You are on page 1of 6

LIGAS, WENDEL C.

17 APRIL 2023

BSC-2A

LEA 102

REFLECTION PAPER

I. LOCKS AND KEYS

Locks and keys are important tools that have been used for centuries to protect people's

property and ensure their privacy. They have evolved over time, from simple wooden locks to

complex electronic systems, but their fundamental purpose remains the same: to control

access to a particular space or object. Locks work by preventing the opening or closing of a

door or container unless a key or combination is used. They can be mechanical or electronic,

and can be designed for various levels of security. For example, a padlock is a simple

mechanical lock that can be easily picked or broken, while a high-security electronic lock

with biometric access control is much more difficult to bypass. During the discussion with

our professor, there are seven types of locks which I will elaborate below. Keys, on the other

hand, are the means by which locks are opened. They can be physical objects, such as metal

keys, or digital codes or biometric data used to access electronic locks. Keys can be lost or

stolen, which can compromise the security of a lock, so it's important to keep them safe and

secure. The relationship between locks and keys is symbiotic: without a lock, a key is

unnecessary, and without a key, a lock is useless. Together, they form a powerful tool for

controlling access to valuable or sensitive areas and objects.

However, locks and keys can also have their limitations. They can be vulnerable to

hacking, picking, or lock bumping, and can be compromised by skilled intruders. It's
important to choose the right type of lock for the level of security required, and to use it

properly to ensure maximum protection.

In conclusion, locks and keys are important tools for protecting property and maintaining

privacy. They have evolved over time to meet the changing needs of society, and will likely

continue to do so in the future. As technology advances, we can expect to see even more

sophisticated locks and keys that provide enhanced security and convenience.

II. SECURITY LAWS, EDUCATION, INVESTIGATION AND TRAINING

A communication system is a set of interconnected devices or networks that enables the

transmission and reception of data, information, or messages between individuals,

organizations, or machines. Communication systems can be classified into several categories

based on their features and functionality. Some common types of communication systems

include: (1) Telephone systems: Telephone systems allow voice communication between

individuals or groups of people over a wired or wireless network. (2) Computer networks:

Computer networks enable the exchange of digital data and information between computers

and other devices, either over a local area network (LAN) or wide area network (WAN). (3)

Radio communication systems: Radio communication systems use radio waves to transmit

and receive signals between devices, such as two-way radios, mobile phones, or satellite

communication systems. (4) Public address systems: Public address systems are used to

broadcast messages or announcements over a loudspeaker system to a large group of people.

(5) Video conferencing systems: Video conferencing systems enable remote video

communication between individuals or groups of people, allowing them to communicate and

collaborate from different locations. (6) Messaging systems: Messaging systems enable the
exchange of text, images, or multimedia content between individuals or groups of people,

either through instant messaging or email systems.

Effective communication systems are essential for the smooth functioning of

organizations, businesses, and other entities, allowing them to transmit and receive

information quickly and efficiently. They can help improve productivity, collaboration, and

decision-making while reducing communication barriers and improving overall efficiency.

Classification of documents is the process of organizing documents according to their

level of confidentiality, sensitivity, or importance. This helps to ensure that the appropriate

security measures are in place to protect the information contained within the documents.

Documents can be classified into several categories based on their level of sensitivity,

including: Top Secret -This is the highest level of classification and is used for information

that, if disclosed, could cause exceptionally grave damage to national security. Access to top

secret information is highly restricted and is usually granted only on a need-to-know basis.

Secret - This level of classification is used for information that could cause serious damage

to national security if disclosed. Access to secret information is also highly restricted and is

usually granted only to individuals who have a security clearance and a need-to-know.

Confidential - This level of classification is used for information that could cause damage to

national security if disclosed. Access to confidential information is less restricted than top

secret or secret information, but still requires a security clearance and a need-to-know.

Restricted - This level of classification is used for information that is sensitive but not

classified as confidential. Access to restricted information is generally limited to individuals

who have a need-to-know, and the information may be marked with specific handling

instructions.

The classification of documents helps organizations to identify the appropriate security

measures needed to protect the information contained within them. It also helps to ensure that
employees are aware of the sensitivity of the information they are handling and take the

necessary precautions to safeguard it.

