You are on page 1of 56

Cybersecurity

Awareness
Hello!
I am Dun Vincent Bueno
Focal for Cybersecurity Management
Program at Department of
Information and Communications
Technology – Regional Cluster Office,
Luzon Cluster 1

2
What will
we learn

Image ccto: Vecteezy.com


3
What is Cybersecurity?
⬡ Cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks.

Image ccto: cmtc.com/


4
What are Cyber Threats?
A cyber threat is a malicious act that seeks
to damage data, steal data, or disrupt digital
life in general.

Image ccto: everypixel.com/, logsign.com/


5
1.
Types of Cyber
Threats

Image ccto: logsign.com/


What is Malware?
Malware is any piece of software that was
written with the intent of damaging devices,
stealing information, and generally causing a
problem.

Image ccto: prasannamundas.com/


7
2.
Types of Malware

Image ccto: ajr-computing.co.uk


Virus
⬡ Viruses attach themselves to clean files and infect
other clean files. They can spread uncontrollably,
damaging a system’s core functionality and deleting
or corrupting files.

Image ccto: csoonline.com


9
Trojans
⬡ This kind of malware disguises itself as
legitimate software, or is hidden in
legitimate software that has been
tampered with. It tends to act discreetly
and create backdoors in your security to
let other malware in.

Image ccto: microbiologynutsandbolts.co.uk/


10
Spyware
⬡ Spyware is malware designed to
spy on you. It hides in the
background and takes notes on
what you do online, including
your passwords, credit card
numbers, surfing habits, and
more.

Image ccto: izoologic.com


11
Worms
⬡ Worms infect entire networks of devices, either local or across the
internet, by using network interfaces. It uses each consecutively infected
machine to infect others.

Image ccto: https://blog.emsisoft.com/


12
Ransomware
⬡ This kind of malware typically locks down your computer and your files, and
threatens to erase everything unless you pay a ransom.

13
Adware
⬡ -Though not always malicious in nature, aggressive advertising
software can undermine your security just to serve you ads

14
3.
Cyber Criminal
Techniques
Common ways that cyber criminals damage
data and steal data

Image ccto: forbes.com/


What is Hacking?
⬡ The gaining of unauthorized access to data
in a device.

Image ccto: https://aestheticmed.co.uk/


16
What are the type of
Hackers?

Image ccto: threathunting.se/


17
Image ccto: Andrew strutt
18
What is Phishing?
⬡ Phishing is a cybercrime in which a target or targets are contacted by email,
telephone or text message by someone posing as a legitimate institution to
lure individuals into providing sensitive data

Image ccto: ophtek.com


19
20
21
What is Identity Theft?
⬡ Identity theft is the crime of obtaining the personal or financial information
of another person for the sole purpose of assuming that person's name or
identity to make transactions or purchases

Image ccto: scoopempire.com


30
February 28, 2016
What is Social Engineering?
⬡ Social engineering is a technique used by criminals and cyber-
crooks to trick users into revealing confidential information.

Image ccto: Steven (Steve) Clarke


34
5.
Cyber Safe
How to be safe from Cyber Threats

Image ccto: forbes.com/


Use strong passwords

Do’s Dont’s
✓ Don’t use names of pets, family,
✓ Your password should be made up of ten (10) or
friends, etc.
more characters and includes combination of
capital letters, numbers and symbols. ✓ Avoid using letter or number
patterns. Example: 1234, abcd, 2468,
✓ Use passwords that are easy to remember. etc.
✓ Use different passwords for different accounts ✓ Refrain from using personal
✓ Different languages and dialects can also be used.
information such as birthday and
address.
Image ccto: techcrunch.com
36
Password Managers
⬡ A password manager can enable you to store your online
account usernames and passwords in one secure place.

Definition from:
37
https://us.norton.com/feature/password-manager
Private Browsing/ Incognito Browsing
⬡ Using the feature private browsing does not store your history
and login information.

Image ccto:
38
Use Trusted Software
⬡ -Make sure to read the user agreement
⬡ -Only download software that is legitimate
and has good reviews
Think
before
you click
Malicious links can do damage in
several different ways, so be sure
to inspect links and ensure they’re
from trusted senders before
clicking. 40
Use Two-Factor Authentication
⬡ This method provides two layers of security

41
Keep Track of Your Digital Footprint
⬡ Monitor your accounts, so you can catch suspicious activity. It’s
important to keep track of your digital footprint, including social
media, and to delete accounts you’re not using

Image ccto: inspiredelearning.com


42
Updated Software
⬡ Helps you protect your device and adds new features.

Image ccto: inspiredelearning.com


43
Backup Data
⬡ A backup is a duplicate copy of a file

44
Image ccto:
45
Antivirus Software
⬡ program used to prevent, detect, and remove malware.

Image ccto: inspiredelearning.com


46
Parental Controls

47
Parental Controls

48
6.
Laws and Sanctions

Image ccto: forbes.com/


Data Privacy
⬡ Compliance with data protection laws and regulations. Focus on
how to collect, process, share, archive and delete the data

Image ccto: techaheadcorp.com/


50
DATA PRIVACY ACT OF 2012
[Republic Act No. 10173]
⬡ An act protecting individual personal information in information
and communications systems in the government and the private
sector, creating for this purpose a national privacy commission,
and for other purposes

Image ccto: techaheadcorp.com


51
DATA PRIVACY ACT OF 2012
[Republic Act No. 10173]
⬡ right to be informed
⬡ the right to access
⬡ the right to object
⬡ the right to erasure and blocking
⬡ the right to rectify
⬡ the right to file a complaint
⬡ the right to damages
⬡ the right to data portability

52
DATA PRIVACY ACT OF 2012
[Republic Act No. 10173]
PENALTIES
Punishable Acts Imprisonment Fine (Pesos)
Unauthorized Processing 1yr to 3yrs – 3yrs to 6yrs 500k to 4m

Access due to Negligence 1yr to 3yrs – 3yrs to 6yrs 500k to 4m

Improper Disposal 6mths to 2yrs – 1yr to 3yrs 100k to 1m

Unauthorized Purposes 18mths to 2yrs – 1yr to 3yrs 500k to 2m

Intentional Breach 1yr to 3yrs 500k to 2m

Concealing Breach 18mths to 5yrs 500k to 1m

Malicious Disclosure 18mths to 5yrs 500k to 1m

Unauthorized Disclosure 1yr to 3yrs – 3yrs to 5yrs 500k to 2m

Combination of Acts 3yrs to 6yrs 1m to 5m


53
CYBERCRIME PREVENTION ACT OF 2012
[Republic Act No. 10175]
⬡ An act defining cybercrime, providing for the prevention, investigation, suppression
and the imposition of penalties therefor and for other purposes

Image ccto: healthmanagement.org


55
CYBERCRIME PREVENTION ACT OF 2012
[Republic Act No. 10175]
⬡ Identity Theft
⬡ Hacking
⬡ Online Scam
⬡ Online Label
⬡ Online Threat
⬡ Anti Photo and Video Voyeurism
⬡ Child Pornography
⬡ Sextortion
⬡ Cybersex

56
Webinar Summary:
Netiquettes
⬡ Internet Etiquettes o Netiquettes are things
individuals should follow for safe and better
online environment.
⬡ Internet Etiquettes o Netiquettes are things
individuals should follow for safe and better
online environment.
• Be selective when adding friends

• Choose strong and hard-to-guess passwords

• Know the privacy settings

• Stop and Think before you click

• Use fully protected devices


• Don’t publish personal information

• Verify applications before installing

• Don’t upload inappropriate photos

• Avoid using inappropriate language


Thanks!

61

You might also like