The student must submit assignments, quizzes, exams and reports on time that being set by the instructor.
RODERICK S. TINGZON MARIA VANISA A. AKMAD ENGR. ROY M. PAMA, MIT BAINORIE A. MANTAWIL, EdD HARRIS M. SINOLINDING,
Ph.D.
Course Instructor College Librarian Dean, College of ICT Director for Instruction Vice Pres. for Academic Affairs