You are on page 1of 1

CYBERSPACE

Introduction:

Cyberspace security is the practice of protecting systems, networks, and


programs from digital attacks. These cyberattacks are usually aimed at accessing,
changing, or destroying sensitive information; extorting money from users; or
interrupting normal business processes.
Implementing effective cybersecurity measures is particularly challenging today
because there are more devices than people, and attackers are becoming more
innovative.

Body:

A security breach is one of the earliest stages of a security attack by a


malicious intruder, such as a hacker, cracker or nefarious application. Security
breaches happen when the security policy, procedures and/or system are violated.
According to our interviewee, usually the security breaches they encountered
were hacker and scammer in social media. Their facebook account hacked then the
hacker post anything using their account without their permission. With that, they
were not able to use again their account because their password was changed. The
greatest threat security breaches present today is the malware and software that can
fight data breaches. And also one factor to threat this breaches is to not expose
personal information in public. Showing personal information in public must be
minimal. In this case identity theft can be prevented especially of giving such
personal information like bank personal account, SSS id, and other personal
belongings. One of our interviewee experienced being scammed. She gave her bank
account to one of an agent of a certain company as the basis for her payment
monthly. After she gave her bank account information, month later her savings was
lost. So as she went to the bank, they said that they will undergo investigation but
until now it is not yet settle.

Conclusion:

Therefore, in order that theft be prevented, we should not expose our personal
information in public and do not trust anyone you do not know yet your personal
account. Scammers and hackers are there surrounds us. And also to avoid data
leakage especially in our, we must have a backup file from our personal computer or
document so that our effort will be useless. And also install some cyber security in
your personal gadgets like mobile phones and laptop.

You might also like