During communication, there are methods to be followed in transmission. It could be by

direct contact of officer or personnel concerned, by official courier, or electrical means in

cryptographic form and registered mail. Although, there are some instances when you don’t

want to know other unauthorized agent to gain access of the document and the methods that

can be used is by burning and shredding which takes part in the destruction of documents. If

in any cases, you want to guard or prevent your important documents from theft or damage

from fire it will be put into storage.

The information cycle refers to the process of how information is created, disseminated,

used, and ultimately discarded or archived. It is the life cycle of information from its creation

to its eventual obsolescence or preservation. The information cycle typically involves the

following stages: (1) Creation: Information is created through various means such as

research, writing, recording, or data collection. (2) Organization and Processing: The

information is then organized and processed into a format that can be easily accessed,

understood, and disseminated. (3) Distribution: The information is distributed through

various channels such as publications, websites, social media, or other forms of

communication. (4) Use: The information is then accessed, analyzed, and applied by

individuals, organizations, or institutions for various purposes such as research, decision-

making, or education. (5) Preservation or Disposal: The information is either preserved for

future reference or disposed of when it is no longer relevant or necessary.

The information cycle is an important concept in information science, as it helps us

understand how information is created, disseminated, and used. Understanding the

information cycle can also help individuals evaluate the reliability and relevance of
information, and make informed decisions about the sources and types of information they

use.

Personal documents are documents that relate to an individual and their personal life.

Examples of personal documents include birth certificates, passports, driver's licenses,

marriage certificates, divorce certificates, academic transcripts, and medical records. Official

documents, on the other hand, are documents that are issued by an official authority,

organization or institution, and are used for official purposes. Examples of official documents

include government-issued identity cards, business licenses, tax returns, contracts, deeds, and

legal agreements. The key difference between personal and official documents is their

purpose and the authority that issues them. Personal documents are typically used for

identification or proof of personal information, while official documents are used for legal,

business, or administrative purposes.

Proprietary information refers to confidential or sensitive information that is owned by a

company or an individual and is not available to the public. This information is considered to

be valuable and may include trade secrets, intellectual property, confidential business

information, financial information, client lists, and other sensitive data that is not publicly

available. Proprietary information is typically protected by legal agreements such as non-

disclosure agreements (NDAs), which prevent individuals from sharing or disclosing this

information to others without permission. Companies and individuals may also take steps to

protect proprietary information through cybersecurity measures, such as firewalls, encryption,

and access controls. Protecting proprietary information is important for businesses as it helps

them maintain a competitive advantage in the marketplace. Unauthorized disclosure of

proprietary information can result in financial losses, damage to reputation, and legal

consequences.
Communication security is the practice of ensuring that communication between

individuals, organizations, or devices is secure and private. This is accomplished by

implementing measures to protect against unauthorized access, interception, and

manipulation of data. Communication security is important to protect sensitive information

and prevent data breaches. There are several threats to communication security that can

compromise the confidentiality, integrity, and availability of information. Some common

threats include: (1) Eavesdropping: This is the interception of communication by a third party

who is not authorized to access the information. Eavesdropping can be done using various

techniques such as wiretapping, packet sniffing, and social engineering. (2) Malware:

Malware is software that is designed to damage, disrupt, or gain unauthorized access to

computer systems. Malware can be used to steal sensitive information or gain unauthorized

access to networks. (3) Phishing: Phishing is a type of social engineering attack where an

attacker tries to trick the victim into providing sensitive information such as usernames,

passwords, and credit card details. This is typically done through email, phone calls, or text

messages. (4) Man-in-the-middle attacks: In this type of attack, an attacker intercepts

communication between two parties and relays messages between them. This allows the

attacker to eavesdrop on the communication and even modify the data being transmitted. (6)

Denial-of-service attacks: Denial-of-service attacks are designed to disrupt or disable

communication by overwhelming the target system with traffic or other requests. This can

cause the system to crash or become unavailable.

To protect against these threats, communication security measures such as encryption,

firewalls, access controls, and authentication should be implemented. Regular security

assessments and employee training can also help to identify and mitigate potential

vulnerabilities.

You might also like