You are on page 1of 2

Name: Maliwanag, Nikki S.

Course & Section: ITEELEC1 / W41


Program: BSITWMA Date Submitted: April 25, 2019

REFLECTION PAPER
TITLE OF THE ACTIVITY : Cybersecurity and Ethical Hacking

DATE : April 25, 2019

TIME : 3:30 PM – 5:00 PM

VENUE : Presentation Room 1, Innovation Center, Engineering Building

Mr. Christen John Reginald L. Buenafe, our guest speaker, taught us about cybersecurity
and ethical hacking. I learned about the types of hackers being composed of the white hat, black
hat, gray hat and skip kiddie. The white hat hackers are the good guys as opposed to the black hat.
Gray hat hackers on the other hand are the hackers that are half good and half bad. Skip kiddie are
those hackers whose approach is instructional just like a cook book and works with or without
knowledge. Learning about the types of hackers gave us idea of who we are dealing with once we
are attacked. The resource speaker also taught us about the hacking process. First is footprinting
where all the gathering of information sets in. Next is scanning and enumeration, then attack and
gaining access. Last is covering tracks. After elaborating this hacking process, we were educated
on what to do when we are hacked. Of course, the first thing to do is change your password/reset
password then report compromised account. User can also remove suspicious act and do damage
control.

To protect us and our system, I learned that we should do high protection, encrypt important
data, set up firewall and make a backup. In this way we are setting up prevention of possible
attacks. On the developers’ end, they must also make sure that the system they developed is clean
before deploying it. By “clean” it means that it is safe and secure from threats and free from bugs.

In conclusion, cybersecurity starts within ourselves. The lesson that I got from this seminar
is that we must be cautious and smart users. Users should think several times before sharing any
private information with other users online. It is very timely that we conducted this activity because
the increasing use of social media has made cybersecurity even more important than it was before.
On the other hand, if you are into ethical hacking then better be a white hat hacker to be helpful in
our society rather than being part of hacktivists and such. The bottom-line is we should be careful
every time we go online, always read privacy policies and permissions, regularly check updates
for your antivirus, and cliché as it may sound – think before you click because the only systems
that are safe are those unplugged.

You might also like