0% found this document useful (0 votes)
26 views

LECTURE-MODULE-CYBER-SECURITY

The document outlines a course on Cyber Security at Cagayan State University, emphasizing the importance of protecting information and systems from cyber threats in the context of law enforcement and criminal justice education. It covers various topics such as risk management, security systems, and the significance of cyber security for individuals and organizations, including real-world examples of cyber attacks. The course aims to equip students with knowledge and skills to address cyber security challenges and promote awareness in their communities.

Uploaded by

Alona Basal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

LECTURE-MODULE-CYBER-SECURITY

The document outlines a course on Cyber Security at Cagayan State University, emphasizing the importance of protecting information and systems from cyber threats in the context of law enforcement and criminal justice education. It covers various topics such as risk management, security systems, and the significance of cyber security for individuals and organizations, including real-world examples of cyber attacks. The course aims to equip students with knowledge and skills to address cyber security challenges and promote awareness in their communities.

Uploaded by

Alona Basal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

REPUBLIC OF THE PHILIPPINES

CAGAYAN STATE UNIVERSITY


CARIG CAMPUS
Carig Sur, Tuguegarao City, Cagayan
www.csu.edu.ph

EC 2 CYBER SECURITY

Course Description

Effective information security is a challenge in the field of Criminal Justice Education and the
future officers in the Law Enforcement service and private enterprise. It is an effort that requires
academic staff to work together in relation to the current and future problems in the digital world.
Fortunately, the information security community has developed a variety of resources, methods,
and best practices to help modern enterprises and law enforcement agencies address the
challenge.

Effective security requires active interaction of physical security, information security,


personnel security, and other security measures, wherein cyber security is very essential to
address problems relating to digital processes. To this end, the course addresses a range of
topics, each of which is vital to securing the modern enterprise and law enforcement activities.
These topics include, security system, risk management, standards and regulations and physical
security.

Course Intended Learning Outcomes

At the end of the course, the students should be able to:


1. Develop desirable image among CSU-CCJE students and establish recognition of the desired
attributes of a CSUan;
2. Practice courtesy in dealing with the general public and demonstrate good manners most
specially during social gatherings or in social graces;
3. Demonstrate sense of responsibility and accountability to themselves, the community and the
society in general;
4. Apply rules of proper behavior including the proper courtesies of life;
5. Execute exemplary conduct, and apply the customs and traditions of the uniformed service;
6. Use the ability to manage stress and crisis encountered in life;
7. Demonstrate acceptance of one’s sexuality and exemplify awareness, understanding,
appreciation and acceptance of the self;
8. Express awareness and understanding of human rights

1
INTRODUCTION

The problem of cybercrime has spread throughout the world. World leaders are working hard
to win the fight against transnational crime. Because of the adaptation of various technologies,
these are instruments for continuing a cyber-attack. In relation to this topic, it is critical to
understand how to protect our data and network from cyber-criminals. The practice of defending
computers, servers, mobile devices, electronic systems, networks, and data from hostile
intrusions is known as cyber security. It is often referred to as information technology security or
electronic information security.

However, every sovereign faces a hurdle in securing their cyber elements. The capability of
those who will undertake cyber security processes is also an issue, thus trainings and seminars
are both important considerations. Law enforcement personnel and individuals in the legal system
are increasingly embracing technology to combat crime as technology is utilized to perpetrate
more sophisticated crimes. To keep the public secure and protect human life, the criminal justice
system must employ cutting-edge software, tracking systems, and other tools. Technology is
improving law enforcement and, as a result, the interaction between officers and the communities
they serve. Technology has made towns safer places to live and work by providing numerous
methods of dealing with crime.

TOPIC 1

Orientation of the students on the University Vision, Mission and Hymn; Program Goals,
Objectives and Intended Learning outcomes

Intended Learning Objective/s:

At the end of the topic, the students should be able to:


• Explain the University Vision, Mission, and the College and Program Learning Outcomes
• Appreciate the content of the course syllabus

Lesson 1. University Vision, Mission and University Hymn

University Vision

2
CSU is a University with global stature in the arts, culture, agriculture and fisheries, the
sciences as well as technology and professional fields.

University Mission

Cagayan State University shall produce globally competent graduates through excellent
instruction, innovative and creative research, responsive public service and productive industry
and community engagement.

University Hymn

Fount of our visions, cradle of our dreams, well-spring of the fondest hopes for the youth
of this our vale. God bless you, our University God go before you always. That we your sons and
daughters be servants of truth Guardians of justice and instruments of love Rise without fear for
our freedoms. Search without ceasing for all that is true. God be with you, our cherished CSU,
May His light ever unfold you.

Lesson 2. Program Goal and Objectives and Program Intended Learning Outcomes

Program Goal and Objectives

Goals

➢ To provide the students with a strong foundation in criminal justice principles, concept and
theories; and accord them with a practice orientation to justice administration through core
instruction in criminal justice in the domains and law enforcement administration and
courts and correctional administration.

Objectives

The program aims to:


1. Foster the values of leadership, integrity, accountability and responsibility while serving
their fellowmen, community and country.
2. Prepare the students for careers in crime prevention, law enforcement, scientific crime
detection and correctional administration.
3. Encourage research and injury on the nature, causes, treatment or punishment of criminal
behavior and how criminal justice agencies respond to crime, criminals and victims.

Program Intended Learning Outcomes (ILO)

After graduation, the BS Criminology graduates shall be able to:

1. Conduct Criminological Research on crimes, crime causation, victims and offenders, to


include deviant behaviour.

3
2. Internalize the concepts of human rights and victim welfare.
3. Demonstrate competence and broad understanding in Law enforcement administration, public
safety and criminal justice.
4. Utilize criminalistics or forensic Science in the investigation and detection of crime.
5. Apply the principles and jurisprudence of criminal law, evidence, and criminal procedure

TOPIC 2

INTRODUCTION TO CYBER SECURITY

Intended Learning Objective/s


• Describe what cyber security means and why it is important and impact

Defining cyber security

➢ Cyber-security is the practice of protecting critical


systems and sensitive information from digital attacks.
Also known as information technology (IT) security, cyber-
security measures are designed to combat threats against
networked systems and applications, whether those
threats originate from inside or outside of an organization.
➢ Refers to the body of technologies, processes, and
practices designed to protect networks, devices,
programs, and data from attack, damage, or unauthorized
access. Cyber security may also be referred to as
information technology security.

IMPORTANCE OF CYBER SECURITY

Cyber security is important because government, military, corporate, financial, and


medical organizations collect, process, and store unprecedented amounts of data on computers
and other devices. A significant portion of that data can be sensitive information, whether that be
intellectual property, financial data, personal information, or other types of data for which
unauthorized access or exposure could have negative consequences.

4
Organizations transmit sensitive data across networks and to other devices in the course
of doing business, and cyber security describes the discipline dedicated to protecting that
information and the systems used to process or store it. As the volume and sophistication of
cyber-attacks grow, companies and organizations, especially those that are tasked with
safeguarding information relating to national security, health, or financial records, need to take
steps to protect their sensitive business and personnel information.

FOR STUDENTS

Cyber security is important for students because they often target cyber- attacks. In a
recent case, a group of students from a college was targeted by hackers who gained access to
their personal information, including their Social Security numbers and credit card information.
The hackers then used this information to fraudulently charge thousands of dollars to the students'
credit cards. The students were left with massive debt and had to spend months repairing their
credit. This case highlights the importance of cyber security for students, who are often the victims
of cybercrime.

If a student's personal information is stolen in a cyber-attack, it could be used to commit


identity theft. It could ruin the student's credit, making it difficult for the student to get loans for
college or a car. In extreme cases, identity theft can even lead to jail.

IN BUSINESS / ORGANIZATIONS

The importance of Cyber Security for businesses and organizations can be seen in the
case of the target data breach. In this case, hackers were able to gain access to the target's
customer data, including credit and debit card information. It led to target having to pay out millions
of dollars in damages and losing customer trust. Target's data breach is just one example of how
cyber security is important for businesses and organizations.

