Module in Information Management System
Module in Information Management System
TABON
MAED-1E
Module Guide
This module is designed and focus on major topics such as conduct digital
safety and security concept testing and documentation, elements of IT security
and the relation between the information security principles.
Module Outcomes
It is believed that once a student attained understanding of the competency,
the student is capable of the following areas of expertise in digital safety and
security.
Module Requirements
As a final requirement of this module, student have to be able to answers
questions provided in each subsequent topics according to the time allotted
given to them. After completion of this module, the learners must submit a
“Video” highlighting competency to the following controls: administrative,
Module Parts
This module is consisting of the following parts, intrusion triangle, security
terminology, physical security control and preventing accidental compromise of
data. This encompasses all the lessons covering this module.
Pre Assessment
Before we begin with our lessons, let us assess your knowledge on the
topic provided herein.
1. With the many types of electronic communication, which is the best for
regular entries, commentaries, and most like an on-line diary?
A. Discussion Board
B. Blog
C. Chat Room
D. Podcast
2. Real-time conversations and group on-line discussion needs are best
served by: A. Discussion Boards
B. Blogs
C. Chat Rooms
D. Podcasts
3. What is the term for an on-line digital media file that can be audio or
video and does not require a media player only a computer with Internet
access?
A. Blog
B. Chat Room
C. Discussion Board
D. Podcast
4. Which of the following information types are the MOST dangerous to disclose?
A. Your first name
B. Your birth date
C. Your hair color
D. Your social security number
5. A cyber bully uses all of the following on-line methods to intimidate EXCEPT:
8. Spyware tracks and monitors individual user habits through the use of:
A. Cookies
B. Cache
C. Scripts
D. Tags
MY ANSWERS
1. B. Blog
2. C. Chat Rooms
3. D. Podcast
4. D. Your social security number
5. C. Pushing, hitting, screaming in person
6. C. Secure and protected
7. D. Pet names
Key Terms
Let’s Begin!
Watch a documentary about ‘Zero Days’. https://www.youtube.com/watch?v=PJBBRUraKgo
6. Explain the ways to protect your Digital presence from Hackers and
Cyber-attacks based on documentary.
ANS: The documentary 'Zero Days' offers insights into protecting
your digital presence from hackers and cyber-attacks. Based on the
documentary, here are some ways to enhance your digital security:
Keep software and devices updated with the latest security patches.
Use strong and unique passwords for all online accounts and
consider using a password manager.
Be cautious of suspicious emails, attachments, and links, as they
may contain malware.
Enable two-factor authentication for added security.
Regularly back up important data to a secure location.
Use reputable antivirus and anti-malware software.
Be mindful of the information you share online and on social media
platforms.
Educate yourself about phishing attacks and other social
engineering techniques.
Be cautious when connecting to public Wi-Fi networks and use a
virtual private.
Let’s Level-up!
Let’s Do IT
Task 1. Based on what you have learned in the video and presentation slides,
draw your own safety and security concept and what are your precautionary
measures.
Digital safety and security are important topics in education. Schools can
take several steps to ensure the safety of their students online. Some of
these steps include taking ownership at a senior level, establishing a
strong online perimeter, updating content filters constantly, establishing
solid access control policies, checking third party providers thoroughly,
ensuring secure configuration and patch management, monitoring and
incident management, investing in cybersecurity and online safety
education, creating RUPs, filtering and blocking inappropriate content,
promoting digital citizenship through instruction on how to stay safe
online, establishing clear safety and security policies, assessing school
processes from time to time, documenting, investigating and reporting to
relevant personnel any suspicious incident at school, mandating carrying
of ID cards, training on safety and security, installing a central security
system and issuing access cards to restricted areas
Note: you can use separate paper and paste it here.
Let’s Begin
Watch the video clip about ‘Digital Safety and Security Terminology’ on
YouTube.
TERMINOLOGY MEANING
Short for malicious software,
malware is any type of harmful
Malware
software designed to damage or
disrupt a computer system
The fraudulent attempt to obtain
sensitive information such as
Phishing usernames and passwords by posing
as a legitimate person or entity.
Let’s Level-up!
1.Watch a video clip about ‘Common safety and security terminology’ on
YouTube.
2.Watch a video clip about ‘Digital Information safety’ and ‘Digital Security
Management’ on YouTube.
Let’s do IT
Task 1.
1. Based on the video clip you watched about ‘Digital Information safety’
and ‘Digital Security Management’, What are the components of digital
safety governance? In order to have an effective digital security program.
Task 2.
1.What have you learned from the video clip ‘Security Made Simple: New
Security and Connectivity Solutions’, discuss your insight and what are
the practicability of its solution to real-life scenario in terms of digital
safety and security.
New Security and Connectivity Solutions” appears to be a webinar by
Cisco Meraki that discusses their recent security feature enhancements
Let’s Begin
Watch a movie about ‘Eagle Eye’.
5. Design your own idea about physical security, that will reinforce
physical security of the movie.
To reinforce the physical security in the movie 'Eagle Eye,' an
additional idea could involve implementing biometric
authentication systems to enhance access control. By
integrating fingerprint or iris scanners, the facility can ensure
that only authorized personnel can enter restricted areas,
reducing the risk of unauthorized access. Furthermore,
establishing highly secure data centers with strict access
controls, redundant power and network connectivity, and
advanced environmental monitoring systems would protect
critical information and infrastructure. Integrating a threat
intelligence platform that continuously gathers and analyzes
information about emerging threats would enable proactive
measures to prevent potential attacks. Additionally, installing
advanced physical intrusion detection systems, such as laser or
motion sensors, would provide an extra layer of security to
detect and deter unauthorized entry. Conducting periodic red
team exercises would allow the facility to simulate real-world
attacks, identifying vulnerabilities and improving overall
physical security readiness.
