100% found this document useful (2 votes)
448 views

CS313 Informationn Assurance and Security

This document contains a course syllabus for CS313 Information Assurance and Security at Cotabato Foundation College of Science and Technology. The 2-unit course focuses on ensuring the availability, integrity, authentication, confidentiality, and non-repudiation of information and information systems. The syllabus outlines the course description, contact hours, prerequisites, program educational objectives, program outcomes addressed, course outcomes, and a course outline with topics covered over 14 weeks.

Uploaded by

Roderick
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
448 views

CS313 Informationn Assurance and Security

This document contains a course syllabus for CS313 Information Assurance and Security at Cotabato Foundation College of Science and Technology. The 2-unit course focuses on ensuring the availability, integrity, authentication, confidentiality, and non-repudiation of information and information systems. The syllabus outlines the course description, contact hours, prerequisites, program educational objectives, program outcomes addressed, course outcomes, and a course outline with topics covered over 14 weeks.

Uploaded by

Roderick
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Republic of the Philippines

COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY


Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

COURSE SYLLABUS (OBE)


First Semester 2020– 2021
Vision: CFCST: haven of intellectuals in 2023
Mission: CFCST shall endeavor to be a potent vehicle in uplifting the socio-economic status of its clientele and neighboring communities through the provision of custodial care services, access to
education and relevant training in science and technology.

Core Values: Culture-Sensitive; Adherent to Laws; Relevant and Responsive; Efficient and Effective; and Spiritually-oriented (CARES)

Course Name CS313 (Information assurance and security)


Course Credit 2 units
Information assurance, which focuses on ensuring the availability, integrity, authentication, confidentiality, and non-repudiation of information and systems.
These measures may include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
Course Description
Information security, which centers on the protection of information and information systems from unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide confidentiality, integrity, and availability.
Contact Hours/week two hours per week
Prerequisite None

Program Educational Objectives. After 3-5 years of completing all the academic requirements, the BSCS graduates could:
1. The BSCS alumni will perform high level of technical expertise in the field of primary and secondary job roles.
2. The BSCS alumni will perform ethical conduct in the practice of computing professionalism.

Program Outcome Code Program Outcomes


Apply knowledge of computing fundamentals, knowledge of a computing specialization, and mathematics, science and domain knowledge appropriate for the computing
PO1
specialization to the abstraction and conceptualization of computing models from defined problems and requirements.
Identify, analyze, formulate, research literature, and solve complex computing problems and requirements reaching substantiated conclusions using fundamental principle
PO2
of mathematics, computing sciences, and relevant domain discipline.
An ability to apply mathematical foundations, algorithmic principles and computer science theory in the modeling and design of computer- based systems in a way that
PO3
demonstrates comprehension of the tradeoffs involved in design choices.
PO4 Knowledge and understanding of information security issues in relation to the design, development and use of information systems
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

Design and evaluate solutions for complex computing problems and design and evaluate systems, components, or processes that meet specified needs with appropriate
PO5
considerations for public health and safety, cultural, societal, and environmental consideration
Create, select, adapt and apply appropriate techniques, resources and modern computing tools to complex computing activities, with an understanding of the limitations to
PO6
accomplish a common goal
PO7 Function effectively as an individual and as a member or leader in diverse teams and in multidisciplinary settings
Communicate effectively with the computing community and with society at large about complex computing activities by being able to comprehend and write effective
PO8
reports, design documentation, make effective presentations, and give and understand clear instructions
An ability to recognize the legal, social, ethical and professional issues involved in the utilization of computer technology and be guided by the adoption of appropriate
PO9
professional, ethical and legal practices
PO10 Recognized the need, and have the ability, to engage in independent learning for continual development as a computer professional

Course Outcome
After completion of the course, the students should be able to: PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PO13
Describe the set of controls and processes both technical
and policy intended to protect and defend information and
CO1 P P P P P P
information systems by ensuring the availability, integrity,
authentication, and confidentiality and providing for non-repudiation.
Articulate the strengths and weaknesses associated with different
CO2 approaches to security to the validity of current and past processes P P P P P P
and data.
I – Introduce, P – Practice, D-Demonstrate

COURSE OUTLINE AND TIME FRAME (54 HOURS LECTURE WITH LABORATORY)
Week 1 Course Content/Subject Matter
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