IN THE BANKING SECTOR

A real-life example of the importance of cyber security for the banking sector is the 2014
JPMorgan Chase data breach. In this breach, hackers gained access to the names, addresses,
phone numbers, and email addresses of 76 million households and 7 million small businesses.
The hackers also gained access to the account information, including account numbers and
balances, of 83 million JPMorgan Chase customers.

This breach highlights the importance of cyber security for the banking sector, as
hackers were able to gain access to a large amount of sensitive customer data. If this data had
fallen into the wrong hands, it could have been used for identity theft, fraud, or other malicious
purposes.

THE IMPACT OF CYBER SECURITY

According to Daniel Castro, the Vice-president of the Information Technology & Innovation
Foundation, a cyber-attack can lead to cost between $57 and &109 billion. It has been found that

5
roughly, 36% of the businesses around the world lose all its money due to cyber-attacks. The
annual loss has an estimation of $79,841 on an average. Most of the time people tend to think
that their business is too small to face cyber-attack and this is where they make a blunder to turn
the tables upside down.

Security measures are taken to safeguard computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks, illegal access, and improper use. If you
operate a business, you need to make efforts to make yourself cyber security in order to keep
your data protected from hackers. Anti-malware and antivirus protection is critical for keeping
dangerous actors out of your machine.

Different types of cyber security

1. Network security is the practice of securing a computer network from intruders, whether
targeted attackers or opportunistic malware.

2. Application security focuses on keeping software and devices free of threats. A


compromised application could provide access to the data its designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.

3. Information security protects the integrity and privacy of data, both in storage and in
transit.

4. Operational security includes the processes and decisions for handling and protecting
data assets. The permissions users have when accessing a network and the procedures
that determine how and where data may be stored or shared all fall under this umbrella.

5. Disaster recovery and business continuity define how an organization responds to a


cyber-security incident or any other event that causes the loss of operations or data.
Disaster recovery policies dictate how the organization restores its operations and
information to return to the same operating capacity as before the event. Business
continuity is the plan the organization falls back on while trying to operate without certain
resources.

6. End-user education addresses the most unpredictable cyber-security factor: people.


Anyone can accidentally introduce a virus to an otherwise secure system by failing to
follow good security practices. Teaching users to delete suspicious email attachments, not
plug in unidentified USB drives, and various other important lessons is vital for the security
of any organization.

6
REFERENCES:

https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security

https://www.ibm.com/ph-en/topics/cybersecurity#:~:text=Resources-
,What%20is%20cybersecurity%3F,sensitive%20information%20from%20digital%20attacks.

https://digitalguardian.com/blog/what-cyber-security

https://www.knowledgehut.com/blog/security/importance-of-cyber-security

ACTIVITY #1

1. In your own words define Cyber security?

2. As a law enforcer someday, how will you promote cyber security and awareness in
the community?

7
PROMPTING KNOWLEDGE RECALL

Before you begin studying Basic network security, consider the current event below:

The Philippines’ data privacy watchdog and top law enforcement agency are investigating
allegations that electoral systems being used for the country’s upcoming general election were
hacked.
The Manila Bulletin, the Philippines’ largest English-language newspaper, published
claims from an anonymous source that the servers of the Philippines Commission on Elections
(COMELEC) were breached on January 8, and that attackers downloaded more than 60 GB of
data.

The data included usernames and PINs of vote-counting machines, as well as “network
diagrams, IP addresses, list of all privileged users, domain admin credentials, list of all passwords
and domain policies, access to the ballot handling dashboard, and QR code captures of the
bureau of canvassers with login and password”, reported the Manila Bulletin.

The data was also alleged to include a “list of overseas absentee voters, [the] location of
all voting precincts with details of board of canvassers, all configuration list of the database, and
list of all user accounts of COMELEC personnel”.
‘No independent verification’
COMELEC said in a statement dated January 10 that it was “presently validating the allegations”,
but added that “usernames and PINS of vote-counting machines” did “not exist in COMELEC
systems simply because the configuration files – which includes usernames and PINs – have not
yet been completed. This calls into question the veracity of the hacking claim”.

QUESTIONS:

1. What do you think is the impact of this to society?

2. Do you think it can harm the society?

8
TOPIC 3
BASIC NETWORK SECURITY

Intended Learning Objective/s


• Describe Basic Network Security
• Explain Fundamentals of Network Security

Defining Network Security


✓ Network security is a broad term that covers a
multitude of technologies, devices and processes. In
its simplest term, it is a set of rules and configurations
designed to protect the integrity, confidentiality and
accessibility of computer networks and data using both
software and hardware technologies.
✓ Network security is a set of technologies that
protects the usability and integrity of a company’s
infrastructure by preventing the entry or proliferation
within a network of a wide variety of potential threats.
✓ Network security is any system, device, or action
designed to protect the safety and reliability of a
network and its data. Like a fence around private land or a lock on a door, network
security manages access to a network by stopping a variety of threats from entering and
spreading through a system.

BENEFITS OF NETWORK SECURITY

1. Builds trust
✓ Security for large systems translates to security for everyone. Network security boosts
client and consumer confidence, and it protects your business from the reputational and
legal fallout of a security breach.
2. Mitigates risk
✓ The right network security solution will help your business stay compliant with business
and government regulations, and it will minimize the business and financial impact of a
breach if it does occur.
3. Protects proprietary information
✓ Your clients and customers rely on you to protect their sensitive information. Your
business relies on that same protection, too. Network security ensures the protection of
information and data shared across the network.
4. Enables a more modern workplace

9
✓ From allowing employees to work securely from any location using VPN to encouraging
collaboration with secure network access, network security provides options to enable
the future of work. Effective network security also provides many levels of security to
scale with your growing business.

TYPES OF NETWORK SECURITY

1. Access control
o Access control is much like it sounds; it controls access to sensitive areas within the
network. By recognizing each user and each divide, you can limit access to only
known users and devices and block or limit access to unrecognized devices and
users.
2. Antivirus and anti-malware software
o Malware, short for “malicious software,” takes many forms to attack your network,
including viruses, worms, Trojans, spyware, or ransomware. While some malware
acts immediately to steal or corrupt data, other malware is stealthier, lying dormant
before secretly infiltrating systems and information.
o Top antivirus and anti-malware software programs will not just scan and monitor
networks for malware upon entry, but will continuously monitor the network for
suspicious behavior and anomalies to help mitigate risk and protect against threats.
3. Application security
o Network security involves not just the integrity of your own systems but the integrity
of the systems you use to support your operations. Each device, software product,
and application used in your network must be vetted and updated to prevent
infiltration via a third-party network. Application security is the practice of protecting
against any vulnerabilities caused by integrating third-party systems and applications.
4. Behavioral analytics
o Behavioral analytics tools are designed to identify risky user behavior that typically
precedes a potential security breach. Identifying threats early on gives network
security administrators the best chance of mitigating any potential threats.
5. Cloud security
o Many businesses are moving to the cloud to benefit from increased efficiency,
reduced costs, integrated tools, and easier collaboration, especially between remote
employees. However, cloud migration comes with its own share of challenges—when
users can connect directly to the Internet, IT professionals lose the visibility into what
employees are doing and increase the risk of data being exposed. To combat this
issue, cloud computing security may include encryption and identify management.

ADDRESSING SECURITY VULNERABILITIES IN A NETWORK

1. Install antivirus software.


• One of the first lines of defense against malware and other viruses is to
install antivirus software on all devices connected to a network (Roach & Watts,
2021). Antivirus software can detect and prevent malicious files from being

10
installed on a system, and it should be updated regularly to include the latest
definitions.
2. Create strong passwords
• Another essential step in protecting a network is to create strong passwords.
Passwords should be at least eight characters long and include a mix of letters,
numbers, and symbols. They should also not be easy to guess—for instance, the
user’s name or the name of the company.
3. Enforce security policies.
• A third way to reduce risk of attacks on a network is to enforce security policies.
Security policies can help ensure that all devices on a network are protected
against viruses and malware and that users are using strong passwords. These
policies can also restrict access to some network regions and limit user privileges.
4. Use firewalls.
• Firewalls are another essential tool in defending networks against security threats.
A firewall can help prevent unauthorized access to a network by blocking incoming
traffic from untrusted sources. Additionally, firewalls can be configured to allow
only certain types of traffic, such as web traffic or email.
5. Monitor activity.
• Finally, it’s important to monitor activity on the network. Tracking logs and other
data enables suspicious activity to be identified quickly, allowing security personnel
to take steps to investigate and mitigate potential threats.

