You are on page 1of 3

Republic of the Philippines

Laguna State Polytechnic University


Province of Laguna

Reflection Paper
Topic: Introduction to Cybersecurity Week No.
Course Code: ITEP 311 Term:

Course Title: Introduction to Information Assurance and Academic 2021-2022


Security Year:

Student Section
Name
Due date July 15, 2022 (11:59 pm) Points

Directions:  Make a reflection paper stating what you have learned from the online
course and how relevant Cybersecurity is in today's time. DOWNLOAD and PASTE your
badge as well as the as the SCREEN SHOT stating that you have finished the course with
your NAME and DATE issued on it.

Reflection Paper

I have taken in a few things in this course yet I will make reference to just the
main ones. Cyber security is an exceptionally large issue that spins around three
perspectives, individuals, cycle, and innovation. At the point when that information is
applied to anything in security, for example, a firewall for instance, it thoroughly
clarifies everything in connection with it. To place it in another manner, a firewall can
either be programming or equipment which implies it is an innovation machine. The
framework manager that is working the firewall or even the home client that is utilizing
it are individuals part of safety. Ultimately, process alludes to how the firewall is
overseen and set-up for instance the firewall is set to auto or manual update and ports x
, y ,and z are shut due to reasons a, b ,and c while ports e ,f ,and g are open because of
reasons u, v, and w. This equivalent idea applies to practically all network protection.

Something else I learned is perusing security diaries, expositions, web journals,


and so forth. This additional material fills in as show more happiness. Once in a while
the material one finds is either more established or fresher than the one is
concentrating on which assists the individual with learning the distinction among
current and out of date innovation and standards of network protection. A few
references even have fascinating material either previously or after the material the
individual is looking for, this assists in endeavoring with perusing more about different
subjects as well. Additionally, reference search assists the individual with
understanding the various thoughts, feelings, realities various creators have about
various subjects in network protection. For instance, a few creators say distributed
computing is the future hence it should be utilized while others differ by saying it is
absolutely unreliable and represents a more prominent danger to the organization of
enormous information so the harm will be either multiplied or significantly increased in
light of the fact that the cloud will initially be penetrated. Cybersecurity is significant on
the grounds that it shields all classes of information from robbery and harm. This
incorporates delicate information, actually recognizable data (PII), safeguarded
wellbeing data (PHI), individual data, protected innovation, information, and legislative
and industry data frameworks. Without a network protection program, your association
can’t shield itself against information break crusades, which makes it an overpowering
objective for cybercriminals. Both inborn gamble and leftover gamble are expanding,
driven by worldwide network and use of cloud administrations, similar to Amazon Web
Administrations, to store delicate information and individual data. Broad unfortunate
setup of cloud administrations matched with progressively complex digital hoodlums
implies the gamble that your association experiences an effective digital assault or
information break is on the ascent.

Business pioneers can never again exclusively depend on out-of-the-container


network protection arrangements like antivirus programming and firewalls,
cybercriminals are getting more brilliant and their strategies are turning out to be
stronger to regular digital safeguards. It means a lot to cover every one of the fields of
network safety to remain very much safeguarded. Digital dangers can emerge out of any
level of your association. Working environments should incorporate online protection
mindfulness preparing to instruct staff about normal digital dangers like social
designing tricks, phishing, ransomware assaults , and other malware intended to take
licensed innovation or individual information. The multiplication of information breaks
implies that network safety isn’t only applicable to intensely controlled ventures,
similar to medical services. Indeed, even private companies are in danger of
experiencing reputational harm following an information break.

Cybersecurity significance is on the ascent. Essentially, our general public is


more mechanically dependent than any other time in recent memory and there is no
sign that this pattern will slow. Information releases that could bring about wholesale
fraud are currently freely posted via web-based entertainment accounts. Touchy data
like federal retirement aide numbers, charge card data and ledger subtleties are
currently put away in distributed storage administrations like Dropbox or Google Drive.
The truth is whether you are an individual, independent company, or enormous
worldwide, you depend on PC frameworks consistently. Match this with the ascent in
cloud administrations, unfortunate cloud administration security, cell phones, and the
Web of Things (IoT) and we have a bunch of potential security weaknesses that didn’t
exist years and years prior. We want to comprehend the contrast among network safety
and data security, despite the fact that the ranges of abilities are turning out to be more
comparative. States all over the planet are pointing out additional cybercrimes. GDPR is
an extraordinary model. It has expanded the reputational harm of information breaks
by constraining all associations that work in the EU to: (a) Impart information breaks
(b)Designate an information security official (c)Require client agree to handle data (d)
Anonymize information for protection

You might also like