0% found this document useful (0 votes)
24 views4 pages

Cybersecurity Overview and Essentials

The document provides an overview of cybersecurity, highlighting its importance in protecting computers, networks, and data from malicious attacks. It outlines key areas of cybersecurity, common threats, and essential security measures, emphasizing the need for user education and strong password practices. Additionally, it discusses the legal framework for cybersecurity in the Philippines, including relevant laws and penalties for cybercrime.

Uploaded by

Sydney Duldulao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views4 pages

Cybersecurity Overview and Essentials

The document provides an overview of cybersecurity, highlighting its importance in protecting computers, networks, and data from malicious attacks. It outlines key areas of cybersecurity, common threats, and essential security measures, emphasizing the need for user education and strong password practices. Additionally, it discusses the legal framework for cybersecurity in the Philippines, including relevant laws and penalties for cybercrime.

Uploaded by

Sydney Duldulao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

COMPUTER FUNDAMENTALS fundamental concepts that form the

AND PROGRAMMING foundation of effective cybersecurity.

L E SSON 5: CY BE R SE C UR I T Y : AN Key Areas of Cybersecurity


OVE R V I E W
1. Network Security – Addresses
Definition and Importance vulnerabilities in operating
systems, network architecture,
Cybersecurity is the practice of defending servers, firewalls, and network
computers, servers, mobile devices, protocols.
electronic systems, networks, and data 2. Cloud Security – Secures data,
from malicious attacks. It is also known as applications, and infrastructure in
information technology security or the cloud.
electronic information security. 3. IoT (Internet of Things) Security
– Protects smart devices that
Cybersecurity applies in a variety of connect to the internet without
contexts, from business to mobile human intervention, such as fire
computing, and can be divided into alarms, thermostats, and lights.
several key categories: 4. Application Security – Focuses
on vulnerabilities in designing,
 Network Security – Securing a coding, and publishing software
computer network from or websites.
intruders, whether targeted
attackers or opportunistic Cybersecurity vs. Information Security
malware.
 Application Security – Keeping Cybersecurity is often confused with
software and devices free from information security:
threats by addressing
vulnerabilities at the design stage
 Cybersecurity – Focuses on
before deployment.
protecting computer systems
 Information Security – from unauthorized access or
Protecting the integrity and being damaged or made
privacy of data, both in storage inaccessible.
and in transit.
 Information Security – A broader
 Operational Security – Managing category that protects all
the processes and decisions information assets, whether in
related to handling and hard copy or digital form.
protecting data assets, including
user permissions and data
Challenges in Cybersecurity
storage policies.

Mitigating cybersecurity risks can be


Cybersecurity Basics
challenging, especially in remote work
environments where organizations have
Before diving into advanced security
measures, it is essential to understand the
less control over employee behavior and points for cybercriminals, making
device security. security essential.
3. Network Security – Conduct
Essential Security Concepts network penetration tests to
assess vulnerabilities and security
Understanding these basic principles is risks.
crucial for protecting an organization: 4. Leadership Commitment – Cyber
resilience requires top
 Authentication – Verifies a user's management to invest in
identity using: cybersecurity resources and
training.
o Something you know 5. Password Management –
(password). Enforce policies guiding
o Something you have employees to create strong
(security key). passwords and keep them secure.
o Something you are
(fingerprint). Basic Security Measures

 Authorization – Determines what Strong Password Practices


resources verified users can
access. o Create unique
 Confidentiality – Ensures passwords for each
sensitive data is accessible only account.
to authorized individuals using o Use at least 12 characters
encryption and access controls. combining letters,
 Integrity – Maintains the numbers, and symbols.
accuracy and completeness of o Enable multi-factor
data throughout its lifecycle. authentication
 Availability – Ensures that whenever possible.
information is accessible to o Use a password
authorized users when needed, manager for secure
while protecting against storage.
disruptions.
Regular Software Updates
Cybersecurity Checklist
o Enable automatic
Must-Have Security Measures updates where possible.
o Apply security patches
1. User Education – Employees immediately upon
must be trained to recognize release.
security threats and apply best o Maintain an inventory of
practices. software requiring
updates.
2. Application Security – Web
applications are common entry
Data Backup Types of Cyber Threats

o Backup critical data at Cybersecurity threats fall into three main


least weekly. categories:
o Store backups in
multiple locations 1. Cybercrime – Individuals or
(including offline groups targeting systems for
backups). financial gain or disruption.
o Regularly test data
2. Cyber-Attack – Politically
recovery processes.
motivated attacks, often used for
espionage or sabotage.
Access Control
3. Cyberterrorism – Intended to
undermine systems to cause
o Grant users access only panic or fear.
as necessary for their
roles.
Common Cyber Threats
o Review access rights
quarterly.
o Remove access  Malware – Malicious software
immediately for like viruses and spyware.
departing employees.  Phishing – Fraudulent emails or
o Implement role-based messages tricking users into
access control. revealing sensitive information.
 Ransomware – Attackers encrypt
Warning Signs of Security Issues files and demand payment for
decryption.
Watch for these common indicators of
potential security problems: Cyber Safety Tips

 Systems running slower than 1. Update software and operating


usual. systems regularly.
 Unexpected pop-ups or 2. Use antivirus software and keep
password changes. it updated.
 Unusually high network traffic. 3. Use strong passwords that are
 Disabled security tools or difficult to guess.
antivirus. 4. Avoid opening email
 Unauthorized programs starting attachments from unknown
automatically. senders.
 Strange outbound network 5. Do not click on suspicious links in
connections. emails or websites.
6. Avoid using unsecured WiFi in
Implementing strong cybersecurity public places.
fundamentals can help protect against
common threats and support more
advanced security measures.
Why is Cybersecurity Important? Common Cybercrime Complaints in the
Philippines
Rising Costs of Cybersecurity Breaches
1. Online scams – Fraudulent
Organizations suffering cyber breaches schemes to steal money.
face financial penalties and reputational 2. Online libel – Spreading false
damage. information online.
3. Online threats – Sending digital
Increasingly Sophisticated Cyber Attacks threats.
4. Identity theft – Using someone’s
Attackers use a wide range of tactics, personal data without consent.
including social engineering, malware, 5. Photo and video voyeurism –
and ransomware. Sharing private media without
consent.
Cybersecurity as a Board-Level Issue
Cybercrime Offenses Under RA 10175
Regulations and compliance requirements
make cybersecurity a critical concern for  Illegal Access – Unauthorized
business leaders. system entry (hacking).
 Illegal Interception – Accessing
Cybercrime is a Growing Industry private communications.
 Data Interference – Modifying or
A study by McAfee and CSIS estimates deleting digital records.
that cybercrime causes over $1 trillion in  System Interference – Installing
global economic losses annually. viruses or disrupting operations.

Penalties: Prison terms of 6 to 12 years


and fines starting at ₱200,000.
Legal Framework: Cybersecurity Laws in
the Philippines 2. Republic Act No. 10173 – Data Privacy
Act of 2012
1. Republic Act No. 10175 – Cybercrime
Prevention Act of 2012  Protects personal data collected
by organizations and government
 Defines and penalizes cyber- agencies.
related offenses (hacking,  Establishes the National Privacy
identity theft, cyber libel, child Commission (NPC) to enforce
pornography). data privacy regulations.
 Establishes the Cybercrime
Investigation and Coordinating
Center (CICC).

You might also like