RESOURCES:
https://www.forcepoint.com/cyber-edu/network-security ty Vulnerabilities in a Network

https://www.vmware.com/topics/glossary/content/network-
security.html#:~:text=Network%20security%20is%20a%20set,wide%20variety%20of%20pote
ntial%20threats.

https://www.lucidchart.com/blog/network-security-basics-and-benefits

https://www.eccouncil.org/cybersecurity-exchange/network-security/how-to-prevent-network-
security-attacks/

https://portswigger.net/daily-swig/was-comelec-hacked-philippines-commission-on-elections-
casts-doubt-on-data-breach-claims

11
ACTIVITY #2

Give the top five network security threats and explain how these attacks are managed.

NETWORK SECURITY THREATS DESCRIPTION

Interpret the photo below:

12
TOPIC 4

THE PRINCIPLES OF NETWORK ADMINISTRATION

Intended Learning Objective/s

• Understand the principles of Network Administration


• Apply the different principles of Network administration

Secure Network Administration Principles is essential for ensuring the security and
smooth trafficking of information through systems and controlling the access of such
information. It also helps in tracking the network resources and their allotment method. You as
a security professional must be committed to understand the importance and details of how
these principles work in the bigger picture of InfoSec examination.

Secure networks are a primary necessity for organizations nowadays. However, even
strong networks cannot always prevent threats coming from inside and many other issues
related to security.

The key aspects of administration principles for network security are as follows:

Rules-Based Management

• Management of rules is an important concept to control network communication. It is


based on IT and controlled by rule, i.e., filter driven systems. Rules based management
is also known as the concept of whitelist security management. Whenever an activity
or security event does not match the rule, it is denied by default.

Firewall rules

• A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization's previously established security
policies.
• The rule system followed by a firewall is the first match-apply type. In this case, the final
firewall rule by default is to deny. The principles of this rule are that if any data packet
is not denied or allowed explicitly by any other rule systems then firewall rules always
block that packet by default.

VLAN management

• This is a hardware implementation that segregates the LAN with the help of switches.
In Virtual Local Area Network, every port is assigned to VLAN 1 by default. The network

13
administrator, of course, may change the assigned VLAN on any of the ports or group
together different ports assigning the same VLAN. The main objective of using VLAN is
to manage traffic on networks. VLAN offers fast communication within the network
without any hindrance. However, VLAN communication needs to have a routing function
which may be provided either by the routers or through a specialized switch called the
multilayer switch.
• The VLAN is utilized primarily to control traffic for enhanced performance and
security of the network. It is also used for isolation of traffic from the network segment.
During communication, certain VLANs can be avoided by not defining any specific route
between them. This can also be achieved by specifying a filter between VLANs. The
VLAN should be designed to allow necessary data packets while denying unnecessary
ones.

Secure router configuration

• Securing the router configuration is essential to prevent any unauthorized or malicious


changes to the router. This can be done by following the configurations mentioned
below:-
i. Always use a unique and secret password for router access.
ii. The router configuration should deny every type 5 redirect message of
Internet Control Message Protocol or ICMP.
iii. Use data encryption and secure authentication protocols to protect your
router.
iv. Configure the IP addresses of trusted networks beforehand through
which exchange of data packets will be made.
v. Configuration of management interfaces should be made working on
internal interfaces only using secure protocols.

Access Control List

• The ACL defines whether one can access or be allowed to carry forward a particular
function. It is applicable mostly to access objects but can be extended for use in
communication as well. ACL is mostly used in firewalls, switches and routers as a
measure for security management. The ACL rules are known as “Filters” or “Rules of
ACL” where data packets are allowed as an exception and denied by default.

Port security

• Port Security refers to the various attributes in information technology related to


security. It is a security feature which consists of a layer two traffic control system on
Cisco Catalyst switches (like that of RJ-45 cables used on wall jacks), enabling
administrators to configure switch ports for individuals, thus allowing only some specific
sources to have access.

14
• It helps in avoiding unauthorized access, which is possible through open ports. Unused
ports are thereby blocked or locked with the help of wiring closets and server vaults.
Finally, it is disconnected from the main workstation by disconnecting from the patch
panel.

Flood guards

• This mechanism is used to thwart large-scale DDOS attacks. The primary purpose of
using this process is to identify malicious activities and blocking them automati cally.
This action prevents cyber attackers from entering into the network.

Loop Protection

• A repeating transmission pathway in the network is known as a loop. It uses resources


from networks, particularly from the network throughput capacity and usually, it takes
place in the 2 nd or 3rd layer related to the Ethernet and IP, respectively. Looping as
Ethernet level can be overcome through the use of STP protocol that works both at the
bridge and switch level. The STP learns about the path by using traffic ma nagement.

Implicit Deny

• Another important security measure is the “implicit deny.” As the name suggests it is a
denied by default system which grants resources specifically. The default -deny does
not need to be defined as it is implicit in the management agreement’s permissions.
• The difference between implicit deny and firewalls is that here the routers have the
default deny all calls as the last rule. The default response is an implicit deny only when
in the absence of any explicit allow or deny.

Network Separation

• A desired network design feature is Network Bridging, which has many good attributes.
It avoids 5-4-3 later 1 limitations, maintains the isolation of collision domain and is
inexpensive, transparent to layer 3+ protocols and self-configuring. However, it also
carries drawbacks like latency, no option of collision division, not well scaled and can
result in a loop formation. All these problems can be solved by adding the feature
Network Separation.

Log Analysis

• This process aims to review the log files, audit trails and other types of records
generated by computers to identify policy violations, malicious events, downtimes and
other related issues.

Unified Threat Management

15
This is also known as “All in One Security Appliances.” It is hardware designed
specifically to work in between the Internet and private networks. Undefined threat
management is used for filtering the inbound and outbound traffic that is entering or
leaving the network. Such management is implemented to act more as a firewall,
IPS, IDS, DDOS protection, virus scanning, spam and web filtering, and for tracking
activity. Several unified threat management tools work on the server end for the
maintenance of web applications as well as for the wireless security features.

REFERENCES:

https://resources.infosecinstitute.com/certification/security-plus-secure-network-
administration-principles-sy0-401

https://www.google.com/search?q=firewalls&source=lmns&bih=668&biw=1422&hl=en
&sa=X&ved=2ahUKEwiuzPy5loL9AhXculYBHRCNCWUQ_AUoAHoECAEQAA

ACTIVITY #3

Direction: Give a brief description of the photographs below;

DESCRIPTIONS

16
TOPIC 5

UNDERSTANDING TCP/IP AND WIRELESS NETWORKS

Intended Learning Objective:


✓ Understand the principles of Network Administration

What is TCP/IP?
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is a
set of standardized rules that allow computers to communicate on a network such as
the internet.

How it works?
TCP/IP is a two-layered program: the higher layer (TCP) disassembles message
content into small "data packets" that are then transmitted over the Internet to be re-
assembled by the receiving computer's TCP back into the message's original form

What Does Wireless Network Mean?

Wireless networks are computer networks that are not connected by cables of
any kind. The use of a wireless network enables enterprises to avoid the costly
process of introducing cables into buildings or as a connection between different
equipment locations. The basis of wireless systems are radio waves, an
implementation that takes place at the physical level of network structure.
Wireless networks use radio waves to connect devices such as laptops to the
Internet, the business network and applications. When laptops are connected to
Wi-Fi hot spots in public places, the connection is established to that business’s
wireless network.

