Professional Documents
Culture Documents
5 M Cybersecurity Awareness Rev
5 M Cybersecurity Awareness Rev
CYBERSECURITY AWARENESS
OBJECTIVES:
Cyber security awareness refers to how much end users know about the cyber
security threats their networks face and the risks they introduce. End users are considered the
weakest link and the primary vulnerability within a network.
Cyber security is the protection of internet-connected systems such as hardware, software and
data from cyber-threats. The practice is used by individuals and enterprises to protect against
unauthorized access to data centers and other computerized systems.
The goal of implementing cyber security is to provide a good security posture for computers,
servers, networks, mobile devices and the data stored on these devices from attackers with
malicious intent. Cyber-attacks can be designed to access, delete, or extort an organization’s or
users’ sensitive data; making cyber security vital. Medical, government, corporate and financial
organizations, may all hold vital personal information on an individual, for example.
Cyber security is a continuously changing field, with the development of technologies that open
up new avenues for cyber attacks. Additionally, even though significant security breaches are
the ones that often get publicized, small organizations still have to concern themselves with
security breaches, as they may often be the target of viruses and phishing.
Cyber security refers to the collection of tools, policies, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to protect the cyber
environment and organization and user’s assets.
The process of keeping up with new technologies, security trends and threat intelligence is a
challenging task. However, it's necessary in order to protect information and other assets from
cyber threats, which take many forms. Cyber threats can include:
Malware which is a form of malicious software, which any file or program can be used to
harm a computer user, such as worms, computer viruses, Trojan horses and spyware.
Ransomware attacks are a type of malware that involves an attacker locking the victim's
computer system files – typically through encryption – and demanding a payment to
decrypt and unlock them.
Social engineering is an attack that relies on human interaction to trick users into
breaking security procedures to gain sensitive information that is typically protected.
Phishing is a form of fraud where fraudulent emails are sent that resemble emails from
reputable sources; however, the intention of these emails is to steal sensitive data, such
as credit card or login information.
For an expert, the Oxford dictionary defines cyber threat as "the possibility of a malicious
attempt to damage or disrupt a computer network or system." Moreover, it is an attempt to
access files and infiltrate or steal data.
In this definition, the threat is defined as a possibility. However, in the cyber security community,
the threat is more closely identified with the actor or adversary attempting to gain access to a
system. Or a threat might be identified by the damage being done, what is being stolen or the
Tactics, Techniques and Procedures (TTP) being used.
In 2012, Roger A. Grimes provided this list, published in Infoworld, of the top five most common
cyber threats:
But since the publication of this list, there has been widespread adoption of several different
types of game-changing technology: cloud computing, big data, and adoption of mobile device
usage, to name a few.
In September 2016, Bob Gourley shared the video containing comments from Rand Corporation
testimony to the House Homeland Security Committee, Subcommittee on Cyber security,
Infrastructure Protection and Security Technologies regarding emerging cyber threats and their
implications. The video highlights two technology trends that are driving the cyber threat
landscape in 2016:
Today’s cybercrime landscape is diverse. Cyber threats typically consist of one or more of the
following types of attacks:
Advanced Persistent Threats – as the name "advanced" suggests, an advanced
persistent attack (APT) uses continuous, clandestine, and sophisticated hacking
techniques to gain access to a system and remain inside for a prolonged period of time,
with potentially destructive consequences.
Distributed Denial of Service (DDoS) – is a malicious attempt to disrupt the normal traffic
of a targeted server, service or network by overwhelming the target or its surrounding
infrastructure with a flood of Internet traffic.
Wiper Attacks – involve wiping/overwriting/removing data from the victim. Unlike typical
cyber attacks which tend to be for monetary gain, wiper attacks are destructive in nature
and often do not involve a ransom. Wiper malware may however be used to cover the
tracks of a separate data theft.
Data Destruction – data stored on tapes, disks, hard drives, USBs, and other physical
hardware are purged before old devices are thrown away, re-used, or sold and data no
longer in use that’s stored on networks and in the cloud should be systematically
destroyed in the interest of organizing relevant data and keeping it out of the hands of
criminals.
Spyware/Malware – is a type of malicious software – or malware – that is installed on a
computing device without the end user's knowledge. It invades the device, steals
sensitive information and internet usage data, and relays it to advertisers, data firms or
external users.
Unpatched Software – seemingly the simplest vulnerability, can still lead to the largest
leaks. Every software has the potential to have bugs and holes making hackers to easily
access files and accounts. Unpatched software means there are vulnerabilities in a
program or code that a company is aware of and will not or cannot fix. Users can also be
responsible for their unpatched software if they refuse to check for and perform regular
updates.
In identifying a cyber threat, more important than knowing the technology or TTP, is knowing
who is behind the threat. The TTPs of threat actors are constantly evolving. But the sources of
cyber threats remain the same. There is always a human element; someone who falls for a
clever trick. But go one step further and you will find someone with a motive. This is the real
source of the cyber threat – a threat to Philippine security.