I. Orientation
a. VGMO
b. Classroom policy
c. Requirement/s of the course
Unit I: Fundamental Aspects
Week 1
History and terminology
Security mindset (reasoned paranoia)
Design principles (defense in depth)
System/security life-cycle
Week 2
Security implementation mechanisms
Gates, guards, guns; cryptography
Information assurance analysis model
MSR model*; threats; vulnerabilities; attacks; countermeasures
Week 3
Disaster recovery (natural and man-made)
Forensics
Unit II: Security Mechanisms (Countermeasures)
Cryptography
Cryptosystems
Week 4
Keys: symmetric & asymmetric
Performance (software/hardware)
Implementation
Authentication
"Who you are, what you have, what you know"
Week 5 Bio-authentication (use of biometrics)
Redundancy
Intrusion detection
Week 6 Unit III: Operational Issues

Trends
Auditing
Cost / benefit analysis
Asset management

Form No. : FM -DPM- CFCST PRS—01


Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

Standards
Enforcement
Legal issues
Disaster recovery (natural and man-made)

Unit IV: Policy

Creation of policies
Maintenance of policies
Prevention
Week 7
Avoidance
Incident response (forensics)
Domain integration (physical, network, internet, etc.)

Unit V: Attacks

Social engineering
Week 8
Denial of service
Protocol attacks
Active attacks

Passive attacks
Buffer overflow attacks
Week 9
Malware (viruses, Trojan horses, worms)

MIDTERM EXAM
Week 10 Unit VI: Security Domains

Security awareness
Possible Domains:
Human-Computer Interaction

Form No. : FM -DPM- CFCST PRS—01


Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

Information Management
Integrative Programming
Networking

Program Fundamentals
Platform Technologies
System Administration
Week 11 System Integration and Architecture
Social and Professional Issues
Web Systems
Physical plant
Unit VII: Forensics

Legal systems
Week 12
Digital forensics and its relationship to other forensic disciplines
Rules of evidence
Search and seizure
Digital evidence
Media analysis
Week 13

Unit VIII: Information States

Week 14 Transmission
Storage
Processing
Unit IX: Security Services

Availability
Week 15
Integrity
Confidentiality
Authentication (source reliability)
Non-repudiation

Form No. : FM -DPM- CFCST PRS—01


Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

Unit X: Threat Analysis Model


Week 16
Risk assessment
Cost benefit
Unit XI: Vulnerabilities

Perpetrators
Week 17 Inside attacks
External attacks
Black hat
White hat
Ignorance
Carelessness
Network
Week 18
Hardware (design, implementation, installation, etc.)
Software (design, implementation, installation, etc.)
Physical access
FINAL EXAM

Pen and Paper Assessment


Authentic Assessment (Laboratory and Field Work) using Scoring Criteria developed by the whole class
Written Outputs (to be assessed using the Scoring Criteria developed by the whole class)
Quizzes/Assignments
Assessment Task
Teaching and
Desired Learning Course Content/ Textbooks/ (ATs) Resource Time Table
Learning
Outcomes(DLO) Subject matter References Theory Based Practice Based Assessment Materials
Activities (TLAs)
Schedule
At the end of the semester, the Course Content/Subject Matter Week 1
students must:
I.Orientation
a. be oriented about the a.VGMO
school’s VMGO b.Classroom policy CFCST student PowerPoint Reflective First Formative CFCST
b. be informed about c.Requirement/s of the course Manual Presentation Writing Test student

Form No. : FM -DPM- CFCST PRS—01


Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

classroom policies and CFCST handbook,


requirements of the course. Operation Teacher-Centered operation
Manual Strategy (Lecture) manual
CO1 Security Online modality Quiz Hands on Books /
a. described the history of the Unit I: Fundamental Aspects Engineering: using Learning activity Ebooks
field of Information AGuide to management Assignment To secure the
Assurance and Security -History and terminology Building system computer from Laptop
b. discussed -Security mindset (reasoned paranoia) vulnerabilities
Dependable
fundamental aspects Offline pdf LCD
of computer security Distributed Projector
c. apply simple Systems PowerPoint
By: Ross J. Week 1
computer simple Presentation Compiled
configuration to Anderson IM’s
secure the computer Published by Teacher-Centered
Wiley (2013) Strategy (Lecture
ISBN;13:
978;047138922 Video
conferencing
4
software
CO1, CO2 -Design principles (defense in depth) Online modality Quiz Hands on Books / Week 2
a. Discussed the -System/security life-cycle Information using Learning activity about Ebooks
relationship between -Security implementation Assurance and management Assignment computer threats
threats, vulnerabilities, mechanisms Security system Laptop
countermeasures, attacks, Gates, guards, guns; cryptography Introduction to
compromises and IA Offline pdf LCD
Remediation. By: Bill Young Projector
(2015) PowerPoint
b. Explained the concept of Presentation Compiled
cryptography IM’s
c. Apply basic Understanding Teacher-Centered
cryptography to encrypt Information Strategy (Lecture
data Assurance and
Security Video
conferencing
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

