GitHunt
FL

flexycode/CTINASSL

πŸ€– This repository is intended for our Information Assurance and Security by Professor Gaudencio Jeffrey G. Romano

πŸ›‘οΈ Information Assurance and Security (CTINASSL)

Name: Jay Arre Talosig Β 

Subject & Section: CCTINASSL - COM231

Schedule: TUE 03:00PM - 05:40 PM VR03CCIT - FRI 03:00PM - 07:00 PM 410 MB

Professor: Mr. Gaudencio Jeffrey G. RomanoΒ Β  Β 

No. of Units: 3 Units

Prerequisite: CTINFMGL

πŸ“œ Course Description

This course provides a comprehensive introduction to the fundamental principles and practices of Information Assurance (IA) and Security.
Students will learn about the essential concepts of confidentiality, integrity, and availability (the CIA Triad), risk management, security policies, and the technical mechanisms
used to protect computing systems and networks. Topics cover various aspects, including cryptography, access control, network security, and secure software development.
The course emphasizes both the theoretical foundations and the practical application of security measures in real-world scenarios.


🎯 Learning Objectives

Upon successful completion of this course, students will be able to:

  • Analyze the current threat landscape and the impact of security breaches on organizations.
  • Apply fundamental cryptographic concepts and algorithms to secure data transmission and storage.
  • Design and implement access control mechanisms to enforce security policies.
  • Evaluate the security posture of networks and systems, identifying vulnerabilities and recommending countermeasures.
  • Develop secure coding practices and understand the principles of secure software development.
  • Formulate effective security policies and procedures for organizational use.

πŸ“š Course Topics

  1. Introduction to Information Security
    • CIA Triad (Confidentiality, Integrity, Availability)
    • Security Threats, Vulnerabilities, and Attacks
    • Risk Management and Assessment
  2. Security Policy and Law
    • Security Governance and Compliance
    • Legal and Ethical Issues in Information Security
  3. Cryptography
    • Symmetric and Asymmetric Cryptography (e.g., AES, RSA)
    • Hashing and Digital Signatures
    • Public Key Infrastructure (PKI)
  4. Access Control and Authentication
    • Authentication Methods (Password, Biometrics, Multi-Factor)
    • Authorization Models (e.g., DAC, MAC, RBAC)
  5. Network Security
    • Firewalls, Intrusion Detection/Prevention Systems (IDS/IPS)
    • Virtual Private Networks (VPNs) and Secure Protocols (e.g., SSL/TLS)
    • Wireless Security (e.g., WPA3)
  6. Operating System and Application Security
    • Secure Configuration and Hardening
    • Malware and Anti-Malware Techniques
    • Secure Software Development Lifecycle (SDLC)
  7. Web Security
    • Common Web Vulnerabilities (e.g., XSS, SQL Injection)
    • Defense Mechanisms

πŸ› οΈ Programming Assignments & Lab Activity

Lab Activity

All lab assignments, resources, and reports will be organized following the structure below.

πŸ“ Repository Structure

CTINASSL/
β”œβ”€β”€ activity/
β”‚   β”œβ”€β”€ LEC AC1/
β”‚   β”œβ”€β”€ LEC AC2/
β”‚
β”œβ”€β”€ assignments/
β”‚   β”œβ”€β”€ assignment1-
β”‚   β”œβ”€β”€ assignment2-LEC AS2 - SEC POLICY
β”‚   β”œβ”€β”€ assignment3-LEC AS3 - RISK
β”‚   β”œβ”€β”€ assignment4-TBA/
β”‚   └── assignment5-TBA/
β”œβ”€β”€ lectures/
β”‚   β”œβ”€β”€ LEC AC1 - πŸ“šFiller/
β”‚   β”œβ”€β”€ LEC AC2 - πŸ“šFiller/
β”‚   β”œβ”€β”€ LEC AC3 - πŸ“šFiller//
β”‚   β”œβ”€β”€ module4-TBA/
β”‚   β”œβ”€β”€ module5-TBA/
β”‚   β”œβ”€β”€ module6-TBA/
β”‚   └── module7-TBA/
β”œβ”€β”€ labs/
β”‚   β”œβ”€β”€ LAB AC1 - SCHEDULE
β”‚   β”œβ”€β”€ LAB AC2 - NODE INSTALLATION + Backend Mongoose
β”‚   β”œβ”€β”€ lab3-TBA/
β”‚   β”œβ”€β”€ lab4-TBA/
β”‚   β”œβ”€β”€ lab5-TBA/
β”‚   └── lab6-TBA
β”‚
β”œβ”€β”€ week 1 - πŸ›‘οΈ Introduction to Information Security
β”œβ”€β”€ week 2 - πŸ›‘οΈ Professional Issues in Information Security
β”œβ”€β”€ week 3 - πŸ›‘οΈ Planning for Security
β”œβ”€β”€ week 4 - πŸ›‘οΈ Risk Management
β”œβ”€β”€ week 5 - πŸ›‘οΈ Cryptography and Steganography
β”œβ”€β”€ week 6 - πŸ›‘οΈ Overview of Vulnerability Assessment
β”‚
β”œβ”€β”€ x-Final Project/
β”‚   └── README.md/
β”‚
β”œβ”€β”€ y- Project Proposal/
β”‚   └── TBA/
β”‚
β”œβ”€β”€ resources/
β”‚   β”œβ”€β”€ textbooks/
β”‚   β”œβ”€β”€ reference-materials/
β”‚   └── useful-links.md
β”œβ”€β”€ LICENSE
└── README.md

πŸ“« Changelogs

Chronological list of updates, bug fixes, new features, and other modifications for πŸ›‘οΈ Information Assurance and Security (CTINASSL) topic.

πŸ“¦ Version 1.0.0 - November 17, 2025

Project Initialization

  • ✨ Created initial repository structure
  • ✨ Set up course folder organization
  • ✨ Established Information Assurance and Security workflow
  • πŸ”§ Initial project configuration and README.md setup
  • πŸ“š Added course syllabus and learning objectives

πŸ“¦ Version 1.1.0 - November 18, 2025

Course Content Updates

  • ✨ Added comprehensive course topics breakdown
  • ✨ Created assignment planning structure
  • ✨ Implemented repository organization
  • πŸ”§ Enhanced development environment setup guide
  • πŸ“š Added recommended resources and textbooks
  • πŸ› Fixed course description to reflect Information Assurance and Security content
  • πŸ“ Updated documentation formatting

Commit Message : 🧊 CTINASSL

🀝 Contributing

This repository contains coursework for academic purposes. If you're a fellow student:

  • Feel free to discuss concepts and approaches
  • Do not copy assignments directly - academic integrity is important
  • Create your own implementations and solutions
  • Collaborate on understanding, not on copying

πŸ“§ Contact

For questions about this coursework:

  • Students: Jay Arre Talosig
  • Course: CTINASSL - Information Assurance and Security
  • Institution: National University

Back to Table of Content


mystreak

mystreak

Β Β Β Β