Let’s Level-up
Let’s do IT
Task 5. Watch a video clip about ‘Cisco Meraki – how to use the dashboard’
https://www.youtube.com/watch?v=ERMzSrDALFs
Discuss what have you learned from the video clip and what is the
significance of it to real life solution in information management system?
Let’s Begin
Download a presentation slides on ‘IT Security Threats Vulnerabilities
and Countermeasures’ on BiPSU-LMS under our subject Information
Management System.
Digital safety and security refers to the measures taken to protect against
threats to the confidentiality, integrity, and availability of digital information
and systems. This can include measures such as using strong passwords,
updating software regularly, and being cautious when opening emails or clicking
on links from unknown sources.
2.What are the strategies to help students consistently keep digital safety in
the forefront of their minds.
To help students consistently keep digital safety in the forefront of their minds,
educators can implement several strategies such as incorporating digital safety
education into the curriculum, providing students with resources and tools to
help them stay safe online, and encouraging open communication about digital
safety concerns.
Some signs that your computer may have been hacked include unusual pop-ups
or error messages, slow performance, changes to your homepage or search
engine, unfamiliar programs starting up when you turn on your computer, and
unexpected changes to your files or settings.
5.What are the ways to protect your digital footprints from hackers and cyber-
attack?
There are several ways to protect your digital footprints from hackers and
cyber-attacks, including using strong passwords and multi-factor
authentication, updating software regularly, being cautious when opening
emails or clicking on links from unknown sources, backing up important
data regularly, and using security software such as antivirus programs and
firewalls.
Let’s Level-up
a. Security Awareness Quick Tip: How to Prevent Your Data from Getting
Leaked.
b. Data Loss/Leak Prevention, Security Basics.
c. Prevent Confidential Data Leaks.
d. Protecting your Sensitive Data.
Task 1.
1. Based on the movie ‘The Fifth Estate’ classify the different concepts in
preventing accidental compromise of Data and explain each concept.
In the movie "The Fifth Estate," there are several concepts related
to preventing accidental compromise of data. These concepts can
be classified as follows:
___________________________________________________________________________
If you are to solve problem encountered in the movie ‘The Fifth Estate’
How do you intend to solve it, please draw/illustrate your plan in
preventing accidental compromise of data.
In the video clip "Security Awareness Quick Tip: How to Prevent Your
Data from Getting Leaked," several key concepts are highlighted to
prevent accidental compromise of data. These concepts include using
strong and unique passwords, implementing two-factor authentication for
an additional layer of security, being aware of phishing attempts and
avoiding sharing personal information through email or unknown
platforms. The video also emphasizes the importance of encrypting
sensitive data, using secure Wi-Fi connections, employing secure methods
for file sharing, regularly updating software, and being cautious of
potential security risks. By following these concepts and integrating them
into daily practices, individuals can significantly reduce the risk of
accidental data leaks and enhance data security in their personal and
professional lives. The video serves as a helpful reminder of the
fundamental steps one can take to protect their data from unauthorized
access and leakage.
Task 3. Explain how to avoid accident in compromise data. Based on the video
clip ‘Data Loss/Leak Prevention, Security Basics.’ And ‘Prevent Confidential
Data Leaks’.
In the video clips "Data Loss/Leak Prevention, Security Basics" and
"Prevent Confidential Data Leaks," several key strategies are
emphasized to avoid accidental compromise of data. These strategies
include employee training and awareness programs to educate staff
about data security best practices, data classification and access
controls to restrict access to sensitive data, encryption to protect
data both at rest and in transit, secure file transfer methods to ensure
safe transmission of sensitive information, regular data backups to
prevent data loss, endpoint security measures to safeguard against
1. Jajodia, Sushil and Yu, Ting(2007). Basic Security Concepts. Retrieved from
https://www.researchgate.net/publication/226962016_Basic_Security_Concept
Assessment
Task Description
After completing the module, create a 10-minute explainer video
highlighting the Digital Safety and Security it’s activities and technological
impact that affects the organization/departments. Ideas presented in the video
must be of your own insight.
Create a teaser or introduction of the video and publish it on YouTube or
any other social media platform. The video should have a concrete steps that
are doable and guided by the following questions below:
Mechanics The text and audio The text and The text and
have 4 or more audio have 1-2 audio have no
grammar or spelling grammar or grammar or
errors spelling errors. spelling errors
Production Video is of poor Tape is edited. A Tape is edited.
quality and is variety of Video runs
unedited. There are transitions are smoothly from
no transitions added used and most shot to shot. A
or transitions are transitions help variety of
used so frequently tell the story. transitions are
that they detract from Most of video has used to assist in
the video. There are good pacing and communicating
no graphics. timing. Graphics the main idea.
are used Shots and scenes
appropriately. work well
together.
Graphics explain
and reinforce key
points in the
video.
Total
Self-Assessment
a. Layer 6
b. Traceroute
c. Bridges
d. Bastion host
3. Layering model structured into four layer (link layer, network layer,
transport layer and application layer.
a. Layer 3
b. Layer 1
c. Screen scraper
d. User Datagram Protocol (UDP)
a. True
b. False
a. True
b. False
Vision
A state university leading in research and innovation for human empowerment and
societal development.
Mission
To advance the university through innovative human resource, responsive research,
sustainable production, and demand-driven extension services.
#WOWBiPSU