By: Yulia software


CO1, CO2 -Information assurance analysis Cherdantsevaa, Online modality Quiz Hands on Books /
model and Jeremy using Learning activity about Ebooks
a. Explained the security MSR model*; threats; Hiltonb (2010) management Assignment computer
mindset and the role of vulnerabilities; attacks; system security Laptop
https://www.sk
"paranoia" in that mindset. countermeasures
b. Discussed the deferent -Disaster recovery (natural and man- illscommons.or Offline pdf LCD
threats that can harm made) g/handle/taacc Projector
computers -Forensics ct/2915 PowerPoint
Week 3
Presentation Compiled
c. Apply data recovery https://subject IM’s
guides.lib.neu. Teacher-Centered
edu/c.php? Strategy (Lecture
g=336025&p=2
Video
263046
conferencing
software
CO1, CO2 Unit II: Security Mechanisms https://courses Online modality Quiz Hands on Books /
a. Explained the three (Countermeasures) .engr.illinois.ed using Learning activity about Ebooks
key factors involved in -Cryptography u/cs461/fa201 management Assignment authentication
authentication and how they Cryptosystems 0/lectures.html system Laptop
are used to verify identity and Keys: symmetric &
Grant access to a system. asymmetric https://web2.u Offline pdf LCD
b. Discussed symmetric and Performance tc.edu/~djy47 Projector
asymmetric performance (software/hardware) PowerPoint
1/CPSC3600/in Week 4
cryptosystem keys Implementation Presentation Compiled
c. Apply cryptosystems to a
dex.htm IM’s
sample program Teacher-Centered
Strategy (Lecture

Video
conferencing
software
CO1, CO2 -Authentication Online modality Quiz Intrusion Books / Week 5
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

a. Explained the process and "Who you are, what you have, using Learning detection hands Ebooks
value of two-factor what you know" management Assignment on activity
authentication. Bio-authentication (use of system Laptop
b. Discussed the significance biometrics)
of authentication to secure -Redundancy Offline pdf LCD
data -Intrusion detection Projector
PowerPoint
c. Apply intrusion detection Presentation Compiled
IM’s
Teacher-Centered
Strategy (Lecture

Video
conferencing
software
CO1, CO2 Unit III: Operational Issues Online modality Quiz Books /
a. Described legal and using Learning Ebooks
ethical considerations related Trends management Assignment
to the handling Auditing system Laptop
Cost / benefit analysis
b. Managed enterprise Asset management Offline pdf LCD
Information assets. Standards Projector
Enforcement PowerPoint
Week 6
c. Apply disaster Legal issues Presentation Compiled
recovery for data Disaster recovery (natural and IM’s
man-made) Teacher-Centered
Strategy (Lecture

Video
conferencing
software
CO1, CO2 Unit IV: Policy Online modality Quiz Books / Week 7
a. Described a situation using Learning Ebooks
in which an incident would Creation of policies management Assignment
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

require a full forensic Maintenance of policies system Laptop


approach including evidence Prevention
Gathering, full chain of Avoidance Offline pdf LCD
custody auditing and expert Incident response (forensics) Projector
analysis. Domain integration (physical, PowerPoint
b. Discussed domain network, internet, etc.) Presentation Compiled
integration IM’s
c. Create policies and Teacher-Centered
maintenance Strategy (Lecture

Video
conferencing
software
CO1, CO2 Online modality Quiz Network security Books /
a. Explained how a Denial Unit V: Attacks using Learning Hands on Ebooks
of Service attack works management Assignment activity
against an organization’s Social engineering system Laptop
network. Denial of service
b. Discussed the concept of Protocol attacks Offline pdf LCD
social engineering Active attacks Projector
c. Detect active attack PowerPoint
Week 8
Presentation Compiled
IM’s
Teacher-Centered
Strategy (Lecture

Video
conferencing
software
CO2 -Passive attacks Online modality Quiz Network security Books / Week 9
a. Described and explain -Buffer overflow attacks using Learning Hands on Ebooks
how a Buffer Overflow -Malware (viruses, Trojan horses, management Assignment activity
Attack might be used to worms) system Laptop
compromise a system.
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

b. Discussed how the Offline pdf LCD


malware can harm the Projector
computer PowerPoint
c. Delete computer Presentation Compiled
malwares IM’s
Teacher-Centered
Strategy (Lecture