There are four main types of wireless networks:

17
✓ Wireless Local Area Network (LAN): Links two or more devices using a wireless
distribution method, providing a connection through access points to the wider
Internet.
✓ Wireless Metropolitan Area Networks (MAN): Connects several wireless LANs.
✓ Wireless Wide Area Network (WAN): Covers large areas such as neighboring towns
and cities.
✓ Wireless Personal Area Network (PAN): Interconnects devices in a short span,
generally within a person’s reach.

Definition
✓ Wi-Fi is a wireless technology used to connect computers, tablets, smartphones and other
devices to the internet.
✓ Wi-Fi is the radio signal sent from a wireless router to a nearby device, which translates
the signal into data you can see and use. The device transmits a radio signal back to the
router, which connects to the internet by wire or cable.

What is a Wi-Fi network?

A Wi-Fi network is simply an internet connection that’s shared with multiple devices in
a home or business via a wireless router. The router is connected directly to your
internet modem and acts as a hub to broadcast the internet signal to all your Wi-Fi
enabled devices. This gives you flexibility to stay connected to the internet as long as
you’re within your network coverage area.

What does Wi-Fi stand for?

The term was created by a marketing firm because the wireless industry was looking
for a user-friendly name to refer to some not so user-friendly technology known
as IEEE 802.11 and the name stuck. Wi-Fi, often referred to as WiFi, wifi, wi-fi or wi fi,
is often thought to be short for Wireless Fidelity and the organization that paid for the
marketing firm is sometimes referred to as the Wireless Fidelity Alliance Inc.

How does Wi-Fi work?

Wi-Fi uses radio waves to transmit data from your wireless router to your Wi-Fi
enabled devices like your TV, smartphone, tablet and computer. Because they
communicate with each other over airwaves, your devices and personal information
can become vulnerable to hackers, cyber-attacks and other threats.

Types of Wi-Fi connections

Wire line/router

18
Most homes use a wireless router to access the internet these days. The pros include
convenience of setup, mobility within range of the Wi-Fi access point (router) and the
ability to connect multiple devices.
Mobile hotspot or jetpack
Mobile and dedicated hotspots are becoming a more popular way of connecting safely
on the go. Two common hotspot devices are your smartphone and a jetpack. Most any
smartphone or tablet today can be used as a temporary hotspot and is a great option
if you occasionally need it. It’s easy to use and doesn’t require buying extra devices,
but it can zap your battery life and data pretty fast.
LTE Home Internet
If you live in a rural area where your internet options are limited, 4G LTE Home
Internet is worth considering. It offers high speed internet service delivered over cell
phone towers and mobile networks with average download speeds around 25 Mbps.
The advantages of LTE over satellite are better speeds and reliability depending on
your carrier.
5G Home Internet
5G Home Internet (Fixed Wireless Access) is now in more places around the country.*
Even with multiple devices connected, it’s reliable and fast enough to power your
whole home. Fixed wireless access has a simple plug and play setup, which means
there are no messy wires and no need to wait for a technician to come to your home
for setup.

REFERENCES:

https://www.google.com/search?q=tcp+ip+network&source=lmns&bih=668&biw=1
422&hl=en&sa=X&ved=2ahUKEwjg2pGkr4L9AhXYkVYBHWTGCdIQ_AUoAHoEC
AEQAA
https://www.techopedia.com/definition/26186/wireless-network
https://www.verizon.com/articles/internet-essentials/wifi-
definiton/#:~:text=A%20Wi%2DFi%20network%20is,your%20Wi%2DFi%20enable
d%20devices.

19
ACTIVITY #4

DIRECTION: Compare LAN and WIFI by using the Ven diagram below

How to protect your home network security especially WIFI?

1.

2.

3.

4.

5.

6.

20
TOPIC 6

RISK MITIGATION
Intended Learning Objective
• Explain how to Best Mitigate Cyber security Risks and Protect Your Data

What is cyber risk mitigation?

• Cyber risk mitigation is the application of policies, technologies and procedures to reduce
the likelihood and impact of a successful cyber-attack. It is a critical practice to help guide
decision-making around risk control and mitigation and allows your organization to stay
protected and achieve its business goals.

How to mitigate cyber risk?

With today’s evolving threat landscape, a


comprehensive cyber risk mitigation strategy
is crucial to your organization’s security
posture and success. Here are eight actions
you can take to improve cyber risk mitigation
across your network:

1. Conduct a cyber-risk assessment

o A cyber risk assessment uncovers risks that exist across your organization’s
networks, devices, applications, and users, and helps you determine how big an
impact those risks are.

2. Establish network access controls

o Once you have assessed your assets and identified security gaps, the next step is to
establish network access controls to mitigate the risk of threats from malicious
insiders and outside attackers. These controls will also reduce the number of issues
due to negligence or a lack of familiarity with security best practices.

21
3. Implement firewall and threat detection software

o Another cyber risk mitigation strategy is to install firewall and threat detection
software. A firewall and other threat detection systems (such as endpoint detection
and remediation solutions) monitor your network traffic to identify any suspicious
activity.

4. Install security patches and updates

✓ Installing updates and security patches on a regular basis is a critical step for mitigating
cyber risk. The faster security gaps are closed, the less opportunity there is for
cybercriminals to exploit vulnerabilities in unpatched or outdated software. Moreover, a
consistent patch management schedule mitigates cyber risk by identifying your
enterprise’s vulnerabilities, checking for availability of patches and then systematically
rolling patches out to the appropriate assets.

5. Conduct regular employee training

✓ One of the best ways to mitigate cyber risk is to provide security training to employees.
Training raises awareness about how to properly identify and respond to the security
threats facing your organization.

6. Adopt automated security technologies

✓ It is no longer possible for people to manage the expanding attack surface, nor process
the high volume of vulnerabilities emerging every day, without assistance. Security
automation tools such as Cyber Asset Attack Surface Management (CAASM), Risk-
based Vulnerability Management (RBVM) and Cyber Risk Quantification (CRQ) automate
cyber risk mitigation processes and allow security teams to work at scale.

7. Minimize the attack surface

✓ Your attack surface is the sum of all of the points on your enterprise network where an
attacker can attempt to gain unauthorized access to your information systems. To
effectively mitigate cyber risk, you need to make your attack surface smaller and harder
to compromise. You can do this by accurately inventorying your assets and removing
applications and devices you don’t need. It can also be done by continuously identifying,
prioritizing and remediating vulnerabilities. Tools like penetration tests and cyber risk
quantification solutions can help you to prioritize remediation efforts based on risk
likelihood and impact.

22
MAJOR CYBER SECURITY TIPS
1. Back up your data

✓ Backing up the data on your devices — by copying it to another, separate location — is


one of the most important things you can do. If you’re targeted by a cyber attack you may
not be able to access or use your computer, phone, or any of your other devices. But, if
you’ve backed your data up you won’t lose any of it, regardless of what ends up happening
to your device.

2. Keep your devices and your apps up-to-date

✓ When you’re alerted to an update for your device or one of your apps, don’t ignore it —
install it as soon as possible. Updates aren’t just about adding new features. They’re also
about fixing vulnerabilities in a device or an app that attackers could find and use to gain
access to your system. If your device can’t receive updates anymore, we recommend
planning to upgrade to a newer model.

3. Choose unique passwords

✓ We all have so many online accounts now that it’s become hard to keep track of all of the
passwords we need for them. To combat this, many of us use the same password for all
of our accounts, or stick to two or three different ones that we use over and over. The
problem with this is that if an attacker gets access to one of your account passwords, it
often gives them access to many of your other accounts as well.

4. Turn on two-factor authentication

✓ Two-factor authentication (2FA) is another way that you can help to protect your online
accounts from being hacked. You can choose to have a code sent or generated on your
device, like your phone, that you can use to authenticate who you are every time you log
in. That way, even if someone gets access to the account password, if they don’t have
your phone to receive the code they can’t get into your accounts.

5. Be creative with the answers to your account recovery questions

✓ When you set up a new account online, you’re often asked to set an answer to an ‘account
recovery question’. These are generally used as a way to identify you if you forget your
password and need a prompt. They’re often based on easy to remember things about you
— like your mother’s maiden name, the name of your first pet or where you went to school.
Unfortunately, these are also easy things for an attacker to find out, and could be used to
gain access to your accounts without your knowledge.

