You are on page 1of 11

Brian Neil E.

Elegio 3 rd year college

17001198500 I nformation Assurance and Security

What is information security

-Information
security protects sensitive information from
unauthorized activities, including inspection, modification, recording
and any disruption or destruction. The goal is to ensure the safety
and privacy of critical data such as customer.

What are the pros and cons

Pros
1. Being in Demand – Cyber security is certainly in demand.
2. Good Salaries - Cyber security professionals are generally
well paid once their careers are established
3. Opportunity to Learn New Things - Almost all of the
cyber security professionals we talked to love their work,
and specifically love that they can support their family
well and do so by doing work that they find interesting.  
Cons
1. On-Call and Demanding Hours - A cyber security attack is
a critical problem, and unfortunately can happen at any
time
2. Job Pressure. -  because of the constant nature of the
possibility of a hack or an attack.
3. The Learning Treadmill Never Stops - This is both a
blessing and a curse, since it can provide new and
interesting things to learn and it weeds out those that do
not keep

Lab 2

1. On pc, SETUP THE PASSWORD


2. WIFI HOTSPOT, CHANGE THE PASSWORD
3. ON SMARTPHONE, SETUP ANY SECURITY PERIMETERS (AT LEAST ONE)
4. GIVE DETAILED SUMMARY OF THE SECURITY TYPES AND WITH SAMPLE

1.

2.

2 3
3.

4.

1. Equity securities

Equity almost always refers to stocks and a share of ownership in a company


(which is possessed by the shareholder). Equity securities usually generate
regular earnings for shareholders in the form of dividends. An equity security
does, however, rise and fall in value in accord with the financial markets and
the company’s fortunes.

2. Debt securities

Debt securities differ from equity securities in an important way; they involve
borrowed money and the selling of a security. They are issued by an
individual, company, or government and sold to another party for a certain
amount, with a promise of repayment plus interest. They include a fixed
amount (that must be repaid), a specified rate of interest, and a maturity date
(the date when the total amount of the security must be paid by)

3. Derivatives

Derivatives are a slightly different type of security because their value is


based on an underlying asset that is then purchased and repaid, with the
price, interest, and maturity date all specified at the time of the initial
transaction.
Lab 3

1. Whar is Wannacry Ransomware? Give the detailed summary

2. What is CIA Triad

3. Give at least 2 examples of famous computer virues along with detailed history

1. WannaCry is an example of crypto ransomware, a type of malicious software


(malware) used by cybercriminals to extort money. Ransomware does this by
either encrypting valuable files, so you are unable to read them, or by locking you
out of your computer, so you are not able to use it.

2. The CIA Triad—Confidentiality, Integrity, and Availability—is a guiding model in


information security. A comprehensive information security strategy includes
policies and security controls that minimize threats to these three crucial
components.

 Confidentiality - Refers to protecting information from unauthorized access.

 Intergrity – Data are trustworthy, complete, and have not been accidentally
altered or modified by an unauthorized user.

 Availability – Data are accessible when you need them.

3. I love you – is an overwrite virus. This virus disguised itself as a love letter from
one of its victims contacts and spread via email. It was the most damaging
malware event of all time when it occurred 2000, in just about 10 days, it reached
estimated 45 million users and and caused $10 billion in damages

Worm – Is a type of Trojan horse malware that unlike traditional viruses, does
not require the user’s intervention to spread form device to device. After
breaching a system, it can spread form one computer to another without human
intervention
Lab 4

Give at least 1 example of news with detailed summary related to the following:

1. Security risk

2. Environmental Risk

3. Political Risk

4. Medical Risk

5. Infrastructure Risk

 Security Risk – Distortion the international spread of misinformation, including


by bots and automated sources, causes trust in the intergrity of information to be
compromised.

 Environmental Risk – The impact of COVID-19 pandemic transcended virtually


everything in 2020, including the environment, from canceled summits on climate
and biodiversity to a temporary dip in air pollution and greenhouse gas emissions
to greater awareness of the link between human health and planetary earth

 Political Risk - Wal-Mart Stores Inc. outlined certain political risks it faces in its
fiscal 2015 10-K filing with the SEC under its operating risk section. In its risks
associated with suppliers, Wal-Mart mentioned potential political and economic
instability in the countries that foreign suppliers operate, labor problems, and
foreign trade policies and tariffs that could be imposed.

 Medical Risk – Lower blood pressure, cholesterol, and blood glucose. The
researchers found clear evidence that, compared with lower-intensity behavioral
weight management programs or no weight loss support, behavioral weight
management programs resulted in lower systolic blood pressure, lower total
cholesterol-to-good cholesterol ratio, and lower HbA1c (a measure of blood
sugar levels over the previous 3 months)

 Infrastructure Risk - The risk assessment of a project should reflect its credit quality
during its weakest period until the obligation is repaid through project cash flows.
Separation of the construction and operation phases enables a risk assessment to
identify if the weakest period is during one phase or the other.

Lab 5

1. What are the different job roles in Cyber Security?

2. On the Second Video, do you think should be thankful for this or not? If so, why?

3. What would you do be in the near future?

1.

 Application Security
 Data loss prevention
 Forensics
 Incident Response
 Network Security
 Security architecture
 Threat Intelligence
 Vulberability Management

2.
Lab 6

1. Why cybersecurity vs Information Security is DEBATABLE?

2. Give at least 3 CYBERNEWS that relates on the cybersecurity and information security

3. If you were a victim of CYBERBULLYING, What would you do?

1. Cyber security covers the overarching mission of protecting computers,


networks, information, and devices from malicious activity within cyberspace.
On the other hand, information security is primarily concerned with securing
data confidentiality, integrity, and availability .
2.

3. I will talk to them to stop/warning what they’re doing and if they didn’t stop I
will report them to authority

LAB 7

1. What are the legal and regulatory compliance in regards to the ff:
A. CYBERSECURITY

B. INFORMATION SECURITY

2. In Relation to the video, “ the MALWARE that hacked Linus Tech Tips” What tips and tricks in
order to avoid this kind of situation

A. Cyber laws, more commonly known as internet laws, are laws that are related
to legal informatics, regulating the digital distribution of information, e-
commerce, software, and information security. It usually covers many related
areas, such as usage and access to the Internet, freedom of speech, and
privacy.  

B. Securing information is about securing value. In the same way that we secure
physical stores of value such as cash, gold, or jewelery against theft, loss, or
destruction, we must do the same with digital stores of value – particularly
information. We live in an information society, after all, where the creation, use,
and distribution of information is a significant economic, political, and cultural
activity. We are moving from the service economy into the information economy,
which emphasizes informational activities that rely on information technologies
such as computers, mobile devices, and the Internet.

2. always double check the name of the shop and avoid the suspicious site or email

You might also like