Video
conferencing
software
e.g. Multiple e.g. Laboratory/ December 2020 Test paper, 1
Choice Hands-on exam, TOS,
MIDTERM EXAMINATION Questions performance- assessment
(Coverage: Unit I to IX) (TOS must be based exams rubrics or
provided) (rubrics/criteria criteria
must be
provided)
CO2 Unit VI: Security Domains Security Online modality Quiz Network security Books / Week 10
a. Described the aspects of Engineering: using Learning Hands on Ebooks
Human-Computer Security awareness AGuide to management Assignment activity
Interactions which must be Possible Domains: Building system Laptop
considered in designing and Human-Computer Interaction Dependable
implementing secure Information Management Distributed Offline pdf LCD
systems Integrative Programming Systems Projector
Networking By: Ross J. PowerPoint
b. explained computer Anderson Presentation Compiled
security awareness Published by IM’s
c. apply information Wiley (2013) Teacher-Centered
management ISBN;13: Strategy (Lecture
978;0471389224
Video

Form No. : FM -DPM- CFCST PRS—01


Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

Information conferencing
Assurance and software
Security
CO1 Introduction to Online modality Quiz Programming
a. Discussed several best Program Fundamentals IA using Learning hands on activity
practices in programming Platform Technologies By: Bill Young management Assignment
that can prevent security System Administration (2015) system Books /
flaws. System Integration and Ebooks
b. Explained the concept of Architecture Understanding Offline pdf
web systems Social and Professional Issues Information Laptop
c. Apply system integration Web Systems Assurance and PowerPoint
Week 11
Physical plant Security Presentation LCD
By: Yulia Projector
Cherdantsevaa, Teacher-Centered
and Jeremy Strategy (Lecture Compiled
Hiltonb (2010) IM’s
https://www.skil Video
lscommons.org/ conferencing
handle/taaccct/2 software
Unit VII: Forensics 915 Online modality Quiz Books / Week 12
CO1, CO2 using Learning Ebooks
a. Explained the concept of Legal systems https://subjectgu management Assignment
“reasonable expectation of Digital forensics and its ides.lib.neu.edu/ system Laptop
privacy”, its relationship relationship to other forensic c.php?
to corporate policy disciplines g=336025&p=2 Offline pdf LCD
banners displayed on Rules of evidence 263046 Projector
workstations. Search and seizure PowerPoint
https://courses.e Presentation Compiled
b. discussed the use of email ngr.illinois.edu/c IM’s
as evidence in the s461/fa2010/lect Teacher-Centered
prosecution of an ures.html Strategy (Lecture
employee by the
corporation. https://web2.utc. Video
edu/~djy471/CP conferencing
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

SC3600/index.ht software
m

CO2 Digital evidence Online modality Quiz


a. Explain why “free space” Media analysis using Learning
often contains interesting management Assignment
data. system Books /
b. Discussed media analysis Ebooks
c. Apply media analysis Offline pdf
Laptop
PowerPoint
Week 13
Presentation LCD
Projector
Teacher-Centered
Strategy (Lecture Compiled
IM’s
Video
conferencing
software
CO2 Unit VIII: Information States Online modality Quiz Books / Week 14
a. Analyzed a proposed data using Learning Ebooks
storage system Transmission management Assignment
b. Apply data storage system Storage system Laptop
Processing
c. described all of the Offline pdf LCD
information objects and Projector
their states PowerPoint
during the entire object Presentation Compiled
lifecycle. IM’s
Teacher-Centered
Strategy (Lecture

Video
conferencing
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

software
CO2 Unit IX: Security Services Online modality Quiz Web security
a. Described the possible using Learning hands on
availability levels for a web Availability management Assignment
service Integrity system
Books /
b. Discussed security in web Confidentiality
Ebooks
services Authentication (source reliability) Offline pdf
c. Apply web service security Non-repudiation
Laptop
PowerPoint
Presentation Week 15
LCD
Projector
Teacher-Centered
Strategy (Lecture
Compiled
IM’s
Video
conferencing
software
Application
CO2 Unit X: Threat Analysis Model Online modality Quiz Conduct
a. Perform a comprehensive using Learning company risk
risk assessment for a Risk assessment management Assignment assessment
specified organization Cost benefit system Books /
b. Explained the benefits of Ebooks
risk assessment Offline pdf
c. Discussed threat analysis Laptop
model PowerPoint
Week 16
Presentation LCD
Projector
Teacher-Centered
Strategy (Lecture Compiled
IM’s
Video
conferencing
software
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