Advanced threat actors such as nation-states, organized cybercriminals and cyber espionage
actors represent the greatest information security threat to enterprises today. Many
organizations struggle to detect these threats due to their clandestine nature, resource
sophistication, and their deliberate "low and slow" approach to efforts. For enterprises, these
more sophisticated, organized and persistent threat actors are seen only by the digital traces
they leave behind. For these reasons, enterprises need visibility beyond their network borders
into advanced threats specifically targeting their organizations and infrastructure. This is known
as threat intelligence.
Cyber threat researchers can begin by knowing a background profile of assets beyond the
network border and being aware of offline threats such as those reported here by Luke
Rodenheffer of Global Risk Insights. They should then monitor mission-critical IP addresses,
domain names and IP address ranges (e.g., CIDR blocks). This can grant advanced warning
while adversaries are in the planning stages. With this enhanced visibility, you can gain
improved insight into ongoing exploits, identification of cyber threats and the actors behind
them. This allows you to take proactive steps to defend against these threats with an
appropriate response.
The internet has become a space riddled with malicious links, trojans and viruses. Data
breaches are becoming more frequent, and unsuspecting users are more vulnerable than ever
before. When one click can cost thousands, and even millions, users need actionable to-do’s
that can help them stay alert and safe online. Here are our top 10 cyber security tips for your
users:
6. Connect Securely
Cyber security tips about this have been dished out by nearly every tech expert under
the sun, but many still don’t follow this advice. You might be tempted to connect your
device to an unsecured connection, but when you weigh the consequences, it’s not
worth it. Only connect to private networks when possible, especially when handling
sensitive information.
CYBER OFFEENSES.
The following acts constitute the offense of cybercrime punishable under this Act:
6. Cyber-squatting is the acquisition of domain name over the Internet in bad faith to
profit, mislead, destroy reputation, and deprive others from the registering the same.
This includes those existing trademark at the time of registration; names of persons
other than the registrant; and acquired with intellectual property interests in it. Those
who get domain names of prominent brands and individuals which in turn are used to
damage their reputation – can be sued under this provision. Note that freedom of
expression and infringement on trademarks or names of person are usually treated
separately. A party can exercise freedom of expression without necessarily violating the
trademarks of a brand or names of persons.
11. Child Pornography is the unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through
a computer system.
12. Libel is the unlawful or prohibited acts of libel as defined in Article 355 of the Revised
Penal Code, as amended committed through a computer system or any other similar
means which may be devised in the future. Revised Penal Code Art. 355 states: Libel
means by writings or similar means. A libel committed by means of writing, printing,
lithography, engraving, radio, phonograph, painting, theatrical exhibition,
cinematographic exhibition, or any similar means, shall be punished by prison
correctional in its minimum and medium periods or a fine ranging from 200 to 6,000
pesos, or both, in addition to the civil action which may be brought by the offended party.
The Cybercrime Prevention Act strengthened libel in terms of penalty provisions. The
electronic counterpart of libel has been recognized since the year 2000 when the E-
Commerce Law was passed. The E-Commerce Law empowered all existing laws to
recognize its electronic counterpart whether commercial or not in nature.
13. Aiding or Abetting in the Commission of Cybercrime happens when any person who
wilfully abets or aids in the commission of any of the offenses enumerated in the Act.
14. Attempt in the Commission of Cybercrime happens when any person wilfully
attempts to commit any of the offenses enumerated in the Act.
15. All crimes defined and penalized by the Revised Penal Code, as amended, and
special laws, if committed by, through and with the use of information and
communications technologies shall be covered by the relevant provisions of this
Act: Provided, That the penalty to be imposed shall be one (1) degree higher than that
provided for by the Revised Penal Code, as amended, and special laws, as the case
may be.
16. Corporate Liability. When any of the punishable acts herein defined are knowingly
committed on behalf of or for the benefit of a juridical person, by a natural person acting
either individually or as part of an organ of the juridical person, who has a leading
position within, based on:
a. A power of representation of the juridical person provided the act committed falls
within the scope of such authority;
b. An authority to take decisions on behalf of the juridical person: Provided, That the
act committed falls within the scope of such authority; or
c. An authority to exercise control within the juridical person, It also includes
commission of any of the punishable acts made possible due to the lack of
supervision or control.
Regardless if it’s an email scam, social networking scam, or scare tactic, there are several ways
to protect yourself.
Use common sense. If you recognize an email address, delete the message, and never
open the message in the first place.
Never keep the same password across multiple accounts. Change password to all
important accounts every 6 months.
Avoid opening email attachments. For example, reputable E-Card companies never
include attachments.
Pay attention to spelling and grammar.
Never share important financial information. Again, use common sense. A legitimate
organization will never ask for your Social Security Number or bank account number.
If a deal or offer looks too good to be true, it is.
Consider using security measures like two-factor authentication. This is especially
important when dealing with any form of mobile wallet or ePayment.
Only make purchases or donations by known and legitimate organizations.
Change your smartphone settings so that it won’t automatically join wifi networks.
Install a good antivirus program. And, make sure that you keep it updated.
If you do believe that you’ve been a victim of cybercrime, contact your bank and credit-card
company and cancel your card immediately – or even close your account completely. It also
wouldn’t hurt to inform the authorities. And, don’t forget to turn off you computer and disconnect
it from your network so that it doesn’t spread to other devices.