6. Avoid sensitive transactions on free wifi

23
It’s good to be careful about what you do online when you’re using a hotspot or free wifi — if
you’re logging on at a cafe, for example — as these networks are often unsecure. When a
network’s unsecure, anyone can access it and get hold of your data.

7. Install an antivirus and scan for viruses regularly

✓ Antivirus software can help you detect and remove malware — viruses — from your
computer system. If you don’t have antivirus installed already, consider investing in it. If
you’re using Microsoft Windows 7 or newer, it comes with a free antivirus called Windows
Defender. Otherwise, get a legitimate antivirus from a well-known, trusted company —
your local computer services company can give you advice on what would work best for
you. Don’t just download any free antivirus software online, as many of the ones you see
advertised for free are fake. They could download malware or adware onto your computer
instead of helping you detect and remove it.

8. Be smart about social media

✓ Did you know that the information you post to your Facebook profile, your Twitter feed or
your Instagram account could be used to steal your identity or hack into your online
accounts? We’re so used to sharing things online that we don’t really think about it
anymore. Everyone knows your pet's name, where you went to school, where you work,
and even when you’re away on holiday.

9. Limit the personal information you give out online

✓ Scams, fraud and phishing emails all attempt to trick you into giving away your personal
information or your financial details — often by pretending to be a legitimate business, like
a bank. It’s good to be aware of this so you can work out what’s a genuine request and
what isn’t. Don’t give out personal information online unless you know who’s asking for it
and why.

REFERENCES:

https://www.balbix.com/insights/what-is-cyber-risk-
mitigation/#:~:text=cyber%20risk%20mitigation%3F-
,Cyber%20risk%20mitigation%20is%20the%20application%20of%20poli
cies%2C%20technologies%20and,and%20achieve%20its%20business%
20goals.

https://www.cert.govt.nz/individuals/guides/get-started-cyber-security/

24
ACTIVITY #5

REFLECTION:

The end goal of a phishing attack is to steal


credentials particularly financial and login
information to steal money, or worst, to
compromise an entire organisation.
Phishing incidents continue to skyrocket in
Southeast Asia. The latest data from the global
cyber security company Kaspersky shows that it
took only six months this year for cybercriminals
to exceed the total number of phishing attacks
they made the year before against users in the
region.

1. What do you believe the long-term consequences of phishing attacks will be if they
are not stopped and controlled?

2. What solutions do you have to the problem of phishing attacks?

https://www.bangkokpost.com/tech/2419616/phishing-attacks-more-than-double. View our policies at


http://goo.gl/9HgTd

25
TOPIC 7

BASIC INCIDENT RESPONSE AND FORENSICS

Prior to understand the Basic incident response and forensics. Label the following
basic parts of computer.

A. CENTRAL PROCESSING UNIT


B. GRAPHIC PROCESSING UNIT
C. HARD DISK DRIVE
D. RANDOM ACCESS MEMORY
E. MOTHERBOARD

26
5 BASIC COMPUTER COMPONENT

Whether it's a gaming system or a home PC, the five main components that make
up a typical, present-day computer include:

• A motherboard
▪ A motherboard is the main printed circuit board (PCB) in a computer.
The motherboard is a computer's central communications backbone
connectivity point, through which all components and external peripherals
connect. ... Additional components can be added to a motherboard
through its expansion slots.

• A Central Processing Unit (CPU)


▪ The CPU is the brain of a computer, containing all the circuitry needed to
process input, store data, and output results. The CPU is constantly
following instructions of computer programs that tell it which data to
process and how to process it. Without a CPU, we could not run programs
on a computer.

• A Graphics Processing Unit (GPU), also known as a video card


▪ Graphics processing unit, a specialized processor originally designed to
accelerate graphics rendering. ... GPUs may be integrated into the
computer's CPU or offered as a discrete hardware unit.

• Random Access Memory (RAM), also known as volatile memory


▪ RAM stands for random-access memory, but what does that mean? Your
computer RAM is essentially short term memory where data is stored as
the processor needs it. ... RAM can slow down your computer if there isn't
enough of it for the processor to perform the tasks you ask it to.

• Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)


▪ An HDD is a data storage device that lives inside the computer. It has
spinning disks inside where data is stored magnetically. The HDD has an
arm with several "heads" (transducers) that read and write data on the disk
▪ A solid-state drive (SSD) is a new generation of storage device used in
computers. SSDs use flash-based memory, which is much faster than a
traditional mechanical hard disk. Upgrading to an SSD is one of the best
ways to speed up your computer

DIGITAL FORENSIC AND DIGITAL EVIDENCE

Digital forensics is a branch of forensic science that focuses on identifying, acquiring,


processing, analysing, and reporting on data stored electronically.

27
o The main goal of digital forensics is to extract data from the electronic evidence,
process it into actionable intelligence and present the findings for prosecution.
All processes utilize sound forensic techniques to ensure the findings are
admissible in court

Electronic evidence is a component of almost all criminal activities and digital forensics
support is crucial for law enforcement investigations.

Electronic evidence can be collected from a wide array of sources, such as computers,
smartphones, remote storage, unmanned aerial systems, ship borne equipment, and more.

WHAT IS DIGITAL FORENSICS?

- It is a process of preservation, identification,


extraction, and documentation of computer
evidence which can be used by the court of law.
There are many tools that help you to make this
process simple and easy. These applications
provide complete reports that can be used for legal
procedures.

ELECTRONIC DOCUMENT, DIGITAL EVIDENCE AND DIGITAL FORENSIC


EXAMPLES

28
Examples of electronic records include: emails, websites, Word/Excel documents, digital
purchase receipts, databases, text messages, social media postings, and information stored
on SharePoint sites and content management systems.

COMPUTER DATA AND EVIDENTIAL DATA


Definition of persistent data
• Persistent data is any data stored on a persistent storage medium. A persistent (or non-
volatile) storage medium is a medium where the data remains intact after it has been
written, until it is overwritten. This includes flash memory (SSDs, USB sticks), hard disks,
magnetic tape, and optical media.
• Any data that needs to be used after the process that created it has completed must be
stored on a persistent storage medium. For example, invoices are generated during the
process of a business making a sale to a customer through their online shop, and need to
be kept after that purchase transaction has been completed.

What are volatile data?


• Volatile Data are data that are digitally stored in a way that the probability is very high for
their contents to get deleted, overwritten or altered in a short amount of time by human or
automated interaction.
• Evidence that is only present while the computer is running is called volatile evidence and
must be collected using live forensic methods. This includes evidence that is in the
system’s RAM (Random Access Memory), such as a program that only is present in the
computer’s memory

Examples) for) volatile) data


• Caches'(e.g.'arp- and'dns-caches)
• Unsaved'documents
• Running'processes
• Passwords'and'encryption'keys
• Open'network'connections
• System'information
• Logged'in'users
• Temporarily'connected'remote'storage
• Malware'binaries'only'stored'in'RAM

29
Two types of volatile data

1. Volatile Data on the Physical Computer like open network connections, running
processes and services, arp3 and caches.

2. Transient Data that are not volatile in their nature but are only accessible on scene.
Encrypted volumes as well as remote resources are examples for this kind of data. The
characteristic of these data is that the contents of the data might get inaccessible, altered
or deleted after the search, if the investigator is not be able to acquire them.

REFERENCES:

https://www.interpol.int/en/How-we-work/Innovation/Digital-forensics

https://finance.uw.edu/recmgt/erecords#:~:text=Examples%20of%20ele
ctronic%20records%20include,%2C%20DropBox%2C%20etc.).

https://www.rudderstack.com/learn/data-security/what-is-persistent-
data/#:~:text=A%20persistent%20(or%20non%2Dvolatile,magnetic%20t
ape%2C%20and%20optical%20media.

TOPIC 8

The Importance of Security Training

Intended Learning Objectives

• Discuss the importance of security training


• Explain the essentiality of computer ethics

The importance of cyber-security training


✓ Employee awareness is paramount. Your human firewall can make or break your cyber
security shield, and your colleagues are at once your company’s greatest assets, its
biggest weakness and its best defence.