CO2 Unit XI: Vulnerabilities Online modality Quiz


a. Demonstrate how you using Learning
would test a system for Perpetrators management Assignment
vulnerabilities. Inside attacks system Books /
b. Discussed white and black External attacks Ebooks
hat hackers Black hat Offline pdf
c. Explained computer White hat Laptop
external attacks Ignorance PowerPoint
Week 17
Presentation LCD
Projector
Teacher-Centered
Strategy (Lecture Compiled
IM’s
Video
conferencing
software
CO2 Carelessness Online modality Quiz Presentation of
a. Developed user Network using Learning the security
education modules to educate Hardware (design, management Assignment software’s to the
users on their role in implementation, installation, etc.) system company Books /
information assurance. Software (design, Ebooks
b. Discussed network implementation, installation, etc.) Offline pdf
hardware design Physical access Laptop
c. Explained physical PowerPoint
Week 18
network access Presentation LCD
Projector
Teacher-Centered
Strategy (Lecture Compiled
IM’s
Video
conferencing
software
FINAL TERM EXAMINATION e.g. Multiple e.g. Laboratory/ April 2021 Test paper,
(Content: unit I to XI) Choice Hands-on exam, TOS,
Form No. : FM -DPM- CFCST PRS—01
Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

Questions performance- assessment


(TOS must be based exams rubrics or
provided) (rubrics/criteria criteria
must be
provided)

Suggested Readings and References


Security Engineering: AGuide to Building Dependable Distributed Systems
By: Ross J. Anderson Published by Wiley (2013)
ISBN;13: 978;0471389224

Information Assurance and Security Introduction to IA


By: Bill Young (2015)

Understanding Information Assurance and Security


By: Yulia Cherdantsevaa, and Jeremy Hiltonb (2010)

https://www.skillscommons.org/handle/taaccct/2915

https://subjectguides.lib.neu.edu/c.php?g=336025&p=2263046

https://courses.engr.illinois.edu/cs461/fa2010/lectures.html

https://web2.utc.edu/~djy471/CPSC3600/index.htm
Course Requirements 1. Topic Reporting utilizing traditional and recent educational technologies
2. Research work and assignment
3. On-Time submission of written works / exercises / reports.
4. CHEATING during examination; COPYING & PLAGIARISM of submitted materials are never allowed.
5. The instructor reserves the right to either accept or deny outputs that are submitted later than the due date.
Grading System Following the Quality Policy Manual of the College of ICT, the grading system below shall be used:

Form No. : FM -DPM- CFCST PRS—01


Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 
Republic of the Philippines
COTABATO FOUNDATION COLLEGE OF SCIENCE AND TECHNOLOGY
Barangay Doroluman, Arakan, Cotabato
Telefax No. (064) 577-1343
email address [email protected] website: www.cfcst.edu.ph

COLLEGE OF INFORMATION AND COMMUNICATION TECHNOLOGY

LECTURE
Class Recitation/Participation/Attendance - 10%
Assignment - 20%
Quizzes - 30%
Mid-Term/Final Term Exam - 40%
Total = 100%

Final Rating = (Final Term Grade x 2) plus Mid-Term Grade divided by 3 or FR = FT (2) + MT
3
Classroom Policies Online class using learning management system platforms:
1. Assignments must be submitted on or before the assigned deadline, late submission will have a corresponding deduction on the graded
assignment
2. Quizzes and exam will be taken only once by the individual student, it will automatically lock when the specified date and time limit is reach.
The student may take special quizzes and exam provided that the student has justifiable and valid reason.
3. The online class in open for student’s individual class discussion/ consultation and clarification during week days, Monday to Friday 8:00am to
5:00pm.
Offline class using Exe LMS platform, e-copies:
1. Modules will be given to individual students through the use of USB drive provided by the individual student. A URL link will be provided by
the instructor for the student to access and download the said learning materials.
2. The student must submit assignments, quizzes, exams and reports on time that being set by the instructor.

Submitted by: Concurred by: Noted by: Recommending Approval: Approved:

RODERICK S. TINGZON MARIA VANISA A. AKMAD ENGR. ROY M. PAMA, MIT BAINORIE A. MANTAWIL, EdD HARRIS M. SINOLINDING,
Ph.D.
Course Instructor College Librarian Dean, College of ICT Director for Instruction Vice Pres. for Academic Affairs

Form No. : FM -DPM- CFCST PRS—01


Issue Status 01
Revision No. 00
Date Effective : 30 September, 2017
Approved by : President
 
 
 

You might also like