Building Effective Cyber-security Awareness Training

✓ Cyber security awareness training for all employees, regardless of role, is an absolute
necessity if an organization is serious about shielding its sensitive data from
cybercriminals. Additionally, the industry in which your organization operates and the
functions it performs may fall under federal and state regulatory mandates that require
annual cybersecurity awareness training for employees. According to Ken Crawshaw, a
United Training instructor and cybersecurity subject matter expert,

30
BACKGROUND ON THE DIFFERENT CYBER-CRIME UNITS IN THE PHILIPPINES
SPECIALISED INSTITUTIONS

Department of Justice – Office of Cybercrime

✓ Republic Act No. 10175 or the Cybercrime Prevention Act of 2012 created
the Office of Cybercrime (OOC) within the DOJ and designated it as
the Central Authority in all matters relating to international mutual assistance
and extradition for cybercrime and cyber-related matters.

National Bureau of Investigation – Cybercrime Division

✓ The NBI Cybercrime Division continues to hold information drives


on social media platforms, seminars, and capacity-building and
training on new technologies.
✓ The agency also randomly scans social media platforms to identify
online chatter indicating future attacks.

Philippine National Police – Anti-Cybercrime Group

✓ Implement and enforce pertinent laws on cybercrime and other cyber


related crimes and pursue an effective anti-cybercrime campaign

Cybercrime Investigation and Coordination Center (CICC)


✓ It is an agency attached to the Department of Information and
Communication Technology (DICT) for policy and program coordination
under Republic Act 10844 and other pertinent provisions. It was initially
created as an agency directly under the Office of the President, later
relegated as an attached agency of the DICT.
✓ Its main functions as a coordinating agency are to facilitate the suppression and
prevention of cybercrimes in its operational areas and also to perform as a secretariat of
the National Cybercrime Inter-Agency Committee (NCIAC).

Cybercrime Courts
✓ It also acts as the focal agency in formulating and implementing law enforcement
investigation and prosecution strategies in curbing cybercrime and cyber-related
offenses nationwide.

31
THE TEN COMMANDMENTS OF COMPUTER ETHICS

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt` not copy or use proprietary software for which you have not paid (without
permission).
7. Thou shalt not use other people's computer resources without authorization or proper
compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect for
other humans.

REFERENCES:
https://unitedtraining.com/resources/blog/the-importance-of-cybersecurity-awareness-

for-all-employees

https://www.doj.gov.ph/office-of-cybercrime.html

https://www.pna.gov.ph/articles/1164371#:~:text=The%20NBI%20Cybercrime%20Divisi

on%20continues,online%20chatter%20indicating%20future%20attacks.

https://www.manilatimes.net/2022/08/25/opinion/columns/the-evolving-nature-of-

cicc/1855863#:~:text=Its%20main%20functions%20as%20a,%2DAgency%20Committee

%20(NCIAC).

ACTIVITY #6

What is your interpretation about the quotation below?

32
FINAL COVERAGE

TOPIC 9

MALWARE AND CYBER ATTACKS

Intended Learning Objectives

• Explain Malware and Cyber Attacks


• Determining the different types of cyber attacks

Defining Malware

✓ Malware is any software intentionally designed to cause disruption to a computer,


server, client, or computer network, leak private information, gain unauthorized access to
information or systems, deprive access to information, or which unknowingly interferes
with the user's computer security and privacy

Where does malware come from?

Some of the most common sources of malware are email attachments, malicious websites,
torrents, and shared networks.

1. Phishing
- Emails can be disguised to be coming from a fraudulent company for the sole purpose
of getting you to reveal personal information
2. Malicious Websites
- Some websites may attempt to install malware onto your computer, usually through
popups or malicious links
3. Torrents
- Files shared through Bit Torrents are generally unsafe because you never know what
to expect until they’re downloaded
4. Shared Networks
- A malware-infected computer on the same shared network may spread malware onto
your computer

List of Common Types of Malware and Their Malicious Intent:

1. Trojans
- A Trojan (or Trojan Horse) disguises itself as legitimate software with the purpose of
tricking you into executing malicious software on your computer.
2. Spyware

33
- Spyware invades your computer and attempts to steal your personal information such
as credit card or banking information, web browsing data, and passwords to various
accounts.
3. Adware
- Adware is unwanted software that displays advertisements on your screen. Adware
collects personal information from you to serve you with more personalized ads.
4. Rootkits
- Rootkits enable unauthorized users to gain access to your computer without being
detected.
5. Ransomware
- Ransomware is designed to encrypt your files and block access to them until a ransom
is paid.
6. Worms
- A worm replicates itself by infecting other computers that are on the same network.
They’re designed to consume bandwidth and interrupt networks.

https://www.titanfile.com/blog/types-of-computer-malware/

How malware spreads

Malware can get onto your computer in a number of different ways. Here are some common
examples:

• Downloading free software from the Internet that secretly contains malware
• Downloading legitimate software that's secretly bundled with malware
• Visiting a website that's infected with malware
• Clicking a fake error message or pop-up window that starts a malware download
• Opening an email attachment that contains malware

How to prevent malware

1. Keep your computer and software updated


2. Use a non-administrator account whenever possible
3. Think twice before clicking links or downloading anything
4. Be careful about opening email attachments or images
5. Don't trust pop-up windows that ask you to download software
6. Limit your file-sharing
7. Use antivirus software

Additional Tip: Always back up your files!

As mentioned earlier in this article, sometimes malware can cause irrevocable damage — such
as file encryption and file loss. To save yourself a lot of trouble, it’s important to keep your files
backed up so you can restore them in case something like this happens.

https://support.google.com/google-ads/answer/2375413?hl=enn

34
CURRENT STATUS OF PHILIPPINES IN TERMS OF CYBER ATTACK

✓ The Philippines was the second most-attacked country by web threats worldwide last year,
according to a global cyber security firm’s online security monitoring.
✓ Data from the Kaspersky Security Network (KSN) revealed that the country moved two places
up, ranking second among countries most attacked by web threats within the period from
January to December last year.
✓ The 2022 global ranking is topped by Mongolia with 51.1 percent of the attacks recorded,
followed by the Philippines (49.8 percent), Ukraine (49.6 percent), Greece (49.5 percent) and
Belarus (49.1 percent).
✓ Attempts of local malware spread through removable drives such as flash drives dropped from
35,825,044 in 2021 to 25,060,519 last year. This placed the Philippines in the 72nd spot
worldwide, two notches down from its 70th ranking a year ago.
✓ Worms and file viruses accounted for a majority of such incidents that were detected and
blocked by Kaspersky products in devices of its Filipino customers, according to the KSN
report.
✓ It also showed that cyber criminals tried to penetrate systems through attacks via browsers.

https://www.philstar.com/headlines/2023/03/15/2251710/philippines-2nd-most-attacked-web-threats-worldwide-last-
year#:~:text=Worms%20and%20file%20viruses%20accounted,systems%20through%20attacks%20via%20browsers.

SOME COMMON METHODS OF COMPUTER/CYBER CRIMES

INTERNET SCAMS

• Scams are deceitful practices carried out by techno-


criminals using email accounts. You may get an email
requesting account info and a good faith deposit of funds in
exchange for a much larger final payout, or you might get an
email threatening legal action unless you immediately make
some sort of payment. Computer scammers are very clever and
frequently use intimidation and personal information to build
credibility.

Most Common Types of Online Scam

1. Phishing Emails, SMS, Calls, and Websites

• Phishing is a cyber attack where scammers send spam messages to an unknown number
of users to obtain confidential information or to earn money. These letters are mostly
disguised as legitimate organizations or companies, which helps the fraudster gain
confidence in his victim. Unfortunately, fraudulent scammers get what they want, which
can either hijack your identity, get money from you or infect your PC with viruses. Yes,
such fake emails may also contain malicious links or attachments, clicking on which
you can distribute malware to your PC. For phishing, attackers use a text message that

35
forces targeted individuals to perform certain actions. “Your package could not be
delivered” smishing – USPS online scam text to beware of.

An example of phishing attempt on one of the most popular social media platforms Linkedin

2. Romance Scams and Fake Online Dating Profiles

• Love scams aren’t the new way to make money by cheating. Fraudsters forge their profiles
on social media or online dating sites, hoping to gain confidence in the victim and engage
in an affair. These scammers then use psychological tricks to create an emotional bond
and profit from it.
• Unfortunately, these cheaters pretend to be victims who need money, and there’s no
one to help them. In some cases, they even blackmail their victims on a permanent basis
and demand a certain amount of money.
• This is one of the most dangerous types of online scam, as it relies upon human
emotional ties – even though the companion is purely fictional.

3. Online Shopping Scam

• Shopping on the Internet is not dangerous by itself. But the fraudsters have also found
traps that can steal data and money from users. They lower the prices of products and
give them significant discounts to get users to buy them. There will be no problems with
payment, but that does not guarantee that you’ll receive the goods from the description,
or will receive at least something.

36
Ad of fake iWatch for extremely low price

4. Mobile Scams

• Many fraudsters also attack mobile devices, for example, using malware or apps that look
legitimate. These applications disintegrate malicious pop-ups, banners, through which
other pests can spread and even steal confidential data. Another often target of mobile
scams is installing spyware – to spy on you or just collect your personal details in order to
spoof your identity in future.

How to Spot a Scammer: 4 Warning Signs

a. Use authority to build trust: Scammers always try to disguise themselves as an


organization or company you know. This way, they have a chance that the attack will
succeed. So be vigilant with someone who writes to you out of the blue.
b. Prey on your emotions: Whatever platform the fraudster tries to attack, he will always
manipulate you.
c. Be threatening and aggressive: There are threats in addition to requests for assistance.
The fraudster may threaten to steal your data or expose provocative photos and videos
online in exchange for confidential data or money.
d. Force you to use unusual payment options: Fraudsters use third-party payment
options, which should alert you. They offer to pay through a fake payment system, with
which they then receive user payment data. Sometimes, they send a link to the payment
system you recognize, but the victim will switch to a phishing copy of this.

https://gridinsoft.com/blogs/online-scams-sings/

SOCIAL MEDIA INTIMIDATION

• Technocriminals often target personal social media


accounts. They may create a fake account in order to win
your trust, then utilize that account to make demands. They
may resort to blackmail in order to get what they want.

TYPES OF ONLINE ABUSE

1. Cyberbullying or online bullying is any type of bullying that happens online.


▪ Unlike bullying that takes place offline, online bullying can follow the
child wherever they go and it can sometimes feel like there's no escape
or safe space.

37
2. Emotional abuse is any type of abuse that involves the continual emotional
mistreatment of a child and this can happen both on and offline.
3. Grooming is when someone builds a relationship with a child so they can sexually
abuse, exploit or traffic them. Children and young people can be groomed online or
face-to-face by a stranger or by someone they know.
4. Sexting is when someone shares sexual, naked or semi-naked images or videos of
themselves or others, or sends sexual messages. It's online abuse if a child or young
person is pressured or coerced into creating or sending these types of images
5. Child sexual exploitation is a type of sexual abuse. When a child is sexually exploited
online they may be persuaded or forced to create sexually explicit photos or videos or
have sexual conversations.

How do you deal with social media abuse?

- If abuse is persistent and harming your mental health, and that of those around you, it
may well be time to leave social media. This can mean deleting accounts entirely or
just taking a break from them for a while. Some social media platforms allow users to
temporarily 'unpublished' or 'deactivate' accounts.

https://www.nspcc.org.uk/what-is-child-abuse/types-of-abuse/online-abuse/

IDENTITY THEFT

• Identity theft is a growing problem and can easily be


committed via computer. Identify thieves basically gather
as much information about you as they can, then utilize
this information to obtain credit cards and loans and
basically assume your life. The effects can be devastating.
• Identity theft happens when someone uses your
personal or financial information without your permission.
It can damage your credit status and cost you time and
money.

How can I protect myself from identity theft online?


Four simple ways to help protect your identity online

1. Be defensive with sensitive information. Don't put sensitive information in email, social
media, or text messages. ...
2. Create strong passwords and keep them secret. ...
3. Protect your accounts and your credit. ...
4. Boost your computer's security.

https://support.microsoft.com/en-us/office/protecting-yourself-from-identity-theft-online-6019708f-e990-4894-
9ca7-fdb53ee70830

38
PHISHING SCAM
• This type of attack involves hackers sending malicious
email attachments or URLs to users to gain access to
their accounts or computer. Cybercriminals are
becoming more established and many of these emails
are not flagged as spam. Users are tricked into emails
claiming they need to change their password or update
their billing information, giving criminals access.

The 5 Most Common Types of Phishing Attack

1. Email phishing
- Most phishing attacks are sent by email. The crook will register a fake domain that
mimics a genuine organisation and sends thousands of generic requests.
- The fake domain often involves character substitution, like using ‘r’ and ‘n’ next to each
other to create ‘rn’ instead of ‘m’.
- In other cases, the fraudsters create a unique domain that includes the legitimate
organisation’s name in the URL. The example below is sent from
[email protected]’.

-The recipient might see the word ‘Amazon’ in the sender’s address and
assume that it was a genuine email.
- There are many ways to spot a phishing email, but as a general rule, you
should always check the email address of a message that asks you to click a
link or download an attachment.
2. Spear phishing
- There are two other, more sophisticated, types of phishing involving email.
- The first, spear phishing, describes malicious emails sent to a specific person.
Criminals who do this will already have some or all of the following information
about the victim:

39
▪ Their name.
▪ Place of employment.
▪ Job title.
▪ Email address; and
▪ Specific information about their job role.
You can see in the example below how much more convincing spear phishing emails
are compared to standard scams.

- The fraudster has the wherewithal to address the individual by name and
(presumably) knows that their job role involves making bank transfers on
behalf of the company.
- The informality of the email also suggests that the sender is a native English
speaker and creates the sense that this is a real message rather than a
template.

3. Whaling
- Whaling attacks are even more targeted, taking aim at senior executives.
Although the end goal of whaling is the same as any other kind of phishing
attack, the technique tends to be a lot subtler.
- Tricks such as fake links and malicious URLs aren’t helpful in this instance, as
criminals are attempting to imitate senior staff.
- Whaling emails also commonly use the pretext of a busy CEO who wants an
employee to do them a favour.

40
- Emails such as the above might not be as sophisticated as spear phishing
emails, but they play on employees’ willingness to follow instructions from their
boss.
- Recipients might suspect that something is amiss but are too afraid to confront
the sender to suggest that they are being unprofessional.

4. Smishing and vishing


- With both smishing and vishing, telephones replace emails as the method of
communication.
- Smishing involves criminals sending text messages (the content of which is
much the same as with email phishing), and vishing involves a telephone
conversation.
- One of the most common smishing pretexts are messages supposedly from
your bank alerting you to suspicious activity.

In this example, the message suggests that you have been the victim of fraud and
tells you to follow a link to prevent further damage. However, the link directs the recipient
to a website controlled by the fraudster and designed to capture your banking details.

https://www.itgovernance.eu/blog/en/the-5-most-common-types-of-phishing-attack

41
DISTRIBUTED DENIAL OF SERVICE

• These are used to make an online service


unavailable and take the network down by overwhelming
the site with traffic from a variety of sources. Large
networks of infected devices known as Botnets are
created by depositing malware on users’ computers.
The hacker then hacks into the system once the network
is down.

CYBERSTALKING

• This kind of cybercrime involves online


harassment where the user is subjected to a
plethora of online messages and emails.
• Typically cyberstalkers use social media,
websites and search engines to intimidate a user
and instill fear. Usually, the cyberstalker knows
their victim and makes the person feel afraid or
concerned for their safety.

TIPS FOR PROTECTING YOURSELF FROM CYBERSTALKERS

1. Increase your privacy settings


2. Start off with your own data. Take a good look at your social media accounts and if you
haven't done already, enable strong privacy settings.
3. Make your posts 'friends only' so that only people you know get to see them.
4. Don't let social networks post your address or phone number publicly. (You might even
want to have a separate email address for social media)
5. If you need to share your phone number or other private information with a friend, do so
in a private message - not in a public post.
6. Use a gender-neutral screen name or pseudonym for your social media accounts — not
your real name
7. Leave optional fields in social media profiles, like your date of birth, blank.
8. Only accept friend requests from people you have actually met in person. Set your social
networks to accept friend requests only from friends of friends.
9. Disable geolocation settings. You may want to also disable GPS on your phone.

https://www.kaspersky.com/resource-center/threats/how-to-avoid-cyberstalking

42
HACKING

• A commonly used hacking definition is the act of


compromising digital devices and networks through
unauthorized access to an account or computer system.
Hacking is not always a malicious act, but it is most
commonly associated with illegal activity and data theft by
cyber criminals.
• Hacking refers to the misuse of devices like
computers, smartphones, tablets, and networks to cause
damage to or corrupt systems, gather information on
users, steal data and documents, or disrupt data-related
activity.

Types of Hacking

• There are typically four key drivers that lead to bad actors hacking websites or
systems:
o financial gain through the theft of credit card details or by defrauding financial
services,
o corporate espionage,
o to gain notoriety or respect for their hacking talents, and
o state-sponsored hacking that aims to steal business information and national
intelligence.
• On top of that, there are politically motivated hackers—or hacktivists—who aim to raise
public attention by leaking sensitive information, such as Anonymous, LulzSec, and
WikiLeaks.

ONLINE SEX TRAFFICKING

• Traffickers are using the Internet as a way to


target unsuspecting and vulnerable youth for
their own personal financial gain as targets are
seen as none other than a dollar sign. Sex
trafficking is a form of modern slavery that
exists throughout the United States and
globally.
• According to the F.B.I., sex trafficking is the
2nd fastest growing criminal industry -- just
behind drug trafficking.

43
What is the main reason of human trafficking in the Philippines?

- The Philippines is undoubtedly a source country for human trafficking with its
citizens being trafficked in different parts of the world, mainly owing to the
socio-economic conditions prevailing in different parts of the country, including
growing poverty, youth unemployment and gender inequalities, discrimination.

STATUS OF SEX TRAFFICKING IN THE COUNTRY

➢ The government increased victim protection efforts. The government lacked a reliable
mechanism to consolidate statistics on the total number of victims identified and assisted.
➢ The government reported identifying 1,802 victims, compared with 1,534 potential victims
identified in the previous reporting period. Of the 1,802 victims identified, traffickers
exploited 535 in sex trafficking, 501 in forced labor, and 766 in unspecified exploitations;
551 were male and 1,251 were female.
➢ The Department of Foreign Affairs (DFA) reported identifying 248 potential Filipino
trafficking victims abroad from July to December 2021, primarily in the Middle East and
Asia, compared to 2,429 in the previous reporting period.
➢ In addition to victims identified by the government, NGOs and an international
organization reported identifying 985 sex trafficking victims (228 men, 742 women, 197
boys, and 545 girls) and six adult female labor trafficking victims during the reporting
period.
https://www.state.gov/reports/2022-trafficking-in-persons-
report/philippines#:~:text=The%20government%20reported%20identifying%201%2C802,male%20and%201%2C251
%20were%20female.

Below, find some tips to protect yourself and your loved ones against human trafficking:

1. Set strict privacy settings


- If your social media accounts are public, then anyone can see your photos,
posts, and other information. Traffickers have used this information to reach
out to and recruit victims. Consider setting your accounts to ‘private’ and turn
off location sharing on posts.
2. Beware of strange friend requests
- Only accept friend or follow requests from people you know, even if you have
friends in common. Traffickers have reached out to strangers to ‘chat’ via social
media and then slowly work to build trust with the potential victim.
3. Don’t overshare
- Remember that everything you put online – photos, texts, etc. – is in the public
domain. You no longer have total control over how it is being seen or shared.
Traffickers have used people’s photos and personal details to help them
blackmail, contact, groom, or otherwise recruit and monitor victims. Never
share personal information, such as your phone number, address, or live
location online.

44
4. Beware of advertisements that seem too good to be true
- Traffickers often use catchy language in job advertisements online, promising
high wages for simple work or a chance to become a model. Traffickers will
often be vague about the company’s credentials, details, or your terms of
employment. If it seems too good to be true, it probably is.
5. Flag it, don’t share it!
- Stay vigilant in the online sphere and report suspicious pages or activities to
the authorities.
- Don’t hesitate to unfriend, block or report someone who is harassing you or
talking to you in a way you don’t like. Click on the links to see how to block
accounts on Facebook, Twitter, Instagram, TikTok, and SnapChat.
- Take screenshots of the messages or posts – they might be useful later for an
investigation or law enforcement.
https://www.unodc.org/unodc/en/endht/internet-safety-tips.html

45
TOPIC 10

DATA SECURITY

Intended Learning Objectives

1. Discuss and elaborate Data Security


2. Identify the types of data security
3. Determine the main elements of data security
4. Determine the importance of encryption

What is Data Security?


Data security means protecting digital data, such as those in a database, from
destructive forces and from the unwanted actions of unauthorized users such
as a cyber attack or a data breach.
❖ Data security is the process of safeguarding digital information throughout its
entire life cycle to protect it from corruption, theft, or unauthorized access. It
covers everything—hardware, software, storage devices, and user devices;
access and administrative controls; and organizations' policies and
procedures.

TYPES OF DATA SECURITY

1. Access Controls
- This type of data security measures includes limiting both physical and digital
access to critical systems and data.
2. Authentication
- Similar to access controls, authentication refers specifically to accurately
identifying users before they have access to data. This usually includes things
like passwords, PIN numbers, security tokens, swipe cards, or biometrics.
3. Backups & Recovery
- Good data security means you have a plan to securely access data in the event
of system failure, disaster, data corruption, or breach.
4. Data Erasure
- You’ll want to dispose of data properly and on a regular basis. Data erasure
employs software to completely overwrite data on any storage device and is
more secure than standard data wiping.
5. Data Masking
- By using data masking software, information is hidden by obscuring letters and
numbers with proxy characters. This effectively masks key information even if
an unauthorized party gains access to it. The data changes back to its original
form only when an authorized user receives it.
6. Data Resiliency

46
-
Comprehensive data security means that your systems can endure or recover
from failures. Building resiliency into your hardware and software means that
events like power outages or natural disasters won’t compromise security.
7. Encryption
- A computer algorithm transforms text characters into an unreadable format via
encryption keys. Only authorized users with the proper corresponding keys can
unlock and access the information.

MAIN ELEMENTS OF DATA SECURITY

1. Confidentiality. Ensures that data is accessed only by authorized users with the proper
credentials.
2. Integrity. Ensure that all data stored is reliable, accurate, and not subject to unwarranted
changes.
3. Availability. Ensures that data is readily — and safely — accessible and available for
ongoing business needs.

BEST PRACTICES FOR ENSURING DATA SECURITY

There is no silver bullet that will guarantee 100 percent security of your data. However,
there are several steps, tactics, and best practices that can help minimize the chances of a data
breach, loss, and exposure.

Quarantine Sensitive Files


- You’ll want to eliminate this practice, placing sensitive data into safely
quarantined areas. Gain control of your data by using data security software
that continually classifies sensitive data and moves it to a secure location.
Behavior-Based Permissions
- Overly permissive behavior is another common misstep, where more people
have access to data than is necessary. A convoluted web of temporary access
and permissions quickly arises, with individuals having access to data that they
shouldn’t.
Prepare for Cyber Threats
- Good data security is all about thinking ahead. You’ll want to have a solid
cyber-security policy that encompasses current and potential future threats to
your data.
Delete Unused Data
- Storing stale data for longer than necessary presents a significant liability in
terms of data security.

https://www.varonis.com/blog/data-
security#:~:text=There%20are%20three%20core%20elements,Confidentiality%2C%20Integrity%2C%20and%20Avail
ability.

47

You might also like